support.jerichosecurity.com
Open in
urlscan Pro
2606:2c40::c73c:671d
Public Scan
URL:
https://support.jerichosecurity.com/
Submission: On October 11 via automatic, source certstream-suspicious — Scanned from DE
Submission: On October 11 via automatic, source certstream-suspicious — Scanned from DE
Form analysis
2 forms found in the DOMhttps://support.jerichosecurity.com/search
<form data-hs-do-not-collect="true" action="https://support.jerichosecurity.com/search" data-gtm-form-interact-id="0">
<input role="combobox" aria-expanded="false" aria-controls="autocomplete-results" type="search" class="form-control" id="search_results_page_search_field-input" name="q" autocomplete="off" placeholder="Search support">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="groupId" value="180516755819">
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4
<form id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/40243630/3efa93dc-01e2-44c4-b7fb-2bca23e30be4"
class="hs-form-private hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4 hs-form-3efa93dc-01e2-44c4-b7fb-2bca23e30be4_e6fcdcab-4ca0-4ac9-8df1-0a87a85803e5 hs-form stacked"
target="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-instance-id="e6fcdcab-4ca0-4ac9-8df1-0a87a85803e5" data-form-id="3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-portal-id="40243630"
data-test-id="hsForm_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" class="" placeholder="Enter your " for="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-3efa93dc-01e2-44c4-b7fb-2bca23e30be4" name="email" required="" placeholder="email@example.com*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1728628771953","formDefinitionUpdatedAt":"1725486676336","lang":"en","embedType":"REGULAR","renderRawHtml":"true","convertedFormId":"e48ddef5-e1a3-4397-b856-24271b78cf54","userAgent":"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36","pageTitle":"Jericho Security | Support","pageUrl":"https://support.jerichosecurity.com/","pageId":"180516755820","isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://support.jerichosecurity.com","contentType":"listing-page","hutk":"ca84a6827569174949071facadb4349f","__hsfp":90950173,"__hssc":"191383349.1.1728628772452","__hstc":"191383349.ca84a6827569174949071facadb4349f.1728628772452.1728628772452.1728628772452.1","formTarget":"#hbspt-form-e6fcdcab-4ca0-4ac9-8df1-0a87a85803e5","rumScriptExecuteTime":4878.199999809265,"rumTotalRequestTime":6248.199999809265,"rumTotalRenderTime":6263.599999427795,"rumServiceResponseTime":1370,"rumFormRenderTime":15.399999618530273,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1728628772643,"originalEmbedContext":{"portalId":"40243630","formId":"3efa93dc-01e2-44c4-b7fb-2bca23e30be4","region":"na1","target":"#hbspt-form-e6fcdcab-4ca0-4ac9-8df1-0a87a85803e5","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"e6fcdcab-4ca0-4ac9-8df1-0a87a85803e5","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.6227","sourceName":"forms-embed","sourceVersion":"1.6227","sourceVersionMajor":"1","sourceVersionMinor":"6227","allPageIds":{"analyticsPageId":"180516755820","contentPageId":180516755820,"contentAnalyticsPageId":"180516755820"},"_debug_embedLogLines":[{"clientTimestamp":1728628772626,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Jericho Security | Support\",\"pageUrl\":\"https://support.jerichosecurity.com/\",\"userAgent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36\",\"pageId\":\"180516755820\",\"contentAnalyticsPageId\":\"180516755820\",\"contentPageId\":180516755820,\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1728628772627,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1728628772630,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"ca84a6827569174949071facadb4349f\",\"canonicalUrl\":\"https://support.jerichosecurity.com\",\"contentType\":\"listing-page\",\"pageId\":\"180516755820\"}"}]}"><iframe
name="target_iframe_3efa93dc-01e2-44c4-b7fb-2bca23e30be4" style="display: none;"></iframe>
</form>
Text Content
* Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. PLATFORM CYBERSECURITY DASHBOARD Manage Your Security PHISHING SIMULATOR Train Your Employees PERFORMANCE ANALYTICS Gain Key Insights CUSTOMIZED TRAINING Tailored to Your Organization SOLUTIONS CYBERSECURITY AWARENESS TRAINING Train Your Team ANTI-PHISHING TRAINING Protect Your Business ENTERPRISE CYBERSECURITY TRAINING Defend Against Threats SMB CYBERSECURITY TRAINING Empower Your Team INDUSTRIES RETAIL Keep retail threats away E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent sensitive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure sensitive information MANUFACTURING Keep your operation running ENERGY Prevent the next breach FEDERAL GOVERNMENT Prevent largescale attacks STATE & LOCAL GOVERNMENT Protect local officials