Using a remote database to validate URLs

By default, phishing policy is configured to use an on-device database for detecting phishing URLs. If you prefer your devices to have access to a much larger, real-time updated database, you can configure this through the MTD threat management console. You can also set this option when configuring Advanced phishing protection for managed devices.


  1. Log in to the MTD console.
  2. Navigate to Policy > Phishing Policy.
  3. Select the device group you want in the policy.

  4. Select these options:

    • Enable phishing protection and activate zIPS URL sharing
    • Enable content inspection on remote server

      The option to allow user control of the phishing VPN is disabled.

  5. Deploy the changes.