avanan.com
robots.txt

Robots Exclusion Standard data for avanan.com

Resource Scan

Scan Details

Site Domain avanan.com
Base Domain avanan.com
Scan Status Ok
Last Scan2025-07-18T20:33:49+00:00
Next Scan 2025-08-17T20:33:49+00:00

Last Scan

Scanned2025-07-18T20:33:49+00:00
URL https://avanan.com/robots.txt
Redirect https://emailsecurity.checkpoint.com/robots.txt
Redirect Domain emailsecurity.checkpoint.com
Redirect Base checkpoint.com
Domain IPs 199.60.103.179, 199.60.103.79
Redirect IPs 199.60.103.2, 199.60.103.254, 2606:2c40::c73c:6702, 2606:2c40::c73c:67fe
Response IP 199.60.103.254
Found Yes
Hash 687d8ee83a1212a18f3bcd1a864182d1079f3e22fa23d968ad680439fe4c439d
SimHash 26abecedf135

Groups

*

Rule Path
Disallow /hubfs/docs/
Disallow /hubfs/Avanan_Check_Point_Cheat_Sheet_9-9.docx
Disallow /hubfs/AvananCheckPointSKUs.pdf
Disallow /hubfs/Sales%20Materials/Security%20Briefs/Avanan%20for%20Anti-Phishing.pdf
Disallow /hubfs/Sales%20Materials/Security%20Briefs/Avanan%20for%20DLP.pdf
Disallow /hubfs/Sales%20Materials/Overviews/Avanan%20One%20Pager%20%28Overview%29.pdf
Disallow /hubfs/Sales%20Materials/Technical%20Overviews/Avanan%20for%20G%20Suite.pdf
Disallow /hubfs/Sales%20Materials/Technical%20Overviews/Avanan%20for%20Office%20365.pdf
Disallow /hubfs/Sales%20Materials/Solution%20Briefs/Servicenow%20Solution%20Brief.pdf
Disallow /hubfs/Sales%20Materials/Solution%20Briefs/AWS%20Solution%20Brief.pdf
Disallow /hubfs/Sales%20Materials/Solution%20Briefs/G%20Suite%20Solution%20Brief.pdf
Disallow /hubfs/Sales%20Materials/Solution%20Briefs/Office%20365%20Solution%20Brief.pdf
Disallow /hubfs/Sales%20Materials/Solution%20Briefs/Avanan%20Platform%20Solution%20Brief.pdf
Disallow /resources/page/1
Disallow /resources/page/2
Disallow /resources/page/3
Disallow /resources/page/4
Disallow /resources/page/5
Disallow /resources/page/6
Disallow /resources/page/7
Disallow /hubfs/docs/cloud-account-takeover-wp/Cloud%20Takeover%20White%20Paper.pdf
Disallow /hubfs/docs/cloud-account-takeover-wp/Cloud%20Takeover%20White%20Paper%20%28printer%20friendly%29.pdf
Disallow /hubfs/docs/cloud-account-takeover-wp/Cloud-Takeover-White-Paper.pdf
Disallow /hubfs/docs/cloud-account-takeover-wp/Cloud-Takeover-White-Paper-PrinterFriendly.pdf
Disallow /hubfs/docs/HIPAA/HIPAA-compliance-in-the-cloud.pdf
Disallow /hubfs/docs/HIPAA/HIPAA-White-Paper.pdf
Disallow /hubfs/docs/The-Avanan-CASB/The-Avanan-CASB-WP.pdf
Disallow /hubfs/docs/34-Cloud-Security-Terms.pdf
Disallow /hubfs/docs/5%20Phishing%20Attack%20Trends%20to%20Look%20out%20for%20in%202018.pdf
Disallow /hubfs/docs/Advanced_DLP_for_Office365-Avanan.pdf
Disallow /hubfs/docs/Advanced_DLP_for_Office365-Avanan.pd.pdf
Disallow /hubfs/docs/Avanan%20for%20Municipal%20Governments.pdf
Disallow /hubfs/docs/Avanan%20One%20Pager.pdf
Disallow /hubfs/docs/Avanan%20One%20Pager-1.pdf
Disallow /hubfs/docs/AVANAN_Case_Study_ALEX_O365.pdf
Disallow /hubfs/docs/Avanan_for_EDU.pdf
Disallow /hubfs/docs/Avanan-Case-Study-Accounting-Firm-Secures-Office-365.pdf
Disallow /hubfs/docs/Avanan-for-DLP.pdf
Disallow /hubfs/docs/Avanan-for-GSuite.pdf
Disallow /hubfs/docs/Avanan-for-Municipal-Government%20-2017.pdf
Disallow /hubfs/docs/Avanan-for-Service-Now.pdf
Disallow /hubfs/docs/Avanan-ServiceSource-case-study.pdf
Disallow /hubfs/docs/avanan-vs-atp.pdf
Disallow /hubfs/docs/AWS-Solution-Brief.pdf
Disallow /hubfs/docs/AWS-Solution-Brief-2018.pdf
Disallow /hubfs/docs/Capital-Caring-Case-Study.pdf
