|
| 1 | +# Domain Squatting Detection |
| 2 | + |
| 3 | +Domain squatting protection helps keep you safe from fake websites that try to trick you by using look-alike domain names. Attackers create these fake domains to steal your login credentials. |
| 4 | + |
| 5 | +## What is Domain Squatting? |
| 6 | + |
| 7 | +Domain squatting (sometimes called "typosquatting") is when attackers register website addresses that are intentionally similar to legitimate sites. For example: |
| 8 | + |
| 9 | +- `micros0ft.com` (using a zero instead of the letter O) |
| 10 | +- `microsоft.com` (using a Cyrillic "о" that looks like an English "o") |
| 11 | +- `login-microsoft.com` (adding extra words to a real domain) |
| 12 | + |
| 13 | +These fake sites often look exactly like the real Microsoft login page, but they're designed to capture your username and password. |
| 14 | + |
| 15 | +## How Check Protects You |
| 16 | + |
| 17 | +Check automatically watches for these fake domains using four smart detection methods: |
| 18 | + |
| 19 | +### 1. **Character Difference Detection** |
| 20 | +Spots domains where characters are changed, missing, or swapped around. |
| 21 | + |
| 22 | +**Examples Check catches:** |
| 23 | +- `microsft.com` → missing the letter "o" |
| 24 | +- `micorsoft.com` → letters swapped ("or" instead of "ro") |
| 25 | +- `microosoft.com` → extra letter added |
| 26 | + |
| 27 | +### 2. **Look-Alike Character Detection** |
| 28 | +Finds domains using special characters that look similar to normal letters. |
| 29 | + |
| 30 | +**Examples Check catches:** |
| 31 | +- `micrоsoft.com` → uses a Cyrillic "о" that looks like an English "o" |
| 32 | +- `microsоft.com` → mixes different alphabet characters |
| 33 | +- `micro𝐬oft.com` → uses special Unicode characters |
| 34 | + |
| 35 | +### 3. **Typing Mistake Detection** |
| 36 | +Identifies domains based on common typing errors and keyboard slip-ups. |
| 37 | + |
| 38 | +**Examples Check catches:** |
| 39 | +- `micrisoft.com` → finger slipped to nearby key |
| 40 | +- `microssoft.com` → double-typed a letter |
| 41 | +- `microosft.com` → typo mixing up letters |
| 42 | + |
| 43 | +### 4. **Suspicious Word Combination Detection** |
| 44 | +Spots domains that add words before or after legitimate domains to look more official. |
| 45 | + |
| 46 | +**Examples Check catches:** |
| 47 | +- `secure-microsoft.com` |
| 48 | +- `login-microsoft-verify.com` |
| 49 | +- `microsoft-auth.com` |
| 50 | +- `official-microsoft-support.com` |
| 51 | + |
| 52 | +Common suspicious words attackers use: `login`, `secure`, `verify`, `official`, `support`, `auth`, `signin`, `portal` |
| 53 | + |
| 54 | +## What Domains Are Protected? |
| 55 | + |
| 56 | +Check protects **30+ popular domains** by default, including: |
| 57 | + |
| 58 | +**Microsoft Services:** |
| 59 | +- microsoft.com, microsoftonline.com, office.com, outlook.com, onedrive.com, and more |
| 60 | + |
| 61 | +**Other Popular Services:** |
| 62 | +- google.com, github.com, facebook.com, amazon.com, apple.com, paypal.com, and more |
| 63 | + |
| 64 | +**Plus: Your URL Allowlist** |
| 65 | + |
| 66 | +{% hint style="info" %} |
| 67 | +**Unified Protection:** Check uses your [URL Allowlist](../settings/detection-rules.md#url-allowlist-regex-or-url-with-wildcards) for double protection. Any domains you add there are automatically protected from squatting attempts too! |
| 68 | + |
| 69 | +For example, if you add `https://yourcompany.com/*` to your allowlist, Check will also protect against fake domains like `yourcompany.net` or `your-company.com`. |
