Network reputation (user override)
The Network Reputation User Override service enables URL classification overrides. Any URL can be overridden to malicious, suspicious, or known. Overrides are visible to all users within the same organization. The service also supports listing existing overrides.
URL User Override Query
This query sends network data to be overridden, and returns a list of network locations that were successfully overridden along with a list of invalid network locations and a list of network locations for which the override was successfully removed. All the parameters must be passed in the request body (either as JSON or XML).
Request
POST /api/networking/user_override/v1/query/{post_format}
post_format
- allows choosing between XML and JSON format in the POST payload
Request body:
{
"rl": {
"query": {
"user_override": {
"override_network_locations": [
{
"network_location": "string",
"type": "string",
"TTL": "string",
"classification": "string",
"threat_level": "string",
"categories": [
"string"
]
}
],
"remove_overrides": [
{
"network_location": "string",
"type": "string"
}
]
},
"response_format": "string"
}
}
}
override_network_locations
- List of network locations that the user wants to override
- Optional
network_location
- Network location that the user wants to override.
- Required
type
- Type of URI that was listed in the
network_location
parameter. Supported types:url
. - Required
- Type of URI that was listed in the
TTL
- Specifies the duration (in seconds) for which an override is valid. It defines the lifespan of the override before it expires and needs to be reassessed or renewed. In case the TTL is not set, there will be no expiration.
- Optional
classification
- Classification assigned to the URI in
network_location
. Allowed types correspond to the ReversingLabs classification scheme:malicious
,suspicious
,known
,unknown
. - Required
- Classification assigned to the URI in
threat_level
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
0
. If the value is not set, the default value is0
. For suspicious and malicious URIs, the allowed values are1
,2
,3
,4
, or5
. If the value is not set, the default value is5
. For unknown URIs, setting the value is not allowed, and the value will default toNone
. - Optional
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
categories
- List of categories that the URI in question belongs to. List items are strings. The strings are arbitrary values.
- Optional
remove_overrides
- List of network locations that the user wants to remove overrides from. Items in this list are objects. An object must contain two fields:
network_location
andtype
. These fields take in the same types of values as their equivalents in theoverride_network_locations
parameter. - Optional
- List of network locations that the user wants to remove overrides from. Items in this list are objects. An object must contain two fields:
response_format
- Allows choosing between XML and JSON format for the response. Default is
xml
. - Optional
- Allows choosing between XML and JSON format for the response. Default is
The request body of the query must contain the override_network_locations
field or the remove_overrides
field or both.
Response
{
"rl": {
"user_override": {
"created_overrides": [],
"removed_overrides": []
}
}
}
rl.user_override.created_overrides[]
and rl.user_override.removed_overrides[]
{
"network_location": "string",
"type": "string",
"ttl": 0,
"classification": "string",
"categories": [
"string"
],
"reason": "string",
"threat_level": 0
}
created_overrides
- List of network locations for which overrides were created.
network_location
- The overridden URI.
type
- Type of URI that was listed in the
network_location
parameter.
- Type of URI that was listed in the
TTL
- Duration (in seconds) specified by the user for which an override is valid. It defines the lifespan of the override before it expires and needs to be reassessed or renewed. In case the TTL is not set, there will be no expiration.
classification
- Classification that the user listed in the request.
threat_level
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
0
. If the value is not set, the default value is0
. For suspicious and malicious URIs, the allowed values are1
,2
,3
,4
, or5
. If the value is not set, the default value is5
. For unknown URIs, setting the value is not allowed, and the value will default toNone
.
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
categories
- List of categories that the requested URI belongs to.
removed_overrides
- List of network locations from which overrides were removed, along with their type.
invalid_network_locations
- List of invalid network locations.
List User URL Overrides Query
This query returns the list of overrides that the user has made.
Request
GET /api/networking/user_override/v1/query/list_overrides?[format=xml|json]&next_network_location={next page SHA1}
Query parameters:
- next_network_location: SHA1 hash of the next network location in the response. In case the response has reached the maximum number of entries for a single response (1000), paging is used.
- format: response format (JSON/XML)
Response format
{
"rl": {
"user_override": {
"next_network_location": "string",
"network_locations": []
}
}
}
rl.user_override.network_locations[]
{
"network_location": "string",
"type": "string",
"classification": "string"
}
network_location
- Network location (URI) that is overridden.
type
- Type of network location. Currently, only URLs are supported.
classification
- Classification assigned to the URI in
network_location
. Allowed types correspond to the ReversingLabs classification scheme:malicious
,suspicious
,known
,unknown
.
- Classification assigned to the URI in
expiration_time
- The specific time and date when the override will expire, calculated based on the TTL value provided. If the TTL is not set, the expiration_time will indicate no expiration.
threat_level
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
0
. If the value is not set, the default value is0
. For suspicious and malicious URIs, the allowed values are1
,2
,3
,4
, or5
. If the value is not set, the default value is5
. For unknown URIs, setting the value is not allowed, and the value will default toNone
.
- Malware severity indicator for suspicious and malicious URIs, expressed as an integer between 0 and 5, where 5 indicates the most dangerous threats (highest severity). In case the value is not set, default values will be assigned based on the classification of the URI. For known URIs, the allowed value is
Examples
Example 1
This request assigns an override to two network locations, and removes an existing override from a third network location. One of the new overrides is invalid.
Request:
/api/networking/user_override/v1/query/json
{
"rl": {
"query": {
"user_override": {
"override_network_locations": [
{
"network_location": "https://location-example.com",
"type": "url",
"classification": "malicious",
"categories": [
"phishing"
]
},
{
"network_location": "http://test.com",
"type": "url",
"classification": "suspicious"
}
],
"remove_overrides": [
{
"network_location": "https://example.com",
"type": "url"
}
]
},
"response_format": "json"
}
}
}
Response:
{
"rl": {
"user_override": {
"created_overrides": [
{
"network_location": "https://location-example.com",
"type": "url",
"classification": "malicious",
"categories": [
"phishing"
]
}
],
"removed_overrides": [
{
"network_location": "https://example.com",
"type": "url"
}
],
"invalid_network_locations": [
"http://test.com"
]
}
}
}
Example 2
This request returns a list of overrides by the user.
Request:
/api/networking/user_override/v1/query/list_overrides?format=json
Response:
{
"rl": {
"user_override": {
"network_locations": [
{
"network_location": "https://location-example.com",
"type": "url",
"classification": "malicious"
}
],
"next_network_location": "9865c7ecda437034e1513cc43ae9a1f6f334bb7f"
}
}
}
Example 3
This request returns a list of overrides by the user, in paginated form.
Request:
/api/networking/user_override/v1/query/list_overrides?next_network_location=9865c7ecda437034e1513cc43ae9a1f6f334bb7f&format=json
Response:
{
"rl": {
"user_override": {
"network_locations": [
{
"network_location": "https://location-example.com",
"type": "url",
"classification": "malicious"
}
],
"next_network_location": null
}
}
}