Threat Category Descriptions

  • Malware—Blocks requests to access servers hosting malware and websites compromised through any application, protocol, or port. Recommended.
  • Command Control Callbacks—Prevents compromised devices from communicating with command and control servers through any application, protocol or port. Also, this setting helps identify potentially infected machines on your network. Recommended.
  • Phishing Attacks—Blocks access to fraudulent websites that are designed to steal personal information. Recommended.
  • Potentially Harmful Domains—Blocks access to domains that exhibit suspicious behavior and may be part of an attack.
  • Newly Seen Domains—Blocks access to domains that are being queried through Secure Access for the first time and for which Secure Access has not yet seen a client lookup. Not all new domains are necessarily harmful; blocking access to this category may block access to legitimate sites.
  • Dynamic DNS—Blocks access to sites that host dynamic DNS content. Not all sites in this category are necessarily harmful; blocking access to this category may block access to legitimate sites.
  • DNS Tunneling VPN—Blocks VPN services that allow users to disguise their traffic by tunneling it through the DNS protocol. These services can be used to bypass corporate policies regarding access and data transfers.
  • Cryptomining—Blocks access to crypto mining pools where "miners" group together and share resources—processing power—to better gather and share cryptocurrencies. Also blocks known web crypto mining source code repositories.

Manage Threat Categories < Threat Category Descriptions > Add a Threat Category List