Zero Phishing Settings
To access Zero Phishing Settings, in the Policy tab, expand Threat Extraction, Threat
Emulation and Anti-Exploit rule, right click Zero Phishing Settings under the Actions column
and click Edit Shared Action .
Define setting for phishing prevention and password reuse prevention.
n
Phishing Prevention - Checks different characteristics of a website to make sure that a
site does not pretend to be a different site and use personal information maliciously.
n
Password Reuse Prevention - Alerts users not to use their corporate password in non-
corporate domains.
Phishing Prevention
n
Phishing Protection - Select an option:
Prevent Access and Log (default) - If Harmony Endpoint determines that the site
l
is phishing, users cannot access the site. A log is created for each malicious site.
Off - Phishing prevention is disabled.
l
Log Only - When a user uses a malicious site, a log is created.
l
Prevent Access Only - Users cannot access malicious sites. No logs are created.
l
n
Send log on each scanned site - Send logs for each site that users visit, if it is malicious
or not. By default, it is selected.
n
Allow user to dismiss the phishing alert and continue to access the site - Users can
choose to use a site that was found to be malicious.
n
Allow user to abort phishing scans - Users can stop the phishing scan before it is
completed.
Password Reuse
n
Password Reuse Protection - Select an option:
Alert User and Log (default) - If a user enters a corporate passwords in a non-
l
corporate site, the user gets an alert and a log is created.
Off - Password Reuse Prevention is disabled.
l
Log Only - If a user enters a corporate passwords in a non-corporate site, a log is
l
created.
R81 Harmony Endpoint Server Administration Guide | 344
Zero Phishing Settings
Need help?
Do you have a question about the HARMONY R81 and is the answer not in the manual?