This Torq workflow template helps safeguard businesses by monitoring mailbox folders for phishing threats. Once an IMAP trigger detects new emails in a specific folder, the workflow extracts URLs and attachments, analyzing them with VirusTotal. Results indicating whether content is safe or potentially malicious are then communicated via email and a designated Slack channel. This proactive approach ensures early threat detection, keeping organizational communication channels secure.
Trigger
IMAP
Use Cases
Phishing
Workflow Breakdown
- Setup IMAP trigger to retrieve emails in a specific folder 
- Get all URLs included in the email and make them unique 
- Scan all URLs and attachments(under 32MB) in the email with VirusTotal 
- Send an email response back the user and Slack channel on results of the scan 
Vendors
Slack, Utils, VirusTotal, Email
Workflow Output
Success/Failure via Email/Slack
Tips
Setup IMAP trigger based on the Torq Documentation at https://docs.torq.io/how-to-guides/use-an-imap-trigger
