Workplace from Meta is going away. You will be able to continue using Workplace until August 31, 2025. Visit our Help Center to find out more.
English (US)
Log in
Startpagina
Startpagina
TECHNICAL RESOURCES CENTER
Get help with setting up Workplace, managing domains and other technical issues.
Mastering Workplace Features
Ready to become a Workplace pro? Learn all the ins-and-outs of our key features with in-depth guides, step-by-step user instructions and resource hubs.
Technical Resources
You don't have to be an IT genius to launch Workplace, but if you are then these technical resources are for you.
Help Center
Find step-by-step instructions and answers to frequently asked questions.
Support
Still can't find what you're looking for? Get in touch with a team of experts for more hands-on support.
What's New in Workplace
Stay up to speed with all the latest Workplace innovations, feature announcements and product updates.
Set up Guides
From adding a domain to inviting users, follow this step-by-step guide to set up your Workplace.
Domain Management
Find out why domain management matters - and how to do it properly.
Workplace Integrations
Discover how to bring all your tools together. Something missing? Learn how to build your own integrations.
Account Management
Keep your Workplace up to date by creating, maintaining or deactivating user accounts.
Authentication
Make sure you only give access to the right people by integrating with your current identity solutions.
IT Configuration
Learn how to keep Workplace running smoothly with info on networks, email whitelisting and domains.
Account Lifecycle
Understand the process of inviting members of your organization to claim their accounts.
Security and Governance
Get the lowdown on how we keep your people and information safe on Workplace with added technical terminology.
Workplace API
Learn how you can automate and integrate your custom solutions with Workplace using our API.
Getting started
From launching Workplace to paying for it, learn more about those crucial first steps.
Using Workplace
This is where we reveal the hidden depths Workplace has to offer with tips and info on key features.
Managing Workplace
Got a specific question about managing content, data or employees? This is the place to ask it.
IT and Developer Support
Looking for answers to more technical questions about security, integration and the like? Start here.
Support
Still can't find what you're looking for? Get in touch with a team of experts for more hands-on support.
Get in touch
Need help with your Workplace account? Fill out this form to get all the answers you need from our customer support.

Security and Governance > Malicious Content Detection

Understand how your organization can control and protect your accounts.

Overview

Overview

It may happen that users inadvertently share or post bad files or links into Workplace. We are uniquely placed, as a SaaS vendor, to protect users against being exploited by all manner of phishing and social engineering attacks. As a core part of maintaining the security of information on Workplace, we implemented controls to mitigate this risk.

  • Every time a user clicks on a link in Workplace that request will be routed through our systems, which check in real time if the site is dangerous. If the site is found to be dangerous, the system will interrupt the request and notify the user.
  • Similarly, files uploaded to Workplace will subject to deep inspection by multiple integrity systems and blocked if they are identified as malicious.
  • Workplace also has limits to prevent abuse of our features and to protect people on your community from spam and harassment.
?
Although we offer these security measures, it is still the responsibility of a Workplace community to control the data that it creates.
Link Protection

Link Protection

Being able to run a check at click time (i.e. when a user clicks on a link) enables us to have more sophisticated classification than what we have at display time (i.e. when the link is displayed). In addition to our own internal list and integration with external blacklists, we use advanced machine learning classifiers to check the authenticity of the sender along with a slew of other inputs.

The link protection service also allows us to protect users who consume content via email. If we relied on display-time filtering or other means alone, we would not be able to retroactively block any malicious URLs that had been sent over email. To help defend against this threat, all links to non-Workplace URLs in email are rewritten to first go through the link protection system. By building our system to use click-time checks, users clicking links in their notification emails will still be prevented from seeing malicious or spam contents.

Malware Scanning

Malware Scanning

As Facebook has grown, our need to regulate the content put onto the platform has also grown. Over the years, Facebook has implemented numerous automated policies to try and ensure that our platform is safe for our users and that we do everything we can to prevent bad actors from using the platform.

Workplace inherits a number of these automated policies, to the benefit of us and our users. One of these policies is the detection and flagging of malware. If we detect malware being uploaded by a user, we will inform the user and create a security log for an admin.

We scan files using our anti-virus/anti-malware scanning service and check our repository for any files which we believe to be malicious. In order to better protect users of Workplace, it's useful to keep track of the bad actors. The data describing bad actors and their attack vectors is commonly referred to as threat intelligence, which comes from an industry exchange of malware signatures. At Facebook and Workplace, we collect, store, and rely on our threat intelligence systems to improve the security of our services.

Check Malware Uploads reports

To see how many malware uploads have been blocked:

1
Go to the Admin Panel.

2
Click Security.

3
Go to the Dashboard tab to view a summary of Malware Uploads Blocked.

4
Click on View to check the related Security Logs.