We get large amount of high severity threat alarm when users visit Yahoo, they were triggered by this url s.yimg.com/aaq/yc/js/tdv2-applet-canvass.8739955d2bd825cb0aa2.min.js ( 8739955d2bd825cb0aa2 is a random string that changes everytime ). I would like to setup an exception for s.yimg.com, but its ip always changes too and you can only exclude static ip address. What would be the best way to fix this?
Yes, it requires a seperate policy above the one that is blocking this. Also requires you to create a new vulnerabiolity profile and 'exempt' this vulnerability. Then in your policy you just make sure to assign the vulnerability profile with the exempting and the URL as a catagory.
Hope that helps.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!