User Tools

Site Tools


threat_mitigation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
threat_mitigation [2018/11/15 14:30]
lucy
threat_mitigation [2019/04/08 16:59] (current)
lucy
Line 1: Line 1:
 ===== Threat Mitigation ===== ===== Threat Mitigation =====
  
-The threat mitigation allows a LUCY admin to report reported phishing ​mails to according abuse contact of the provider'​s originating IP address taken from the message header. You can click on the mail symbol within the incident center to initiate the sending of the report:+The threat mitigation allows a LUCY admin to report reported phishing ​emails ​to according abuse contact of the provider'​s originating IP address taken from the message header. You can click on the mail symbol within the incident center to initiate the sending of the report:
  
 {{ threat-mitigation.png?​600 }} {{ threat-mitigation.png?​600 }}
  
-The email send to the abuse contact of the provider can be edited within the incident settings:+The email sent to the abuse contact of the provider can be edited within the incident settings:
  
-{{ abuse_contact.jpg?500 }}+{{:​threat_migration_2.jpg?600|}}
  
 The abuse report can contain the following variables: The abuse report can contain the following variables:
threat_mitigation.1542288653.txt.gz ยท Last modified: 2018/11/15 14:30 by lucy