CHECKPHISH RESPONSE INTEGRATION

Overview

 

CheckPhish uses deep learning, computer vision and NLP to mimic how a person would look at, understand, and draw a verdict on a suspicious website. Our engine learns from high quality, proprietary datasets containing millions of image and text samples for high accuracy detection.

Prerequisites

  • Logsign 6.3.+ versions support this integration.

Configure On Checkphish

 

Forwarding settings are completed as follows:

 

  1. Log in to your Checkphish portal.
  2. Click the Profile at the top right and then click Profile Information.

 

 

  1. Copy the API Key value.

 

Configure On Logsign

 

Forwarding settings are completed as follows:

 

  1. Click Settings > Integrations > Responses.
  2. In the ‘Search’ part, write Checkphish.
  3. Click ‘Configure’ and then click ‘+Device’.

 

  1. Define the settings as follows:
  • Device Name: Define the Device Name.
  • Api Key: Specify the api key.
  1. Click Create to save the changes.

Methods

SCAN

 

  • Device:  Select the configuration you have configured.
  • Url: Define the url you want to scan.

 

STATUS

 

 

  • Device:  Select the configuration you have configured.
  • Job Id: Define CheckPhish jobID that was assigned to the URL when it was submitted.

 

Was this article helpful?
0 out of 0 found this helpful

Articles in this section

See more
Become a Certified Logsign User/Administrator
Sign-up for Logsign Academy and take the courses to learn about Logsign USO Platform in detail. Enjoy the courses, and get your badges and certificates. In these courses, you'll learn how to use Logsign in your work and add value to your career.
Visit Our Blog
Our Logsign USO Platform illustrate our expertise. So do the blog. Through our blog posts, deepen your knowledge on various SecOps topics or get updated about important news & modern approaches for cybersecurity. Get into the habit of reading valuable information provided by Logsign. Be a step ahead.