Disallow /hubfs/docs/CASB-Solution-Brief.pdf
Disallow /hubfs/docs/Check_Point_Handout.pdf
Disallow /hubfs/docs/Check_Point_One_Page_Flyer.pdf
Disallow /hubfs/docs/Citrix_Best-of-Breed_Security.pdf
Disallow /hubfs/docs/Citrix_Best-of-Breed_Security_2Page_Brief.pdf
Disallow /hubfs/docs/Cloud-Security-Report-2017.pdf
Disallow /hubfs/docs/DLP_SolutionBrief_Avanan.pdf
Disallow /hubfs/docs/DLP_SolutionBrief_Avanan_1.pdf
Disallow /hubfs/docs/G-Suite-Solution-Brief-2018.pdf
Disallow /hubfs/docs/HIPAA-White-Paper.pdf
Disallow /hubfs/docs/Office-365-Solution-Brief-2018.pdf
Disallow /hubfs/docs/Phishing_in_the_Age_of_SaaS.pdf
Disallow /hubfs/docs/PhishingExplain-Avanan-May2017.pdf
Disallow /hubfs/docs/Secure_Your_SaaS_from_Malicious_Links.pdf
Disallow /hubfs/docs/Security-Built-For-The-Cloud-One-Pager.pdf
Disallow /hubfs/solution%20briefs/Slack-Solution-Brief/Slack-Solution-Brief.pdf
Disallow /hubfs/solution%20briefs/anti-phishing-solution-brief/anti-phishing-solution-brief.pdf
Disallow /manuals
Disallow /manuals/
Disallow /manuals/policy-based-email-protection
Disallow /hubfs/marketing/website/manuals/Email-Security-Policy-Admin-Guide.pdf
Disallow /manuals/office-365-mail-flow-rule-priority
Disallow /manuals/manual-integration-with-office-365
Disallow /manuals/disabling-inline-protection-office-365
Disallow /manuals/splunk-integration-part-one
Disallow /manuals/splunk-integration-part-two
Disallow /manuals/office-365-monitor-mode-manual-deployment
Disallow /hubfs/marketing/website/manuals/splunk-configuration-part-one.pdf
Disallow /hubfs/marketing/website/manuals/splunk-configuration-part-2.pdf
Disallow /hubfs/marketing/website/manuals/Manual-Integration-Office-365.pdf
Disallow /manuals/gmail-integration-gcds
Disallow /office-365-document-download
Disallow /g-suite-document-download
Disallow /slack-document-download
Disallow /file-sharing-document-download
Disallow /anti-phishing-document-download
Disallow /webinar-recording-avanan-vs-atp
Disallow /atp-document-download
Disallow /dlp-compliance-document-download
Disallow /casb-document-download
Disallow /siem-document-download
Disallow /recording-future-proofing-your-security
Disallow /recording-securing-citrix-sharefile
Disallow /recording-securing-office-365
Disallow /recording-securing-google-g-suite
Disallow /recording-securing-cloud-infrastructure
Disallow /recording-cloud-takeover-protection
Disallow /recording-what-to-look-for-in-a-casb
Disallow /recording-securing-o365-inside
Disallow /recording-hipaa-compliance-cloud
Disallow /webinar-recording-securing-slack
Disallow /webinar-recording-avanan-vs-atp
Disallow /webinar-recording-mta
Disallow /hubfs/Phishing%20Attack%20Analysis%20Whitepaper.pdf
Disallow /hubfs/marketing/website/white-papers/How-Avanan-Compares-to-Microsoft-ATP.pdf
Disallow /hubfs/docs/The-Avanan-CASB/The-Avanan-CASB-WP.pdf
Disallow /setup/new-email-signature
Disallow /gartner-summit
Disallow /webinar-recording-0365-vs-gsuite
Disallow /hubfs/marketing/content%20marketing/Webinars/Avanan%20Webinar%20Office%20365%20v%20G-Suite%2025%20April%202019.pdf
Disallow /hubfs/Resources/Office365_Security_Challenge-AVANAN.pdf
Disallow /manuals/changes-to-mail-flow-outbound-dlp
Disallow /hubfs/Website/webinars/Top-Takeaways-From-Gartner-Jun-2019.pdf
Disallow /hubfs/Website/webinars/key-findings-in-the-Global-Phish-Report-1.pdf
Disallow /gartner-recording
Disallow /hubfs/Website/webinars/Top-Takeaways-From-Gartner-June-2019.pdf
Disallow /hubfs/Website/webinars/Why-Avanan-Catches-Slides.pdf
Disallow /hubfs/website/resources/presentations/How-Hackers-Bypass-O365-Sept-2019.pdf
Disallow /hubfs/website/webinars/Three-Security-Flaws-in-ATP-that-Microsoft-Isnt-Fixing.pdf
Disallow /hubfs/website/resources/presentations/How-Hackers-Bypass-O365-Data-Connectors.pdf
Disallow /resources/presentations/on-demand/how-hackers-bypass-o365
Disallow /create-account
Disallow /resources/webinars/on-demand/breached-organizations
Disallow /hubfs/website/webinars/7-Measures-Breached-Organizations-dmarcian.pdf
Disallow /hubfs/website/resources/presentations/Avanan-Deployment-Guide.pdf
Disallow /hubfs/website/resources/solution-briefs/Avanan-for-Office-365.pdf
Disallow /hubfs/website/resources/solution-briefs/Avanan-Anti-Phishing.pdf
Disallow /hubfs/website/resources/solution-briefs/Avanan-DLP-for-the-Cloud.pdf
Disallow /autoclick
Disallow /resources/webinars/on-demand/email-security-biggest-problem
Disallow /hubfs/website/webinars/451-Email-Impact-Web-Briefing.pdf
Disallow /hubfs/Content/Collateral/Cyber-Security-in-Government-Avanan.pdf
Disallow /resources/reports-white-papers/download/cyber-security-for-government
Disallow /blog/clicktime-protection
Disallow /hubfs/website/webinars/Securing-Office-365-for-Government-Presentation.pdf
Disallow /resources/webinars/on-demand/cyber-security-for-government
Disallow /resources/reports-white-papers/download/2020-microsoft-atp-report
Disallow /hubfs/Content/Collateral/2020-Microsoft-ATP-Report.pdf
Disallow /resources/webinars/on-demand/msp-technology-and-partner-program
Disallow /resources/reports-white-papers/2020-microsoft-atp-report-download
Disallow /resources/presentations/bypassing-office-365-security
Disallow /resources/webinars/on-demand/2020-microsoft-atp-report
Disallow /resources/presentations/how-attackers-bypass-atp
Disallow /resources/webinars/on-demand/how-to-fool-microsoft
Disallow /resources/webinars/on-demand/incident-response-as-a-service
Disallow /sales/resources
Disallow /resources/webinars/on-demand/slack-teams-security
Disallow /resources/presentations/how-to-fool-microsoft
Disallow /partners/portal
Disallow /resources/case-studies/download/biotech-firm-replaces-proofpoint
Disallow /resources/case-studies/download/benefits-administration-company-replaces-mimecast
Disallow /gartner-reviews
Disallow /resources/reports-white-papers/download/5-questions-your-seg-vendor-doesnt-want-asked
Disallow /resources/webinars/on-demand/security-awareness-and-email-security
Disallow /resources/case-studies/download/san-francisco
Disallow /resources/case-studies/download/county-government-adds-additional-security
Disallow /resources/case-studies/download/cleaned-up-phishing-with-avanan
Disallow /resources/webinars/on-demand/evolution-beyond-segs
Disallow /resources/case-studies/download/college-better-email-security
Disallow /resources/case-studies/download/spoiled-by-avanan
Disallow /resources/videos/san-francisco-case-study
Disallow /resources/webinar-summary/brian-krebs
Disallow /resources/webinar-summary/krebs
Disallow /resources/webinars/on-demand/securing-sled-education
Disallow /resources/white-papers/download/healthcare-phishing-pandemic
Disallow /resources/white-papers/download/teams-report
Disallow /resources/case-studies/download/knowing-atp-doesnt-work
Disallow /resources/case-studies/download/from-skeptics-to-converts
Disallow /events/webinars/how-avanan-protects-customers
Disallow /resources/webinars/on-demand/state-of-email-security
Disallow /resources/white-papers/download/state-of-email-security
Disallow /sales/choosing-email-security
Disallow /resources/webinars/on-demand/microsoft-teams-report
Disallow /dpa
Disallow /cbcp-demo
Disallow /resources/videos/tenant-portal
Disallow /msp/content-kit/april-2021
Disallow /resources/reports/download/aite-email-security-matrix
Disallow /resources/webinars/on-demand/global-phish-report-2021
Disallow resources/case-studies/download/insurance-company-put-at-ease
Disallow /resources/webinars/on-demand/mistakes-leading-to-burnout
Disallow /resources/white-papers/download/how-to-reduce-ransomware
Disallow /resources/webinars/on-demand/ask-me-anything-joe-krull
Disallow /chat/pricing
Disallow /sign-up/content-digest
Disallow /io/trial
Disallow /sign-up/content-digest
Disallow /harmony-trial
Disallow /harmony-trial-request-thank-you
Disallow /harmony-demo
Disallow /harmony-demo-request-thank-you
Disallow /gettingtoknow
Disallow /book-meeting
Disallow /resources/reports/download/check-point-beefs-up-with-avanan
Disallow /resources/case-studies/download/new-city-school-district
Disallow /resources/case-studies/download/major-airline-better-secured
Disallow /resources/case-studies/download/getting-the-email-problem-under-control
Disallow /resources/white-papers/download/the-static-expressway
Disallow /resources/reports/download/check-point-beefs-up-with-avanan
Disallow /resources/reports/download/selecting-email-security-platform
Disallow /ask-your-questions
Disallow /resources/reports/download/gartner-market-guide
Disallow /resources/reports/download/zero-day-malware-report
Disallow /resources/white-papers/download/phishing-emails-missed
Disallow /resources/webinars/on-demand/segs-are-dead
Disallow /resources/white-papers/download/the-importance-of-dlp
Disallow /resources/case-studies/download/a-new-standard
Disallow /resources/case-studies/download/law-firm-game-changer
Disallow /resources/case-studies/download/engineering-company-loves-avanan
Disallow /resources/case-studies/download/modern-security-for-credit-union
Disallow /resources/case-studies/download/distribution-company
Disallow /cp-trial
Disallow /peloton-trial
Disallow /resources/solution-briefs/download/what-the-analysts-say
Disallow /resources/solution-briefs/download/difference-from-segs
Disallow /resources/solution-briefs/download/difference-from-other-apis
Disallow /cp/webinars/gmail-attacks
Disallow /resources/videos/peloton-giveaway
Disallow /resources/videos/peloton-giveaway-offer
Disallow /g2-form-page
Disallow /slashdot-form-page
Disallow /pureb2b-form-page
Disallow /lead2pipeline-form-page
Disallow /resources/white-papers/download/5-gmail-attacks
Disallow /resources/webinars/on-demand/5-gmail-attacks
Disallow /ppc/reports/gartner-market-guide
Disallow /ppc/reports/download/gartner-market-guide
Disallow /ppc/white-papers/5-gmail-attacks
Disallow /ppc/white-papers/download/5-gmail-attacks
Disallow /ppc/white-papers/teams-report
Disallow /ppc/white-papers/download/teams-report
Disallow /resources/white-papers/download/2022-cyber-security-report
Disallow /resources/white-papers/download/5-ransomware-security-measures
Disallow /hec-2022
Disallow /recording/hec-2022
Disallow /resources/webinars/on-demand/prevent-ransomware
Disallow /cp/webinars/stop-bec
Disallow /resources/case-studies/download/crowder-college
Disallow /legal/cookies
Disallow /resources/white-papers/download/5-ways-to-stop-bec
Disallow /resources/webinars/on-demand/stop-bec
Disallow /cp/webinars/detection-is-not-enough
Disallow /resources/webinars/on-demand/detection-is-not-enough
Disallow /resources/white-papers/download/importance-of-prevention
Disallow /cp/webinars/dealing-with-inbox-incursions
Disallow /resources/white-papers/download/enterprise-grade-security
Disallow /cp/session1
Disallow /pax8
Disallow /sales-enablement/session-1
Disallow /sales-enablement
Disallow /se-enablement
Disallow /resources/webinars/on-demand/dealing-with-inbox-incursions
Disallow /sales-enablement/session-2
Disallow /se-enablement/session-1
Disallow /sales-enablement/session-3
Disallow /se-enablement/session-2
Disallow /coffee-and-learn
Disallow /sales-enablement/session-4
Disallow /se-enablement/session-3
Disallow /sales-enablement-series
Disallow /register/coffee-and-learn
Disallow /racing-towards-better-email-security
Disallow /resources/webinars/on-demand/cyber-insurance-renewal
Disallow /resources/reports/download/keeping-your-emails-secure
Disallow /cp/reports/keeping-your-emails-secure
Disallow /cp/reports/download/keeping-your-emails-secure
Disallow /resources/webinars/on-demand/who-secures-the-inbox-best
Disallow /resources/webinars/check-point-avanan-prevent-ransomware-north-america
Disallow /resources/webinars/check-point-avanan-prevent-ransomware-emea
Disallow /cp/webinars/combat-ransomware-edu-public-sector
Disallow /resources/webinars/archiving-for-msps
Disallow /resources/webinars/new-features
Disallow /resources/webinars/new-features-emea
Disallow /customers/webinars/on-demand/new-features
Disallow /customers/webinars/on-demand/new-features-emea
Disallow /customers/webinars/on-demand/pizza-and-phishing
Disallow /ppc/demo
Disallow /resources/white-papers/download/prevention-first
Disallow /customers/webinars/on-demand/pizza-and-phishing-emea
Disallow /microsoft-365-security/test-site/zoominfo-chat
Disallow /sgi
Disallow /webinars/on-demand/pizza-and-phishing
Disallow /customers/webinars/on-demand/pizza-and-phishing-apac
Disallow /webinars/on-demand/phish-no-more-california-government-agencies
Disallow /tekspace
Disallow /eplus/checkup
Disallow /eplus/checkup/confirmation
Disallow /resources/webinars/on-demand/dlp-win-win-msps-resellers
Disallow /whatwouldjoeldo
Disallow /whatwouldjoeldo-share
Disallow /internal/on-demand/blitz-to-5k-hec-operation-connect-training
Disallow /resources/webinars/blitz-to-5k-hec-operation-connect-training
Disallow /webinars/on-demand/pizza-phishing-enterprises-combat-email-fraud
Disallow /webinars/on-demand/pizza-phishing-emea-protect-inbox-2023
Disallow /webinars/on-demand/pizza-phishing-latam
Disallow /webinars/on-demand/pizza-phishing-who-secures-the-inbox-best
Disallow /westcon-comstor
Disallow /webinars/on-demand/zero-click-attack-outlook
Disallow /webinars/on-demand/phish-no-more-combat-email-fraud
Disallow /webinars/on-demand/pizza-phishing-solutions-granted
Disallow /webinars/on-demand/msps-resellers-reduce-phishing
Disallow /webinars/on-demand/pizza-phishing-ciso-roundtable
Disallow /webinars/on-demand/pizza-phishing-gcc-mena
Disallow /webinars/on-demand/zero-click-phishing-apac
Disallow /webinars/on-demand/zero-click-phishing-emea
Disallow /_hcms/preview/
Disallow /hs/manage-preferences/
Disallow /hs/preferences-center/
Disallow /*?*hs_preview=*
Disallow /*?*hsCacheBuster=*

Warnings

  • `nofollow` is not a known field.
  • `noindex` is not a known field.