LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG
  2. 3. Analyzed

3.4 Domain

πŸ“– Overview

The Domain submodule under the Analyzed section provides a focused view of all email-sending domains identified during threat analysis. It tracks the domain origin of each message flagged as SPAM, PHISHING, or SUSPICIOUS, and enables security teams to take proactive action by blacklisting or whitelisting them directly from the interface.

πŸ›‘οΈ This module helps you eliminate malicious infrastructure at its source β€” the sending domain.


🧠 What You’ll See

Column
Description

Sender Domain

The domain that sent the analyzed email

Verdict

Classification result (SPAM, PHISHING, SUSPICIOUS)

Actions

Add to blocklist or whitelist

Each row represents a unique sending domain from past emails that triggered a security verdict.


πŸ§ͺ Verdict Types

Verdict
Description

SPAM

Domain responsible for bulk/unwanted email content

PHISHING

Domain used in impersonation, credential theft, or scam campaigns

SUSPICIOUS

Newly registered, low-reputation, or anomaly-indicating domains


πŸ”§ Domain Filter Operations

Clicking the action button opens the Domain Filter Operations modal, where you can:

  • Select the filter type:

    • βœ… Allow (Whitelist)

    • 🚫 Block (Blacklist)

  • Apply instantly across your SEG rules

  • Prevent future emails from or allow communications to trusted domains

βœ”οΈ This functionality helps you create a dynamic trust model around incoming mail infrastructure.


πŸ“‹ Use Cases

Goal
Domain Module Benefit

Block phishing campaign sources

Instantly blacklist high-risk sender domains

Whitelist known partners

Ensure no interruption in legitimate email flow

Analyze domain-based attacks

View clusters of suspicious or recurring sources

Enrich block/allow lists

Make data-driven trust/distrust decisions


🧠 Common Patterns Identified

  • Phishing emails from lookalike domains (e.g., out1ook.com)

  • Spam relays from marketing platforms

  • Spoofed sender addresses from legitimate domains (if SPF/DKIM fails)

  • Unknown domains with no DNSSEC, DMARC, or low TTL


βš™οΈ Analyst Tips

  • Sort by verdict to focus on high-priority domains (PHISHING > SPAM).

  • Repeated appearances across multiple users indicate targeted campaigns.

  • Combine this with 3.3 Mail to see the full context of delivery, recipients, and message content.


πŸ” Best Practices

Practice
Why It's Important

Review domain list weekly

Catch evolving phishing infrastructure

Auto-block newly registered domains

Many threats originate from fresh TLDs

Use with DMARC/SPF validation logs

Validate whether spoofing is occurring

Sync with other filters (URL, Mail)

Apply protection holistically


🎯 The Domain module gives you strategic control over what infrastructure can β€” and cannot β€” communicate with your users. It’s one of the most effective ways to stop email-based threats at the source.

Previous3.3 MailNext4. Mail Settings

Last updated 9 days ago