Skip to content

Commit 0383d5b

Browse files
[Area 1] Added tooltips (#11821)
* added glossary data * added glossary page * added area1 to other glossarys * added area1 glossary * changed yml name * changed yml name * added phishing * added phish tooltip * added saml tooltip * added smtp tolltip * added enter to correct render problems * added 2fa tooltip * added siem tooltip * added disposition tooltip * added dispositions tooltip * added layout * refined def * Apply suggestions from code review Co-authored-by: jason-cf <[email protected]> --------- Co-authored-by: jason-cf <[email protected]>
1 parent 9a5058f commit 0383d5b

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+88
-50
lines changed

content/email-security/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ weight: 1
88
# Area 1 Email Security
99

1010
{{<description>}}
11-
Stop phishing attacks with Area 1 cloud-native email security service.
11+
Stop {{<glossary-tooltip term_id="phishing">}}phishing{{</glossary-tooltip>}} attacks with Area 1 cloud-native email security service.
1212
{{</description>}}
1313

1414
{{<plan id="email.email_security.properties.availability.summary">}}
@@ -24,7 +24,7 @@ Area 1 provides two architectures to protect your organization: inline or API se
2424
{{</feature>}}
2525

2626
{{<feature header="SSO integration" href="/email-security/account-setup/sso/">}}
27-
In addition to standard logins, Area 1 offers support for SAML based single sign-on (SSO) logins to your dashboard.
27+
In addition to standard logins, Area 1 offers support for {{<glossary-tooltip term_id="SAML">}}SAML{{</glossary-tooltip>}} based single sign-on (SSO) logins to your dashboard.
2828
{{</feature>}}
2929

3030
{{<feature header="Business email compromise" href="/email-security/email-configuration/enhanced-detections/business-email-compromise/">}}

content/email-security/_partials/_auto-retraction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ _build:
66
inputParameters: hardRetract
77
---
88

9-
You can set up auto-retraction to automatically move messages matching certain dispositions to specific folders within a user's mailbox.
9+
You can set up auto-retraction to automatically move messages matching certain {{<glossary-tooltip term_id="disposition">}}dispositions{{</glossary-tooltip>}} to specific folders within a user's mailbox.
1010

1111
To set up automatic retraction:
1212

@@ -26,7 +26,7 @@ To set up automatic retraction:
2626

2727
### Post delivery retractions for new threats
2828

29-
Area 1 is continuously gathering new information about phishing campaigns. Users might have email messages in their inboxes that were scanned by Area 1 but not retracted initially because, at the time of scan, these email messages had not been identified as a threat. To mitigate risk, Area 1 offers you tools to re-evaluate email messages at a fixed time interval based on knowledge Cloudflare may have acquired since initial delivery. Any email messages that fit this new threat knowledge will be retracted.
29+
Area 1 is continuously gathering new information about {{<glossary-tooltip term_id="phishing">}}phishing{{</glossary-tooltip>}} campaigns. Users might have email messages in their inboxes that were scanned by Area 1 but not retracted initially because, at the time of scan, these email messages had not been identified as a threat. To mitigate risk, Area 1 offers you tools to re-evaluate email messages at a fixed time interval based on knowledge Cloudflare may have acquired since initial delivery. Any email messages that fit this new threat knowledge will be retracted.
3030

3131
You can enable two options:
3232

content/email-security/_partials/_email-security-description.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@ _build:
55
list: never
66
---
77

8-
Phishing is the root cause of upwards of 90% of breaches that lead to financial loss and brand damage. Cloudflare Area 1 email security is a cloud-native service that stops phishing attacks across all threat vectors either at the [edge](https://www.cloudflare.com/learning/serverless/glossary/what-is-edge-computing/) or in the cloud.
8+
{{<glossary-tooltip term_id="phishing">}}Phishing{{</glossary-tooltip>}} is the root cause of upwards of 90% of breaches that lead to financial loss and brand damage. Cloudflare Area 1 email security is a cloud-native service that stops phishing attacks across all threat vectors either at the [edge](https://www.cloudflare.com/learning/serverless/glossary/what-is-edge-computing/) or in the cloud.
99

1010
With globally distributed sensors and comprehensive attack analytics, Area 1 proactively identifies phishing campaigns, attacker infrastructure, and attack delivery mechanisms during the earliest stages of a phishing attack cycle. Using flexible enforcement platforms, the Area 1 solution allows customers to take preemptive action against targeted phishing, including malware, spoofing attacks, payload-less Business Email Compromise attacks, supply chain phishing, and other advanced threats.

content/email-security/_partials/_o365-use-case-transport-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ _build:
66
inputParameters: ruleName;;ruleWords;;doFollowing;;img;;ruleName2;;ruleWords2;;doFollowing2;;img2
77
---
88

9-
To create the transport rules that will send emails with certain dispositions to Area 1:
9+
To create the transport rules that will send emails with certain {{<glossary-tooltip term_id="disposition">}}dispositions{{</glossary-tooltip>}} to Area 1:
1010

1111
1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage).
1212
2. Go to **Mail flow** > **Rules**.

content/email-security/_partials/_reference-detect-phish.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ _build:
55
list: never
66
---
77

8-
Area 1 uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a phishing campaign (marked with a `Malicious` [disposition](/email-security/reference/dispositions-and-attributes/)) or other common campaigns (for example, `Spam`).
8+
Area 1 uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a {{<glossary-tooltip term_id="phishing">}}phishing{{</glossary-tooltip>}} campaign (marked with a `Malicious` {{<glossary-tooltip term_id="disposition" link="/email-security/reference/dispositions-and-attributes/">}}disposition{{</glossary-tooltip>}}) or other common campaigns (for example, `Spam`).
99

1010
These small pattern assessments are dynamic in nature and — in many cases — no single one in and of itself will determine the final verdict. Instead, our automated systems use a combination of factors and non-factors to clearly distinguish between a valid phishing campaign and benign traffic.
1111

content/email-security/_partials/_search.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ _build:
55
list: never
66
---
77

8-
4. **Detections only** is enabled by default. This means that the system will only search through and display emails that Area 1 has marked with a [detection disposition](/email-security/reference/dispositions-and-attributes/). If you prefer to search through and view all emails that have been processed by Area 1, whether they are marked with a detection disposition or not, disable this option.
8+
4. **Detections only** is enabled by default. This means that the system will only search through and display emails that Area 1 has marked with a detection {{<glossary-tooltip term_id="disposition" link="/email-security/reference/dispositions-and-attributes/">}}disposition{{</glossary-tooltip>}}. If you prefer to search through and view all emails that have been processed by Area 1, whether they are marked with a detection disposition or not, disable this option.
99
5. The **All detections** drop-down menu allows you to refine your search by detection disposition. This menu will be disabled if **Detections only** is not selected.
1010
6. By default, the search results are limited to the previous 30 days. Select **Last 30 days** to change this setting.
1111
7. (Optional) You can download the results from your search in CSV format. The CSV file is capped at 1,000 rows.

content/email-security/_partials/_setup-inline-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ _build:
77

88
With an **Inline deployment** for your [Area 1 setup](/email-security/deployment/), Area 1 evaluates email messages before they reach a user's inbox.
99

10-
More technically, Area 1 becomes a hop in the SMTP processing chain and physically interacts with incoming email messages. Based on your policies, various messages are blocked before reaching the inbox.
10+
More technically, Area 1 becomes a hop in the {{<glossary-tooltip term_id="SMTP">}}SMTP{{</glossary-tooltip>}} processing chain and physically interacts with incoming email messages. Based on your policies, various messages are blocked before reaching the inbox.
1111

1212
![With inline deployment, messages travel through Area 1's email filter before reaching your users.](/images/email-security/deployment/inline-setup/inline-deployment-diagram.png)
1313

content/email-security/_partials/_sso-enforcement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,6 @@ _build:
55
list: never
66
---
77

8-
- **None**: This setting allows each user to choose SSO, or username and password plus 2FA (this is the recommended setting while testing SSO).
8+
- **None**: This setting allows each user to choose SSO, or username and password plus {{<glossary-tooltip term_id="two-factor authentication (2FA)">}}2FA{{</glossary-tooltip>}} (this is the recommended setting while testing SSO).
99
- **Admin**: This setting will force only the administrator account to use SSO. The user that enables this setting will still be able to log in using username and password plus 2FA. This is a backup, so that your organization does not get locked out of the portal in emergencies.
1010
- **Non-Admin Only**: This option will require that all `Read only` and `Read & Write` users use SSO to access the portal. Admins will still have the option to use either SSO or username and password plus 2FA.

content/email-security/account-setup/escalation-contacts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ weight: 2
66

77
# Escalation contacts
88

9-
Whenever Area 1 finds an exceptional phishing threat or Email Service irregularity behavior (compromised email servers at a partner or vendor, wire fraud tactics, and more), we try to reach out to our customers.
9+
Whenever Area 1 finds an exceptional {{<glossary-tooltip term_id="phishing">}}phishing{{</glossary-tooltip>}} threat or Email Service irregularity behavior (compromised email servers at a partner or vendor, wire fraud tactics, and more), we try to reach out to our customers.
1010

1111
There are four types of contacts available to configure, each with a priority type:
1212
- **SOC Contact**: P1 priority.

content/email-security/account-setup/manage-account-members.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ weight: 1
66

77
# Manage account members
88

9-
If your account is a **Super Admin**, you have the ability to add, edit, and delete users and - if those users lose their two-factor authentication (2FA) device - reset their 2FA.
9+
If your account is a **Super Admin**, you have the ability to add, edit, and delete users and - if those users lose their {{<glossary-tooltip term_id="two-factor authentication (2FA)">}}two-factor authentication (2FA){{</glossary-tooltip>}} device - reset their 2FA.
1010

1111
## Add user
1212

0 commit comments

Comments
 (0)