Skip to content
English
  • There are no suggestions because the search field is empty.

How does the Threat Management tool work? (Available on Adapt and Defend plans)

This guide explains how to use and make the most of the Threats tool in Moxso

What is it for?

Moxso's Threat Management is designed to allow you to focus 100% on mitigating

specific cyber threats with fewer resources and a minimum amount of time. Moxso's Threat Management analyzes each threat so you can quickly identify if it's a real phishing attempt. Then you can take action such as communicating with your company about the threat and quarantining the emails. 

How does it work?

When an employee wants to report suspicious emails as phishing, they click on the Moxso Report Button directly in the email within their inbox. The email is then forwarded to your IT department and appears in the Threat Management tab.



Moxso’s Threat Management automatically conducts an analysis of each reported threat. Based on this comprehensive analysis, admin or IT should be able to tell whether or not the reported email is a phishing attempt.

The analysis is based on the following metadata and threat indicators:

  • Common threats 
    • Is the email sent from a company that is often exploited in phishing?
  • DNS 
    • What is the domain name of the IP address? Where is the email sent from?
  • Homoglyphs 
    • Are familiar signs replaced with other similar signs?
  • Inconsistency 
    • Are there any discrepancies between the sender's email address and name?
  • Urgency 
    • Does the content of the email feel urgent? Are there signs of social engineering?
  • Credentials 
    • Does the sender request your user credentials?
  • And more…

You can use Threat Management to reduce risk in three specific ways:

  • You can respond to employee reporting by labeling all threats with a warning. This way, other employees who may have received the same email will be warned that it has been reported as phishing by a colleague.
  • You can choose to quarantine emails that you identify as phishing, preventing them from reaching employee inboxes in the future.
  • Additionally, the feedback loop where employees get informed about their reporting is a key part of their learning process. 

Threat Management encourages safe behavior. Ultimately, Threat Management has the potential to improve your overall cybersecurity posture by building a security culture.