Scan from link settings
Scan from link settings are accessible under Settings > Security tab .

This settings is apply for the header downloadfrom  when scanning file via API POST /file 
- Max download queue: - Determines the number of total concurrent requests that can be downloaded at a time.
- Range: [1-1000]
- Default: 500
- Info: If your system has poor internet speed, you should decrease this number or if you have a decent internet speed, you might want to increase the setting. This setting depends on your network.
- Note: this setting only applies to total concurrent download requests, and it is different from the total scan queue in Setting -> General > Queue size
 
- Enforce scan from link validation: 
- Enable this setting will make Metadefender Core validate the links from "downloadfrom" header.
- Default: disable
- Validation type: Blocklist or Allowlist
- Patterns: Regular Expression patterns
 
For example, if we would like to validate the links in "downloadfrom" header, and ONLY allow for the site https://allowlisted-domain.com  we should use this pattern: 
^https:\/\/allowlisted-domain\.com\/

Enforce scan from link validate: use Allowlist Over Blocklist
We strongly recommend using an allowlist approach rather than a blocklist for the following reasons:
- Positive security model: Only explicitly permitted URLs are allowed
- Reduced attack surface: Unknown or new malicious domains are automatically blocked
- Better maintainability: Easier to manage a list of trusted sources
Configure Specific URL Patterns
To prevent URL manipulation attacks and bypass attempts, configure your allowlist  patterns with maximum specificity:
Vulnerable Configuration:
allowlisted-domain.com 
Secure Configuration:
^https:\/\/allowlisted-domain\.com\/ 
Why Specific Patterns Matter
Attackers can exploit loose patterns using various techniques:
- Subdomain spoofing: https://allowlisted-domain.com.malicious-site.com/
- Path injection: https://evil-site.com/allowlisted-domain.com/malware.exe
- Query parameter manipulation: https://malicious-site.com/?redirect=allowlisted-domain.com
Pattern Configuration Best Practices
- Always use anchors: Start patterns with ^and end with appropriate boundaries
- Specify protocol: Include https:\/\/to enforce secure connections
- Escape special characters: Use \.instead of.for literal dots
- Include path separators: End with \/to prevent subdomain spoofing
Example Configurations
For a specific domain:
^https:\/\/downloads\.yourcompany\.com\/ 
For a subdirectory:
^https:\/\/cdn\.vendor\.com\/updates\/ 
Testing Your Configuration
After configuring your allowlist  patterns, test with various URL formats to ensure they work as expected:
- Verify legitimate URLs are accepted
- Confirm malicious variations are rejected
- Test edge cases and potential bypass attempts
Following these guidelines will provide robust protection against URL-based attacks while maintaining legitimate functionality.