HIGHER EDUCATION Keep staff & students safe * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines LITERATURE White papers & solution briefs CASE STUDIES Jericho success stories EVENTS Upcoming security events WEBINARS Upcoming & On-Demand COMMUNITY SPOTLIGHT To recognize and appreciate CYBERSECURITY GLOSSARY Cyber-Related Definitions SUPPORT Advice and Answers View All Resources * Partners * Blog * Sign In * Book Demo Sign In Book Demo * Solutions SEE HOW JERICHO SECURITY CAN HELP KEEP YOUR TEAM SAFE. We equip individuals with the knowledge and skills needed to identify, prevent, and respond to cyber threats. PLATFORM CYBERSECURITY DASHBOARD Manage Your Security PHISHING SIMULATOR Train Your Employees PERFORMANCE ANALYTICS Gain Key Insights CUSTOMIZED TRAINING Tailored to Your Organization SOLUTIONS CYBERSECURITY AWARENESS TRAINING Train Your Team ANTI-PHISHING TRAINING Protect Your Business ENTERPRISE CYBERSECURITY TRAINING Defend Against Threats SMB CYBERSECURITY TRAINING Empower Your Team INDUSTRIES RETAIL Keep retail threats away E-COMMERCE Protect your E-Com Business TECHNOLOGY Prevent sensitive breaches FINANCIAL SERVICES Safeguard your assets HEALTHCARE Secure sensitive information MANUFACTURING Keep your operation running ENERGY Prevent the next breach FEDERAL GOVERNMENT Prevent largescale attacks STATE & LOCAL GOVERNMENT Protect local officials HIGHER EDUCATION Keep staff & students safe * Why Jericho WHY CHOOSE JERICHO SECURITY? See what makes Jericho Security stand out from the rest. ABOUT US About our mission CUSTOMERS What customers say * Resources JERICHO SECURITY RESOURCES HUB. Find everything you need to defend against emerging Generative AI threats. NEWS Latest news headlines LITERATURE White papers & solution briefs CASE STUDIES Jericho success stories EVENTS Upcoming security events WEBINARS Upcoming & On-Demand COMMUNITY SPOTLIGHT To recognize and appreciate CYBERSECURITY GLOSSARY Cyber-Related Definitions SUPPORT Advice and Answers View All Resources * Partners * Blog * Sign In * Book Demo Sign In Book Demo JERICHO SECURITY HELP CENTER Advice and answers from the Jericho Security Team SSO Azure AZURE ENTRA ID SINGLE SIGN ON (SSO) Setting up Single Sign On (SSO) for Jericho Security Administrator users via Azure Entra ID SAML 2.0 Navigate to https://portal.azure.com/#home Click "View" on "Mana... Jericho Security Contributor October 8, 2024 Barracuda Whitelisting WHITELISTING FOR BARRACUDA EMAIL GATEWAY DEFENSE (A.K.A EMAIL SECURITY SERVICE) IP Address Whitelisting Configure exempt/trusted IP addresses at the Inbound Settings > IP Address Policies page in Email Gateway Defense. IP addresses to exempt:... Jericho Security Contributor October 8, 2024 Okta OKTA DIRECTORY INTEGRATION Directory Integration with Okta User Provisioning via SCIM 2.0 The following steps configure your Okta User Directory to send user information to Jericho Security so... Jericho Security Contributor October 8, 2024 SSO Okta OKTA SINGLE SIGN ON (SSO) Setting up Single Sign On (SSO) for Jericho Security Administrator users via Okta SAML 2.0 Log into your Okta instance with administrator permissions. Click on the "... Jericho Security Contributor October 8, 2024 Phishing CREATING A PHISHING CAMPAIGN Create an Email Phishing simulation in under 2 minutes! Jericho Security Contributor October 8, 2024 Azure AZURE ENTRA ID DIRECTORY INTEGRATION Directory Integration with Azure Entra ID User Provisioning via SCIM 2.0 The following steps configure your Azure Entra ID (formerly Active Directory) to send user i... Jericho Security Contributor October 8, 2024 Proofpoint Whitelisting WHITELISTING FOR PROOFPOINT To set up a filter to safelist an address: Navigate to Security Settings > Email > Filter Policies. While on the Inbound tab, click New Filter. Choose a name f... Jericho Security Contributor October 8, 2024 O365 Whitelisting O365 WHITELISTING To allow entries in the Tenant Allow List Send the simulated phishing email. This will cause O365 to initially block the message. Navigate to the Emails tab on the S... Jericho Security Contributor October 8, 2024 CATEGORIES * Whitelisting (3) * Azure (2) * Okta (2) * SSO (2) * Barracuda (1) * O365 (1) * Phishing (1) * Proofpoint (1) SUBSCRIBE TO OUR NEWSLETTER Get the latest updates on phishing trends and generative AI. Subscribe POPULAR SUPPORT ARTICLES October 8, 2024 AZURE ENTRA ID SINGLE SIGN ON (SSO) October 8, 2024 WHITELISTING FOR BARRACUDA EMAIL GATEWAY DEFENSE (A.K.A EMAIL SECURITY SERVICE) October 8, 2024 OKTA DIRECTORY INTEGRATION AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES. AI-POWERED CYBER SECURITY TRAINING FOR EMPLOYEES. PAGES * About Us * Partners * Customers * Resources * Get a Demo RESOURCES * Careers * Sign In * Privacy Policy * Terms of Service Copyright © 2024 Jericho Security, Inc.