| 70 | +{% endhint %} |
| 71 | + |
| 72 | +## How It Works in Practice |
| 73 | + |
| 74 | +When you visit a website, Check automatically: |
| 75 | + |
| 76 | +1. **Checks** if the domain looks similar to any protected domain |
| 77 | +2. **Analyzes** using all four detection methods |
| 78 | +3. **Warns** you if it finds a suspicious match |
| 79 | +4. **Blocks** the page if it's clearly a phishing attempt |
| 80 | + |
| 81 | +You don't need to do anything - the protection works automatically in the background! |
| 82 | + |
| 83 | +## Configuration |
| 84 | + |
| 85 | +{% hint style="warning" %} |
| 86 | +**For most users**: Domain squatting detection works automatically with default settings. You don't need to change anything! |
| 87 | +{% endhint %} |
| 88 | + |
| 89 | +### Page Blocking Control |
| 90 | + |
| 91 | +Check has an **"Enable Page Blocking"** setting in the extension options that controls how suspicious pages are handled: |
| 92 | + |
| 93 | +- **Page Blocking Enabled** + **Action: "block"** = Page is completely blocked with full-page warning |
| 94 | +- **Page Blocking Enabled** + **Action: "warn"** = Warning banner shown, page remains accessible |
| 95 | +- **Page Blocking Disabled** = Warning banner shown regardless of action setting (never blocks) |
| 96 | + |
| 97 | +This gives you control over whether you want aggressive blocking or just warnings for suspicious domains. |
| 98 | + |
| 99 | +### For Advanced Users and IT Departments |
| 100 | + |
| 101 | +Domain squatting detection is configured in your detection rules file (not in the Settings UI). This follows the same pattern as other advanced security features like Rogue Apps Detection. |
| 102 | + |
| 103 | +#### How to Configure |
| 104 | + |
| 105 | +Edit your `rules/detection-rules.json` file to customize: |
| 106 | + |
| 107 | +**Enable/Disable Detection:** |
| 108 | +```json |
| 109 | +{ |
| 110 | + "domain_squatting": { |
| 111 | + "enabled": true, // Turn detection on/off |
| 112 | + "action": "block" // Action when detected: "block" or "warn" |
| 113 | + } |
| 114 | +} |
| 115 | +``` |
| 116 | + |
| 117 | +**Set Action Type:** |
| 118 | +```json |
| 119 | +{ |
| 120 | + "domain_squatting": { |
| 121 | + "action": "block" // "block" = full page block, "warn" = banner only |
| 122 | + } |
| 123 | +} |
| 124 | +``` |
| 125 | +Note: Page blocking also requires "Enable Page Blocking" to be turned ON in settings. |
| 126 | + |
| 127 | +**Adjust Sensitivity:** |
| 128 | + "enabled": true |
| 129 | + } |
| 130 | +} |
| 131 | +``` |
| 132 | +
|
| 133 | +**Adjust Sensitivity** (how strict the checking is): |
| 134 | +```json |
| 135 | +{ |
| 136 | + "domain_squatting": { |
| 137 | + "deviation_threshold": 2 |
| 138 | + } |
| 139 | +} |
| 140 | +``` |
| 141 | +- Lower numbers (1) = Very strict, catches fewer variations |
| 142 | +- Higher numbers (3-5) = More lenient, catches more variations |
| 143 | +- Default is 2 (recommended for most organizations) |
| 144 | + |
| 145 | +**Choose Detection Methods:** |
| 146 | +```json |
| 147 | +{ |
| 148 | + "domain_squatting": { |
| 149 | + "algorithms": { |
| 150 | + "levenshtein": true, |
| 151 | + "homoglyph": true, |
| 152 | + "typosquat": true, |
| 153 | + "combosquat": true |
| 154 | + } |
| 155 | + } |
| 156 | +} |
| 157 | +``` |
| 158 | + |
| 159 | +You can turn individual detection methods on/off. We recommend keeping all four enabled for maximum protection. |
| 160 | + |
| 161 | +## For MSPs and Enterprise IT |
| 162 | + |
| 163 | +### Enterprise Policy Management |
| 164 | + |
