Using a remote database to validate URLs
By default, phishing policy is configured to use an on-device database for detecting phishing URLs. If you prefer your devices to have access to a much larger, real-time updated database, you can configure this through the MTD threat management console. You can also set this option when configuring Advanced phishing protection for managed devices.
Procedure
- Log in to the MTD console.
- Navigate to Policy > Phishing Policy.
-
Select the device group you want in the policy.
-
Select these options:
- Enable phishing protection and activate zIPS URL sharing
-
Enable content inspection on remote server
The option to allow user control of the phishing VPN is disabled.
- Deploy the changes.