Skip to content

Commit 1b0e5b2

Browse files
Updating docs based on Todd's suggestion
1 parent 96f125e commit 1b0e5b2

File tree

2 files changed

+11
-5
lines changed

2 files changed

+11
-5
lines changed

src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 4
66
---
77

8-
import { Render } from "~/components"
8+
import { Render, GlossaryTooltip } from "~/components"
99

1010
![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_Gmail_MX_Inline.png)
1111

@@ -66,9 +66,15 @@ If desired, you can create a separate quarantine for each of the dispositions.
6666

6767
<Render file="email-security/deployment/set-up-mx-inline-step"/>
6868

69-
## 5. Secure your email flow
69+
## 5. (Recommended) Secure your email flow
7070

71-
After 36 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google only accepts messages that are first received by Email Security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email Security by injecting messages directly into Gmail.
71+
One method of DNS attacks is to search for old MX records and send <GlossaryTooltip term="phishing">phishing</GlossaryTooltip> emails directly to the mail server. To secure the email flow, you will want to enforce an email flow where inbound messages are accepted by Google Workspace only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended.
72+
73+
:::caution[Important]
74+
This step should not be performed until 72 hours after all domains in your Google Workspace have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain.
75+
:::
76+
77+
After 72 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google only accepts messages that are first received by Email Security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email Security by injecting messages directly into Gmail.
7278

7379
1. Access the [Google Administrative Console](https://admin.google.com/), then select **Apps** > **Google Workspace** > **Gmail**.
7480

src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,12 +107,12 @@ To create the transport rules that will send emails with certain [dispositions](
107107

108108
<Render file="email-security/deployment/set-up-mx-inline-step"/>
109109

110-
## 6. Secure Microsoft 365 from MX records bypass (recommended)
110+
## 6. (Recommended) Secure Microsoft 365 from MX records bypass
111111

112112
One method of DNS attacks is to search for old MX records and send <GlossaryTooltip term="phishing">phishing</GlossaryTooltip> emails directly to the mail server. To secure the email flow, you will want to enforce an email flow where inbound messages are accepted by Microsoft 365 only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended.
113113

114114
:::caution[Important]
115-
This step should not be performed until 24 hours after all domains (excluding your `<on_microsoft.com>` domain) in your Microsoft 365 organization have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain.
115+
This step should not be performed until 72 hours after all domains in your Microsoft 365 organization have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain.
116116
:::
117117

118118
#### Create Connector

0 commit comments

Comments
 (0)