| 165 | +Domain squatting detection can be managed through Group Policy (GPO) or Microsoft Intune, just like other Check settings. |
| 166 | + |
| 167 | +**What You Can Control via Policy:** |
| 168 | +- Detection sensitivity (character difference threshold) |
| 169 | +- Which detection methods are active |
| 170 | +- Additional protected domains specific to your organization |
| 171 | + |
| 172 | +**What's in the Rules File:** |
| 173 | +- Enable/disable domain squatting detection |
| 174 | +- Default protected domains list |
| 175 | +- Detection rules and patterns |
| 176 | + |
| 177 | +This separation gives you flexibility - you control the core security settings through your detection rules file, while still allowing policy-based customization for different clients or departments. |
| 178 | + |
| 179 | +### Adding Organization-Specific Domains |
| 180 | + |
| 181 | +{% hint style="info" %} |
| 182 | +**Use the URL Allowlist!** |
| 183 | + |
| 184 | +The easiest way to protect your organization's domains is to add them to the URL Allowlist in Detection Rules settings. This automatically: |
| 185 | +1. Prevents false positives on your internal sites |
| 186 | +2. Protects those domains from squatting attempts |
| 187 | +3. Works without modifying detection rules files |
| 188 | +{% endhint %} |
| 189 | + |
| 190 | +**Example:** Adding `https://contoso.com/*` to your allowlist protects against fake domains like: |
| 191 | +- `cont0so.com` (zero instead of o) |
| 192 | +- `contos0.com` (zero at the end) |
| 193 | +- `login-contoso.com` (suspicious prefix) |
| 194 | + |
| 195 | +### CIPP Reporting and Webhooks |
| 196 | + |
| 197 | +Domain squatting detections are automatically reported through your existing Check monitoring: |
| 198 | + |
| 199 | +- **Activity Logs**: View all domain squatting warnings and blocks |
| 200 | +- **CIPP Integration**: Squatting detections appear in your CIPP logbook |
| 201 | +- **Webhooks**: Configure webhooks to receive `domain_squatting_detected` events |
| 202 | + |
| 203 | +See [General Settings](../settings/general.md) for configuring reporting and webhooks. |
| 204 | + |
| 205 | +## Troubleshooting |
| 206 | + |
| 207 | +### "Check blocked a legitimate site" |
| 208 | + |
| 209 | +If Check blocks a site you trust: |
| 210 | + |
| 211 | +1. **Add it to your URL Allowlist** in Detection Rules settings |
| 212 | +2. The site will be both allowed and protected from squatting |
| 213 | +3. Report the false positive to help improve Check |
| 214 | + |
| 215 | +### "A phishing site wasn't detected" |
| 216 | + |
| 217 | +Domain squatting detection works alongside Check's other phishing protections. If a site gets through: |
| 218 | + |
| 219 | +1. Use "Report False Negative" if you encounter a phishing site |
| 220 | +2. Check will update rules to catch it in the future |
| 221 | +3. Your report helps protect the entire community |
| 222 | + |
| 223 | +### "Settings are grayed out" |
| 224 | + |
| 225 | +If you can't see or change domain squatting settings, your IT department has configured these centrally. This is normal for managed deployments - contact your IT team if you need adjustments. |
| 226 | + |
| 227 | +## Related Documentation |
| 228 | + |
| 229 | +- [Detection Rules](../settings/detection-rules.md) - Configure your URL allowlist |
| 230 | +- [General Settings](../settings/general.md) - Set up reporting and webhooks |
| 231 | +- [Enterprise Deployment](../deployment/) - Deploy Check across your organization |
| 232 | +- [Creating Detection Rules](../advanced/creating-detection-rules.md) - Advanced rule customization |
0 commit comments