Skip to main content

Malware & Phishing Detection

To configure Javelin's malware and phishing detection capabilities, you will need to enable the checkphish_processor.

Configuration Options

Make sure to add the checkphish_processor in the Javelin Response Chain under Processors (Gateway level). You can also enable the processor at the Route level under the Route configuration.

Settings

Javelin continually checks for malware and phishing links, URLs and domains. This is updated in real-time every minute and is based on the latest threat intelligence feeds. Special integration with Javelin Cloud is required to enable this processor. Identified links and domains are quarantined. Please contact the Javelin team for more information.

Processor Telemetry

Processor telemetry is always enabled by default and it is passed back to the calling client application under a "javelin" json object in the response. For example, you will see a response similar to the following if data masking was carried out based on matching restricted keywords:

      "request.chain.checkphish_processor_20240916074544.028397518": {
"duration": "11.73112ms",
"found_phishing_urls" : "true",
"found_malware_urls" : "true",
...
},

This telemetry is also available in the Javelin Chronicle for detailed analysis and tracking of sensitive data violations. You can browse to the Route configuration section of the Javelin WebApp to view the telemetry data for each request.

Security Metrics

Malware/Phishing Processor is designed to provide security metrics for specific security filters. Any matches are captured as metrics & telemetry and presented in Analytics & Security dashboards on the Javelin console.