Configuring Threat Prevention in Micro Edge


Threat Prevention is a lightweight security feature that uses real-time threat intelligence powered by Webroot Brightcloud to block high risk Internet traffic. Threat Prevention blocks Internet hosts that may be associated with Spam, Mobile Threats, Tor Proxy, Keyloggers, Malware, Spyware, Windows Exploits, Web Attacks, Botnets, Scanners, Denial of Service, Reputation, Phishing, or Compromised Proxy.

Important note: enabling Threat Prevention in Micro Edge requires an active Security Edition subscription.

URL Reputation versus IP Reputation
Threat Prevention uses two types of reputation lookups depending on the type of traffic. For outgoing HTTP or HTTPS traffic, Threat Prevention uses the URL reputation lookup. For all other network traffic, Threat Prevention uses the IP reputation lookup.

Enabling or Disabling Threat Prevention
Threat Prevention is enabled by default and blocks Internet IP addresses with a High Risk reputation. You can manage the Threat Prevention service in Settings > Services > Threat Prevention.


Adjusting the block sensitivity

Threat Prevention blocks incoming and outgoing sessions from "high risk" traffic. For incoming sessions, the admin can increase the sensitivity level using the slider. Outgoing sessions are not affected by adjusting the slider to prevent excessive false positives from the internal network.

Note: blocking Suspicious and Moderate Risk IP Addresses may prevent some legitimate types of Internet traffic and should be set with caution.

Redirecting users to a block page
Threat Prevention applies to all types of network traffic in both directions. For outgoing HTTP / HTTPS traffic, you have the option to redirect the user’s web browser to a block page if the IP address is blocked. Otherwise, Threat Prevention rejects the connection and the web browser returns a general connection failure message to the user.

To enable the redirect for web based Internet traffic, toggle Enable HTTP/HTTPS redirect for blocked pages.

Note: For HTTPS traffic, the redirect behavior causes web browsers to prompt the user with a security warning before proceeding to the denial page. The redirect option may not be preferred in most cases.

Managing Access to the Block Page
If you enable the option to redirect users to a block page, Micro Edge enables two access rules permitting access to the denial page from local networks. You can manage these rules in Settings > Firewall > Access.

Adding IP Addresses to the Pass List
You can create exceptions so that specific IP addresses are excluded from Threat Prevention scanning. To add a host to the Pass List:

  1. Click Add.
  2. In the IP Address field, enter an IP Address.
  3. Select the appropriate subnet mask. For adding a single host, specify a 32-bit subnet mask (e.g.
  4. Enter a Description for your pass host.
  5. Click Add and Save to confirm the changes.

Looking up IP Addresses
You can check the reputation of an IP address using the Threat Lookup dialog.
Note: The threat lookup feature uses the IP reputation lookup method. If you wish to check the URL reputation score, you can use the Brightcloud online lookup tool.


Reviewing blocked IP Addresses in Reports
You can view reports of blocked IP addresses in Reports.

The Blocked Summary report provides information about all sessions blocked by Threat Prevention during the timeframe specified at the top of the page: a chart of top blocked addresses and a graph of blocked addresses over time.

The Blocked Addresses report includes a timestamp, the client IP that initiated the connection, the offending IP address, and the reputation score.

Threat Prevention Reports example

Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request



Please sign in to leave a comment.

Powered by Zendesk