09-09-2014 07:34 AM
So I've started to test the URL filtering capabilities on our C670s. So far I have found that there are quite a few false positives or incorrectly categorized web sites. Is there any mechanism in place to request a reclassification of a website?
Jason
09-15-2014 05:36 PM
09-16-2014 07:19 AM
Thanks, next question:
What category would Cisco like me to use to suggest that a site is a phishing website asking for user's credentials? There is no 'Phishing' category. This is the website: http://outlookwebsteam.zyro.com/
09-16-2014 08:01 AM
From the URL Filtering option on the ESA, we can see the Uncategorized URLs... unfortunately - that doesn't seem to carry over to the reporting side...
Google lookup for zyro.com shows them to be a Web Hosting company --- I'd report it as such based on the parent URL.
-Robert
09-16-2014 09:01 AM
But this would not help my cause of getting it reported as a phishing or malicious website. It is clearly a 'phishing' website.
Thoughts?
09-18-2014 07:20 AM
Here's another 'phishing' website:
http://alufelniakcio.com/media/jce/acc/
Cisco indicates it is a shopping page, it is not.
Here's another:
http://www.webmaintannportal.freehosto.com/
Cisco indicates it is not in our list. I'd like to classify it as a phishing website so that it is blocked. But there is no category for that, not even a category for malicious website.
Here's another:
http://hrererndnsernfrgnendndehrfdee.esy.es/
Cisco indicates it is a business and industry, it is not. Again, a phishing/malicious website.
09-22-2014 07:18 AM
Thoughts?
09-23-2014 07:55 PM
I'll have to check and see. Since this tool is not owned or managed from TAC, we'll need to work and see what options we have for the URL as missed vs. nature/intent as 'judged'.
-Robert
10-03-2014 07:06 AM
Just wondering if there is any movement on this. Here's an example of a different vendors solution that works well:
http://www.fortiguard.com/ip_rep/index.php
10-09-2014 02:03 PM
Maybe use hacking?
10-14-2014 03:08 PM
Cisco, is this what you want us to do? If the URL category is HACKING will it cause future e-mails with a URL of that classification to be blocked by URL filtering?
06-05-2015 07:01 AM
Have there been any advancements in URL filtering on the ESAs?
I'm still seeing a LOT of false positives on e-mails containing lots of URLs being incorrectly tagged and a LOT of missed phishing URLs.
My content filter is setup as url-reputation(-10.00, -9.50 , "")
with the intention of only flagging the worst URLs.
Currently I don't have a way to tell which URL in an e-mail caused the e-mail to be tagged so we know which URL to report to Cisco to be re-evaluated.
And still no 'Phishing' category.
Here's an e-mail that walked right through the IronPort ESA spam filtering and url filtering:
From: Holland, Randolph @ Regions
Sent: Friday, June 05, 2015 2:54 AM
To: Holland, Randolph @ Regions
Subject: E-Mailbox Upgrade
Take note of this important update that our new web mail has been improved with a new messaging system from Owa/outlook which also include faster usage on email, shared calendar,web-documents and the new 2015 anti-spam version. Please use the link below to complete your update for our new Owa/outlook improved web mail.
Click Link Here (http://www.studioareaimmobiliare.it/photos/6225/original/verify.html)
Connected to Microsoft Exchange
© 2014 Microsoft Corporation. All rights reserved
06-21-2015 05:27 PM
Hello Jason,
The categories for URL filtering would match Phishing URLs under malicious matching:
From the Link above;
Web reputation threat type: | phishing |
Typically the URL filtering builds and works off the WSA's reputation (WBRS) where -10 to -6 is generally on the malicious side.
As per Robert you can indeed track which URL in the email was tagged into your filter and mail_logs/tracking
Machine (ESA) (SERVICE)> outbreakconfig
Outbreak Filters: Enabled
Choose the operation you want to perform:
- SETUP - Change Outbreak Filters settings.
- CLUSTERSET - Set how the Outbreak Filters are configured in a cluster.
- CLUSTERSHOW - Display how the Outbreak Filters are configured in a cluster.
[]> setup
Outbreak Filters: Enabled
Would you like to use Outbreak Filters? [Y]>
Outbreak Filters enabled.
Outbreak Filter alerts are sent when outbreak rules cross the threshold (go
above or back down below), meaning that new messages of certain types could be
quarantined or will no longer be quarantined, respectively.
Would you like to receive Outbreak Filter alerts? [N]>
What is the largest size message Outbreak Filters should scan?
[262144]>
Do you want to use adaptive rules to compute the threat level of messages? [Y]>
Logging of URLs is currently disabled.
Do you wish to enable logging of URL's? [N]> Y
---
Then press enter through all the prompts and commit changes
This way now every time an email gets actioned by this content filter, we can run a simple grep command to pull out the URL that was blocked and the score.
So you can audit if these are actually malicious URLs and working as expected, and if there is false positive matches you can provide me the list of URLs and I can have our WBRS team correct it.
Log entries will look like this:
---
Fri Mar 13 16:20:08 2015 Info: MID 556 URL http://XXXXXXXXXXsale.com has reputation -8.95 matched url-reputation-rule
11-10-2014 12:17 AM
Hi Robert,
can we track which url blocked by the ESA?
Regards,
Sajid
11-10-2014 07:48 AM
Yes - you can log in the mail_logs the URL and reputation, as long as you have VOF enabled, and set to log URL with outbreakconfig and then:
Do you wish to enable logging of URL's? [N]> y
See the attached KB that I am working on...
-Robert
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide