Skip to content

Commit 02003f0

Browse files
Addressing suggestions
1 parent 6c76e9e commit 02003f0

File tree

1 file changed

+15
-14
lines changed

1 file changed

+15
-14
lines changed

src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ To configure allow policies:
2121
- **Action**: Select one of the following to choose how Email Security will handle messages that match your criteria:
2222
- **Trust sender**: Messages will bypass all detections and link following.
2323
- **Exempt recipient**: Message to this recipient will bypass all detections.
24-
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions.
24+
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. Refer to [Allow policy configuration use cases](/cloudflare-one/email-security/detection-settings/allow-policies/#use-case-1) for use case examples on how to configure allow policies for accept sender.
2525
- **Rule type**: Specify the scope of your policy. Choose one of the following:
2626
- **Email addresses**: Must be a valid email.
2727
- **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries.
@@ -34,47 +34,48 @@ To configure allow policies:
3434

3535
<Details header="Allow policy configuration use cases">
3636

37-
The following use cases present some use cases that will show you how to properly configure allow policies.
37+
The following use cases present some scenarios that will show you how to properly configure allow policies for accept sender.
3838

3939
### Use case 1
4040

41-
<Example title = "Company receives emails from third party providers not used internally. These emails are sent from the service provider, but Email Security gives these emails an incorrect disposition.">
41+
<Example title = "Company receives emails from third party providers not used internally. These emails are sent from the service provider, and Email Security gives these emails an incorrect disposition.">
4242
This use case can affect companies such as Shopify, PayPal, and Docusign.
4343

4444
To solve this:
4545

4646
1. Submit a [team submission](/cloudflare-one/email-security/email-monitoring/search-email/#team-submissions).
47-
2. Inform your Cloudflare account about the escalation.
48-
3. Avoid setting up allow policies, or blocked senders. In this use case, configuring allow policies will create a security gap. Setting up blocked senders will block legitimate emails from providers such as Shopify, PayPal, and Docusign.
47+
2. Inform your Cloudflare contact about the escalation.
48+
3. Do not set up allow policies, or blocked senders. In this use case, configuring allow policies will create a security gap. Setting up blocked senders will block legitimate emails from providers such as Shopify, PayPal, and Docusign.
4949
</Example>
5050

5151
### Use case 2
5252

53-
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the custom domain company, but Email Security marks these emails as bulk, spam, or spoof.">
5453

55-
This use case can cause your inbox to receive too many unwanted emails. This use case can affect companies such as Salesforce, Atlassian, and Figma.
54+
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof.">
5655

57-
To solve this, when you add an allow policy in the Zero Trust dashboard, ensure that:
56+
This use case can cause the emails you want to receive to follow the auto-moves rules you set up. This use case affects emails from internal tools (such as Salesforce, Atlassian, Figma, and more) that are given an incorrect disposition.
57+
58+
To solve this, when you add an allow policy in the Zero Trust dashboard:
5859

59-
1. You choose **Accept sender**.
60+
1. Choose **Accept sender**.
6061
2. Verify that **Sender verification (recommended)** is turned on.
6162

6263
</Example>
6364

6465

6566
### Use case 3
6667

67-
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the custom company domain, but Email Security marks these emails as bulk, spam, or spoof. The custom email domain does not support DMARC, SPF, DKIM, and would fail Sender Verification">
68+
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof. The custom email domain does not support DMARC, SPF, DKIM, and would fail Sender Verification">
6869

69-
This use case can affect companies such as Salesforce, Atlassian, and Figma.
70+
This use case impacts the emails from internal tools (such as Salesforce, Atlassian, Figma, and more) that are given an incorrect disposition.
7071

71-
To solve this, when you add an allow policy in the Zero Trust dashboard, ensure that:
72+
To solve this, when you add an allow policy in the Zero Trust dashboard:
7273

73-
1. You choose **Accept sender** based on the static IP you own.
74+
1. Choose **Accept sender** based on the static IP you own.
7475
2. Ensure that **Sender verification (recommended)** is turned off.
7576

7677
:::caution
77-
Do not use email addresses or email domains for this case as they can be easily spoofed without **Sender Verification (Recommended)** enabled.
78+
Do not use email addresses or email domains for this policy as they can be easily spoofed without **Sender Verification (Recommended)** enabled.
7879
:::
7980

8081
</Example>

0 commit comments

Comments
 (0)