General
This is where you control the main features of Check.
Extension Settings
Enable Page Blocking
This is Check's main job - blocking dangerous websites. When this is turned on (which we recommend), Check will stop you from visiting fake Microsoft login pages and show you a warning instead. There are times you need to disable the checkbox for testing purposes. Removing this checkbox removes most of your protection so it's recommended to leave this setting enabled.
Enable CIPP Reporting
CIPP is a system that IT professionals use to monitor security across multiple organizations. Enabling CIPP monitoring allows you to send detection information from Check directly to CIPP, thus allowing you to alert and report on what's happening with your endpoints. When enabled, you would configure the CIPP Server URL and Tenant ID/Domain below.
View CIPP reporting activity in the Activity Logs section.
CIPP Server URL
Enter the base URL of your CIPP server for reporting Microsoft 365 logon detections. This should be the full URL to your CIPP instance (e.g., https://your-cipp-server.com). This field is only active when CIPP Reporting is enabled.
Tenant ID/Domain
Enter your tenant identifier to include with CIPP alerts for multi-tenant environments. You can use either your tenant GUID or your primary domain (e.g., contoso.onmicrosoft.com or the tenant GUID). This helps CIPP identify which tenant the alert belongs to when managing multiple clients.
False Positive Webhook URL
This setting allows you to configure a webhook endpoint that receives false positive reports from users. When configured, a "Report False Positive" button will appear on blocked pages, allowing users to report when Check has incorrectly blocked a legitimate website.
Enter the full URL to your webhook endpoint (e.g., https://your-server.com/api/false-positive). When a user clicks the "Report False Positive" button, Check will send a POST request with comprehensive detection data to help you review and improve your detection rules.
Webhook Payload Structure
Your webhook endpoint will receive a POST request with Content-Type: application/json containing the following fields:
timestamp
string
ISO 8601 timestamp when the report was submitted
reportType
string
Always "false_positive"
blockedUrl
string
The defanged URL that was blocked (colons replaced with [:])
blockReason
string
User-facing explanation for why the page was blocked
userAgent
string
Complete browser user agent string
browserInfo
object
Browser environment details (see below)
screenResolution
object
Display information (see below)
detectionDetails
object
Complete detection data (see below)
extensionVersion
string
Version of Check that generated the report
browserInfo object:
platform- Operating system (e.g., "Linux x86_64", "Win32", "MacIntel")language- Browser language setting (e.g., "en-US")vendor- Browser vendor (e.g., "Google Inc.")cookiesEnabled- Boolean indicating if cookies are enabledonLine- Boolean indicating network connectivity status
screenResolution object:
width- Screen width in pixelsheight- Screen height in pixelsavailWidth- Available screen width (excluding taskbars)availHeight- Available screen height (excluding taskbars)colorDepth- Color depth in bits (e.g., 24)
detectionDetails object:
url- Original URL (non-defanged)score- Legitimacy score assigned by detection enginethreshold- Threshold value that triggered the blockreason- Detailed technical reason for blockingpageTitle- Title of the blocked pagetimestamp- When the page was blockedthreats- Array of threat objects withid,type,description, andseverityphishingIndicators- Array of specific indicators that triggered detectionAdditional fields depending on detection method used
Complete Payload Example
Webhook Requirements
Your webhook endpoint should:
Accept POST requests with
Content-Type: application/jsonRespond with HTTP status codes:
200 OK- Report successfully received4xx- Client error (user will see error message)5xx- Server error (user will see error message)
Respond within 30 seconds to avoid timeout
Use HTTPS to protect sensitive detection data in transit
User Interface
Show Notifications
When Check blocks a dangerous website or finds something suspicious, it can show you a small popup message to let you know what's going on. We recommend leaving this setting enabled
Show Valid Page Badge
This adds a small green checkmark to real Microsoft login pages. This feature is optional.
Valid Page Badge Timeout
This setting controls how long the "Verified Microsoft Domain" badge stays visible on legitimate Microsoft login pages before automatically dismissing.
Set to 0: Badge stays visible until you manually dismiss it (no timeout)
Set to 1-300 seconds: Badge automatically disappears after the specified number of seconds
Default: 5 seconds
This allows you to customize the badge experience based on your preferences. If you want to see the badge every time you visit a Microsoft login page, set it to 0. If you prefer it to disappear quickly, use a smaller number like 3-5 seconds.
What if Settings Are Not Visible?
If some settings do not appear on my version, it means your organization's IT department has set these for you. This is normal in business environments - your IT team wants to make sure everyone has the same security settings. You will also see text indicating that the extension is being managed by policy.
Last updated