Abuse notification process for Virus content

Abuse notification process for Virus content

E2E Networks team works around the clock to address complaints of abuse on our network. We receive these complaints via feedback loops from spam blacklisting services and various industry contacts. The typical process followed when we detect Virus content on your server is:
Step 1: Creation of a ticket
We create a ticket to the authorized contact as soon as we discover and ascertain the Virus Content. The email contains the nature of the abuse and request to check the issue at your end. If there are any identifiable security vulnerabilities, we will include the remedial measures as well. We would ask you to respond to us with the corrective measures you have taken to address the issue.
Step 2: Inform over phone
We would ideally expect the authorized contact to respond within 1 hour to our ticket. In case of lack of response within the given timeline, we would call the authorized contact to inform the issue. The resolution time for such issues is 4 working hours ( 9.00 am to 6.00 pm ). For example, if an abuse ticket for Virus content is raised at 5.00 am, the resolution timeline would start from 9.00 am and end by 1.00 pm. On receiving the response from the authorized contact within 1 hour of creating the ticket, we would proceed with the following steps,
  • In case you take action on the abuse yourself, we would require written confirmation on the steps you have taken along with the root cause analysis, to stop further actions from our side.
  • If you would like us to resolve the issue, we would charge your account for support tokens as required.
Step 3: Take necessary actions
In lack of response to our phone call for another 3 hours, it would be required by us to switch off the machines to prevent malicious activities on your server. Once we are sure the server is clean, we will bring back it up again.
Important notes
Please keep your authorized contact details updated to avoid any miscommunications by sending an email to support@e2enetworks.com, whenever there is a change or an anomaly is discovered in contact details. We understand getting an abuse ticket is a hassle, but please remember that we’re doing our best to protect our network, the Internet community and you. Switching off your server is a last resort for us, and we want to make sure everyone is on the same page to prevent us from getting to that last resort. In the unfortunate event that you do experience an abuse issue, please follow the instructions on this communication and it will save you from unnecessary downtimes and complicated procedures to bring back the site/server.
    • Related Articles

    • Abuse notification process for spamming

      Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email from your server. E2E Networks team works around the clock to address complaints of abuse on our network. We receive these complaints via ...
    • Abuse notification process for phishing

      Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. E2E Networks ...
    • Abuse notification process for Outbound attacks

      E2E Networks team works around the clock to address complaints of abuse on our network. We receive these complaints via feedback loops from various industry contacts. The typical process followed when we detect an outbound attack from your server is: ...
    • Abuse notification process for High Bandwidth Usage

      You may receive an email from E2E Networks, if your account’s bandwidth usage far exceeds average bandwidth usage on the server. If an unintentional high usage of bandwidth is spotted, it might be a problem and needs to be curbed at its very ...
    • How Abuse notification process works in E2E Networks?

      E2E Networks team works around the clock to address complaints of abuse on our network. We receive these complaints via feedback loops from other providers, spam blacklisting services, various industry contacts and mailing lists as well as from our ...