Best Of
Add software to patch management
Is it possible to suggest software for inclusion in the patch management system?
In our case, we use NetExtender (already part of patch management system) and the Banyan desktop Client from SonicWall (not part of patch management system).
Sorry if i missed any official way to do it.
Regards
Pepper
Re: Add software to patch management
Hi @Pepper
In your situation, we advise you to submit the request via our product idea as you can find more information here or you can reach our support team here: https://www2.withsecure.com/en/support/contact-support/email-support
🏆 Our Community has been nominated for two industry awards!
The WithSecure Community is a finalist for Customer Support Community of the Year at the global CMX Community Industry Awards.
And on a personal note, I’ve been nominated for B2B Community Professional of the Year.
📅 Voting is now open—and we’d love your support in both categories:
👉 Vote here: cmxhub.com/awards
Voting closes on January 9, 2026.
These awards celebrate excellence in building and supporting communities worldwide. Your vote helps us showcase the strength of our cybersecurity community! 💙
Re: Unsafe URL Detection
Hi @dvsken1976
Thanks for reaching our the WithSecure community and raising your question about the "Unsafe URL Detections" you’re seeing in Elements Collaboration Protection and how your policy handles them. Here’s a simplified overview to help you understand and manage these settings:
1. Policy Settings Overview: Your policy includes two Exchange URL Scanning options: Malicious URL and Suspicious URL, both currently set to Move item into quarantine.
- Quarantine (Recommended): This is the safest option. Quarantined items are stored securely and cannot cause harm, and you can review and release them if needed. Choosing Delete item would remove the email permanently.
- Alternative for Suspicious URLs: For URLs that might be risky but aren’t confirmed malware, some admins use Modify the subject instead. This delivers the email to the user but adds a warning (like "Malicious URL content") to the subject line.
2. Viewing the Specific Detection Type: If a notification just says "harmful URL," you can check the portal for the exact classification:
- Go to the Detections page in the Collaboration Protection portal.
- Filter by Type of threat.
- You’ll see it categorized as either Harmful (confirmed malware) or Suspicious.
- Admin notifications also include a variable (
$URL-THREAT) showing the exact reason the URL was flagged.
3. Extra Tips & Best Practices
- Trusted and Blocked Websites: Improve scanning accuracy by configuring sites:
- Trusted websites are skipped in scanning.
- Blocked websites are explicitly blocked (and take priority over trusted ones).
- Reporting False Positives: If a URL looks incorrectly flagged, you can report it to the WithSecure Tactical Defense team from the detection details page for review.
Hope this helps! If you run into any trouble adjusting these settings or reviewing quarantined items, feel free to ask here.
Best regards,
Sethu
Community Moderator | Technical Support Engineer, WithSecure
Re: How to work rational with the ESC?
Thanks for starting this discussion and for clearly outlining where the current Elements Security Center workflow is creating extra steps for you. Feedback like this is important, and I appreciate you taking the time to share specific examples.
I’ll escalate this internally to our Product and UX teams so they can review the navigation behavior you highlighted.
For any feature requests or improvement suggestions, please note that all product enhancements are reviewed exclusively through our ideation process. You can submit them directly here:
We rely on community votes to understand which improvements matter most and to help the product team prioritize what to develop first. You’re also welcome to add your own votes to any existing ideas that already cover the improvements you’re looking for — every vote helps shape the roadmap.
Thanks again for the constructive feedback!
How to Allow System Extension, Driver Extension & Network Extension using MDM profile?
Hello
Is there any workaround to auto-approve the System Extension, Driver Extension & Network Extension without user interaction on macOS?
I'm currently using JumpCloud as my Device Management Solution.
I have done creating the policy for extension, however it appears that require to allow manually and what I need to fill in the details for Network Extension.



