3.4 Domain
π Overview
The Domain submodule under the Analyzed section provides a focused view of all email-sending domains identified during threat analysis. It tracks the domain origin of each message flagged as SPAM, PHISHING, or SUSPICIOUS, and enables security teams to take proactive action by blacklisting or whitelisting them directly from the interface.
π‘οΈ This module helps you eliminate malicious infrastructure at its source β the sending domain.
π§ What Youβll See
Sender Domain
The domain that sent the analyzed email
Verdict
Classification result (SPAM, PHISHING, SUSPICIOUS)
Actions
Add to blocklist or whitelist
Each row represents a unique sending domain from past emails that triggered a security verdict.
π§ͺ Verdict Types
SPAM
Domain responsible for bulk/unwanted email content
PHISHING
Domain used in impersonation, credential theft, or scam campaigns
SUSPICIOUS
Newly registered, low-reputation, or anomaly-indicating domains
π§ Domain Filter Operations
Clicking the action button opens the Domain Filter Operations modal, where you can:
Select the filter type:
β Allow (Whitelist)
π« Block (Blacklist)
Apply instantly across your SEG rules
Prevent future emails from or allow communications to trusted domains
βοΈ This functionality helps you create a dynamic trust model around incoming mail infrastructure.
π Use Cases
Block phishing campaign sources
Instantly blacklist high-risk sender domains
Whitelist known partners
Ensure no interruption in legitimate email flow
Analyze domain-based attacks
View clusters of suspicious or recurring sources
Enrich block/allow lists
Make data-driven trust/distrust decisions
π§ Common Patterns Identified
Phishing emails from lookalike domains (e.g.,
out1ook.com
)Spam relays from marketing platforms
Spoofed sender addresses from legitimate domains (if SPF/DKIM fails)
Unknown domains with no DNSSEC, DMARC, or low TTL
βοΈ Analyst Tips
Sort by verdict to focus on high-priority domains (PHISHING > SPAM).
Repeated appearances across multiple users indicate targeted campaigns.
Combine this with 3.3 Mail to see the full context of delivery, recipients, and message content.
π Best Practices
Review domain list weekly
Catch evolving phishing infrastructure
Auto-block newly registered domains
Many threats originate from fresh TLDs
Use with DMARC/SPF validation logs
Validate whether spoofing is occurring
Sync with other filters (URL, Mail)
Apply protection holistically
π― The Domain module gives you strategic control over what infrastructure can β and cannot β communicate with your users. Itβs one of the most effective ways to stop email-based threats at the source.
Last updated