Fortinet white logo
Fortinet white logo

User Guide

Brand Protection

Brand Protection

The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as web site or application takedown, to protect your brand value, trust, integrity, and reputation.

The Brand Protection module contains the following pages:

Dashboard

Displays a summary of typo-squatting domains, flash alerts and reports, rogue apps, phishing campaigns, and takedown requests. See Dashboard.

Domain Threats

Displays a list of typo-squatted domains and phishing URLs. You can initiate domain takedown or the suspension of monitoring. See Domain Threats.

Social Media Threats

Displays all discovered profiles that may be impersonating your organization's social media pages. You can filter profiles, initiate profile takedown, and export a Microsoft Excel file containing profile details. See Social Media Threats.

Rogue Mobile Apps

Displays all discovered apps that may be impersonating your organization's assets. You can filter apps, assign status, initiate app takedown, and export a Microsoft Excel file with app details. See Rogue Mobile Apps.

Executive Monitoring

Displays threats targeted at high-profile individuals of your organization. You can filter threats and add executive profiles for monitoring. See Executive Monitoring.

Code Repo Exposure

Displays a list of attributes exposed in code repositories. See Code Repo Exposure.

Open Bucket Exposure

Displays a list of files exposed in open buckets. See Open Bucket Exposure.

Take Down

Displays a list of takedown request tickets and their current status. See Take Down.

Brand Protection also includes Logo Monitoring feature which provides an additional method for identifying your brand on known phishing or malicious pages. This feature enhances the accuracy of identifying cases involving brand impersonation.

FortiRecon logo monitoring feature performs the following tasks:

  • Analyzes all active typo-squatted domains to determine whether they host pages containing your organization's logo or logos that are resembling. When such domains are identified, a Logo Detection tag is assigned to the domain.

  • Examines all domains and pages that are processed, which are obtained through phishing feeds to identify any instances where your organization might be impacted.

  • Inspects all pages that are identified through the detection of the FortiRecon watermark.

Brand Protection

Brand Protection

The Brand Protection (BP) module uses proprietary algorithms to detect common techniques used by cyber threat actors, such as web-based phishing attacks, typo-squatting, defacements, rogue apps, credential leaks, and brand impersonation in social media. You can use the Brand Protection module to detect activity early and take action, such as web site or application takedown, to protect your brand value, trust, integrity, and reputation.

The Brand Protection module contains the following pages:

Dashboard

Displays a summary of typo-squatting domains, flash alerts and reports, rogue apps, phishing campaigns, and takedown requests. See Dashboard.

Domain Threats

Displays a list of typo-squatted domains and phishing URLs. You can initiate domain takedown or the suspension of monitoring. See Domain Threats.

Social Media Threats

Displays all discovered profiles that may be impersonating your organization's social media pages. You can filter profiles, initiate profile takedown, and export a Microsoft Excel file containing profile details. See Social Media Threats.

Rogue Mobile Apps

Displays all discovered apps that may be impersonating your organization's assets. You can filter apps, assign status, initiate app takedown, and export a Microsoft Excel file with app details. See Rogue Mobile Apps.

Executive Monitoring

Displays threats targeted at high-profile individuals of your organization. You can filter threats and add executive profiles for monitoring. See Executive Monitoring.

Code Repo Exposure

Displays a list of attributes exposed in code repositories. See Code Repo Exposure.

Open Bucket Exposure

Displays a list of files exposed in open buckets. See Open Bucket Exposure.

Take Down

Displays a list of takedown request tickets and their current status. See Take Down.

Brand Protection also includes Logo Monitoring feature which provides an additional method for identifying your brand on known phishing or malicious pages. This feature enhances the accuracy of identifying cases involving brand impersonation.

FortiRecon logo monitoring feature performs the following tasks:

  • Analyzes all active typo-squatted domains to determine whether they host pages containing your organization's logo or logos that are resembling. When such domains are identified, a Logo Detection tag is assigned to the domain.

  • Examines all domains and pages that are processed, which are obtained through phishing feeds to identify any instances where your organization might be impacted.

  • Inspects all pages that are identified through the detection of the FortiRecon watermark.