Trusted List Management
Manage your allow lists and portal to whitelist traffic.
Last updated
Manage your allow lists and portal to whitelist traffic.
Last updated
The Trusted List Management works in the same way as the Quarantine section, however instead of listing threats this is your area to enter and store Allow lists, to ensure specific traffic is able to access your estate, regardless of behaviour or whether it is automated etc.
NB: items on the Trusted List will always override any models that are live on your site, or items in your Quarantine, so be careful not to add items on too broad a dimension (for eg, an IP address is safer than a Data Center).
See your overall Trusted stats
Add and remove records from the Trusted database
Search for existing records on this database
Filter Drop-Down:
By default, both single and combination traffic are shown. Use the "Filter" drop-down to change this:
Show all: Display both single and combination traffic.
Combinations only: Display only combination traffic.
Exclude combinations: Display only single traffic.
You can view the More Information report on the statistics and behaviour of a specific record by either:
Clicking on the Record Value in blue
Clicking an the meatball menu (⋯) on a record will give you the option to view More Information
Clicking "Add Items" will let you enter a new value into your whitelist.
This form will ask for some information to ensure the right traffic is being added to your trust list.
Lets you choose which domain(s) you would like to add this trusted record to. This will display all available domains on your account. You can choose to add items to datastreams individually or collectively.
View the Glossary to understand different Traffic Types.
Once the dimension has been determined, enter the value you wish to enter, for example an IP Address, a CIDR range, a list of User Agents and so on, that you wish to trust.
Set the date you would like this trusted entry to last until.
NB when trusting an IP address, it is recommended to give it a reasonable expiration, as IP addresses can rotate the organisations which own them.
This field is mandatory, so there is an audit trail for why this record was added to the trusted list. For example, it could be an IP Address of an uptime tool your website uses to monitor the site.