Email Link Protection and Decoder
The targeted attack protection link rewriting tool for CUIMC email has changed as of mid-July. The decoder form below will only work for rewritten links prior to this time.
Security features for CUIMC email accounts include Targeted Attack Protection (TAP). TAP automatically rewrites links found in incoming email messages in order to evaluate whether or not the linked content is malicious. As phishing and other targeted attacks become more sophisticated, TAP is a solution that meets the challenge and helps protect the CUIMC community and its resources.
How Does TAP Work?
TAP works by redirecting links that appear in email messages you receive. In most cases, this redirection will be completely unnoticeable to you. In some cases – including unformatted or “plaintext” email messages – you may see the rewritten link, which will begin with https:// urldefense.proofpoint.com.
Any clicks on the re-written link will first go through the security filter which can further detect malicious web pages. If the actual linked page is safe, you will reach the intended site; if not the page will be blocked and you will see a message explaining why.
If you need to retrieve the original, unaltered link, you can use the Decode a Link form below.
IMPORTANT: Intentionally visiting a website considered malicious by the security filter could lead to possible infection of the end-user workstation and lead to the compromise of the Medical Center.
Note that incoming messages may still be blocked by the CUIMC spam filter. TAP will only scan and modify links in messages that have not been blocked or quarantined.
If you feel that a site has been improperly blocked by TAP and would like to have it cleared for the CUIMC community, please contact 5-Help with pertinent information.
Be sure you are still reviewing any links before clicking on them. Targeted attacks are constantly evolving and may slip through security measures.
Use the form below to verify whether a link you received in an email message is valid, or is likely to be a phishing or malware installation attempt.
Copy the link from your CUIMC email message, paste it into the field below and click the Decode button.