CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
 

This article applies to:

  • SEG Cloud  

Question:

  • How do I report spam and false positives to Trustwave? 
  • How do I report threat URLs to Trustwave?

Reply:

There are a number of ways to report spam and false positives in SEG Cloud:

False Positives

False positives are valid messages that were quarantined as spam.

  • (Preferred) In Customer Console > Mail History, search for the email in question and open it in Message Viewer. Use the "Not Spam" button to report false positives.
  • Alternatively, send the email to NotSpam@trustwave.com. Make sure the header info stays intact. This is best done by sending the email in question as an attachment of a new email.
    • Do not use "Forward" to send the email.

Missed Spam

  • Organizations that use Office 365 can easily deploy the Trustwave Spam Reporter Outlook plug-in for users. This plug-in allows users to report missed spam with one click. For details, see article Q21067.
  • Another option is to send the email to Spam@trustwave.com. Make sure the header info stays intact. This is best done by sending the email in question as an attachment of a new email.
    • Do not use "Forward" to send the email.

Blended Threat (Link Validator) URL reporting

Blended Threats protection is an additional option available in SEG Cloud.

You can report false positives from the Blended Threat (BTM) Link Validator, or threat URLs that you think should be blocked by BTM.

Notes:

  • Submissions are subject to automated and manual processes to improve accuracy of detection.
  • All submissions are considered and help to improve future detection. Trustwave cannot provide a personalized response to each submission. Trustwave does not guarantee filtering of any particular submitted message.
  • Spam is defined as unsolicited commercial mail.
    • Unwanted, but previously solicited, newsletters, marketing messages, mailing lists or auto-notifications are not considered spam and will not be filtered.

Trustwave MailMarshal Cloud KB article Q20205

Last Modified: October 15, 2020

 Turn On Turn Off Highlight