User Tools

Site Tools


threat_mitigation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
threat_mitigation [2018/01/22 22:23] lucythreat_mitigation [2019/11/21 09:29] (current) – [Threat Mitigation] lucy
Line 1: Line 1:
 ===== Threat Mitigation ===== ===== Threat Mitigation =====
  
-The threat mitigation allows a LUCY admin to report reported phishing mails to according abuse contact of the provider's originating IP address taken from the message header. You can click on the mail symbol within the incident center to initiate the sending of the report:+The threat mitigation allows a LUCY admin to report reported phishing emails to according abuse contact of the provider's originating IP address taken from the message header. You can click on the mail symbol within the incident center to initiate the sending of the report:
  
 {{ threat-mitigation.png?600 }} {{ threat-mitigation.png?600 }}
  
-The email send to the abuse contact of the provider can be edited within the incident settings:+The email sent to the abuse contact of the provider can be edited within the incident settings:
  
-{{ abuse_contact.jpg?500 }}+{{:threat_migration_2.jpg?600|}}
  
 The abuse report can contain the following variables: The abuse report can contain the following variables:
Line 13: Line 13:
   * %domain% — Domain or IP   * %domain% — Domain or IP
   * %email% — actual Email   * %email% — actual Email
-  * %time% — Tim+  * %time% — Time 
 + 
 +===== Default abuse template ===== 
 + 
 +LUCY comes with a default abuse template, which should be customized by the admin: 
 + 
 +{{ default_abuse.jpg?600 }} 
 + 
  
threat_mitigation.1516656237.txt.gz · Last modified: 2019/07/25 12:51 (external edit)