www.websense.com Open in urlscan Pro
204.15.67.11  Public Scan

URL: https://www.websense.com/content/support/library/email/hosted/admin_guide/url_sandboxing_tab.aspx
Submission: On October 05 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET /content/kb-search.aspx

<form class="support_search" action="/content/kb-search.aspx" method="get">
  <label></label>
  <label></label>
  <input type="text" name="q" value=" Search eSupport" onfocus="if (this.value == ' Search eSupport') {this.value = '';}" onblur="if (this.value == '') {this.value = ' Search eSupport';}">
  <input type="submit" value=" ">
</form>

Text Content

Documentation | Support


Defining Email Policies > URL Sandboxing tab

URL Sandboxing tab
 
Related topics:
URL sandboxing exceptions

URL Sandboxing utility

File sandboxing

Use the URL Sandboxing tab in a policy to inspect uncategorized URLs in email by
tagging them for additional real-time advanced security analysis. Doing so helps
protect end users from accessing malicious websites.
 
 
Note 
If a website is uncategorized, URL sandboxing changes ("wraps") the URL in the
email delivered to users. To add an exception for specific URLs to prevent them
from being sandboxed, add a sandboxing exception. See URL sandboxing exceptions.

With URL sandboxing, if users click on a link within an email and that link or
elements associated with that link are suspicious, they receive a warning that
"The link may not be safe." The notification includes:
The domain they are trying to access.

The reasons the link is considered suspicious: for example, the sender email
address may be unknown to our service or the sending mail server may have a
suspicious reputation.

The option to analyze the page further.

If they answer No to Analyze the page?, the suspicious link is not analyzed.
They can then close the notification window. For their protection, they cannot
access the page.
If they answer Yes, the page is analyzed using Forcepoint Email Security Cloud
real-time advanced security analysis. They then receive one of the following
messages. The notification messages can be customized. See Configure block and
notification pages.
 
Notification
Description
The link appears to be safe
No malicious threats found. The notification lists the URL and category or
categories of the page. Users can proceed to view the page if they choose to do
so.
Access denied
Malicious threats detected in the page. The notification lists any matched
categories along with the sites suspected of being infected with a malicious
link. Users cannot access the page.
Access denied
 
Users may also receive an Access denied notification if their organization does
not permit them to browse uncategorized web pages.
Unable to access page
The web server may be down or the link may be incorrect. They may want to try
again later, or contact their administrator for more information.
Unable to analyze URL
The page could not be analyzed because its protocol is not supported. Supported
protocols are HTTP, HTTPS and FTP. If you have selected the Allow the recipient
to follow links with an unsupported protocol option, the user can proceed to
view the page if they wish; otherwise, the user cannot access the page.

 
 
Important 
Websites that rely on cookies are not supported. When analyzed, URLs that
resolve to sites that rely on cookies may return an error or an incorrectly
rendered page. See the article Embedded URL sent for analysis fails with an
error or incorrectly rendered page in the Knowledge Base.
Administrators can retrieve the original URL in the cloud portal using the URL
Sandboxing Utility located in Email > Toolbox.
Any administrator or end user can check any URL for malicious content by going
to the online Advanced Classification Engine (ACE) CSI Insight page
(https://csi.forcepoint.com) and entering the URL.
If a user must access a link that gets an error (or is otherwise blocked by the
URL sandbox), the user should work with Technical Support to resolve the issue.
Forcepoint Email Security on-premises administrators need to contact Technical
Support with the sandboxed URL and request the original URL.

To modify rules for URL sandboxing:
1.
Click Edit.

2.
Under Default settings, select Analyze suspicious URLs.

3.
To allow the user to click through to the site after looking at the category of
the Web page, select Allow the recipient to follow links to unclassified URLs.

4.
Links cannot be analyzed if Forcepoint Email Security Cloud does not recognize
the network protocol used. Supported protocols are HTTP, HTTPS and FTP. To allow
the user to click through to the site if it cannot be analyzed, select Allow the
recipient to follow links with an unsupported protocol.

5.
If required, enter customized text to display in email messages instead of
suspicious URLs, such as "Danger, do not click!".

6.
Under Policy-wide settings, enter any trusted domains that you do not want to be
inspected in email messages. Use this list with caution: if a site on the list
is compromised, Forcepoint Email Security Cloud does not analyze the site and
cannot detect the security problem.

7.
Define whether to analyze suspicious URLs contained in signed messages.

 
 
Note 
The options to whitelist domains and analyze suspicious URLs in signed messages
apply to all users and groups in a policy, and cannot be over-ridden by
exceptions.

8.
Click Submit.



Defining Email Policies > URL Sandboxing tab

Copyright 2022 Forcepoint. All rights reserved.