Skip to content

Commit c72d65b

Browse files
KelvinTegelaargitbook-bot
authored andcommitted
GITBOOK-32: No subject
1 parent 25e0d20 commit c72d65b

File tree

3 files changed

+109
-0
lines changed

3 files changed

+109
-0
lines changed

docs/SUMMARY.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,8 @@
11
# Table of contents
22

33
* [About](README.md)
4+
5+
## Settings
6+
7+
* [General](settings/general.md)
8+
* [Detection Rules](settings/detection-rules.md)

docs/settings/detection-rules.md

Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
# Detection Rules
2+
3+
This section controls how Check recognizes and responds to phishing threats. Most users can leave these at default settings, but here's how to manage them.
4+
5+
#### Understanding How Detection Works
6+
7+
Check uses a constantly updated list of rules to identify fake Microsoft login pages. Think of it like antivirus definitions - they need to be kept current to protect against new threats.
8+
9+
### Detection Configuration
10+
11+
#### **For most users:**
12+
13+
1. Leave the "Config URL" field empty or at its default
14+
2. Set "Update Interval" to 24 hours
15+
3. Click "Save Settings"
16+
17+
#### **For organizations with custom security rules:**
18+
19+
{% hint style="warning" %}
20+
#### What if Settings are Grayed Out?
21+
22+
If some settings appear grayed out with a little lock icon, it means your organization's IT department has set these for you. This is normal in business environments - your IT team wants to make sure everyone has the same security settings.
23+
{% endhint %}
24+
25+
1. Enter your organization's custom rules URL (provided by IT)
26+
2. Set update interval based on your security requirements:
27+
* High security environments: 6-12 hours
28+
* Standard environments: 24 hours
29+
* Limited bandwidth: 48-72 hours
30+
31+
#### Updating Rules Manually
32+
33+
Sometimes you need to update rules immediately:
34+
35+
1. **When to do this:**
36+
* You've heard about a new phishing campaign
37+
* Check isn't detecting a threat it should
38+
* Your IT department asks you to update
39+
2. **How to do it:**
40+
* Go to Detection Rules section
41+
* Click "Update Rules Now"
42+
* Wait for the "Rules updated successfully" message
43+
44+
### Understanding the Configuration Overview
45+
46+
You'll see information about your current rules:
47+
48+
**In the formatted view, look for:**
49+
50+
* **Version number** - Higher numbers are newer
51+
* **Last Updated** - Should be recent (within your update interval)
52+
* **Total Rules** - More rules generally mean better protection
53+
54+
**If you see problems:**
55+
56+
* Very old "Last Updated" date → Click "Update Rules Now"
57+
* Version shows "Error loading" → Check your internet connection
58+
* No rules showing → Contact support
59+
60+
### Troubleshooting Rule Updates
61+
62+
#### **Problem: Rules won't update**
63+
64+
1. Check your internet connection
65+
2. Try clicking "Update Rules Now" again
66+
3. If using custom rules URL, verify the URL is correct
67+
4. Contact your IT department if the problem persists
68+
69+
#### **Problem: Extension seems slow after rule update**
70+
71+
1. Wait 5-10 minutes for the new rules to fully load
72+
2. Restart your browser
73+
3. If still slow, try updating rules again

docs/settings/general.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
description: This is where you control the main features of Check.
3+
---
4+
5+
# General
6+
7+
### Extension Settings
8+
9+
#### **Enable Page Blocking**
10+
11+
This is Check's main job - blocking dangerous websites. When this is turned on (which we recommend), Check will stop you from visiting fake Microsoft login pages and show you a warning instead, there are times you need to disable the checkbox for testing purposes. Removing this checkbox removes most of your protection so it's recommended to leave this setting enabled.
12+
13+
#### Enable CIPP Reporting
14+
15+
CIPP is a system that IT professionals use to monitor security across multiple organizations. Enabling the CIPP monitoring allows you to send the information from Check directly to CIPP, thus allowing you to alert and report on what's going on with your endpoints. When enabled, you would configure the CIPP Server URL and Tenant ID/Domain below.
16+
17+
### User Interface
18+
19+
#### **Show Notifications** 
20+
21+
When Check blocks a dangerous website or finds something suspicious, it can show you a small popup message to let you know what's going on. We recommend leaving this setting enabled
22+
23+
#### **Show Valid Page Badge**
24+
25+
This adds a small green checkmark to real Microsoft login pages. This feature is optional.
26+
27+
{% hint style="warning" %}
28+
#### What if Settings are Grayed Out?
29+
30+
If some settings appear grayed out with a little lock icon, it means your organization's IT department has set these for you. This is normal in business environments - your IT team wants to make sure everyone has the same security settings.
31+
{% endhint %}

0 commit comments

Comments
 (0)