Skip to content

Commit 3c926a1

Browse files
Add content from Google docs file + table
1 parent 62054ba commit 3c926a1

File tree

1 file changed

+76
-41
lines changed
  • src/content/docs/cloudflare-one/email-security/setup

1 file changed

+76
-41
lines changed

src/content/docs/cloudflare-one/email-security/setup/index.mdx

Lines changed: 76 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -5,64 +5,99 @@ sidebar:
55
order: 1
66
---
77

8-
You can deploy Email Security via:
8+
Before you start the onboarding process, you will have to choose a deployment path. Email Security provides two deployment modes: [post-delivery](/cloudflare-one/email-security/setup/) (for API and BCC/Journaling), and [pre-delivery](/cloudflare-one/email-security/setup/#pre-delivery-deployment) (for MX/Inline).
99

10-
- [Microsoft Graph API](/cloudflare-one/email-security/setup/post-delivery-deployment/api/)
11-
- [BCC](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup/)/[Journaling](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/office365-journaling/)
12-
- [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/)
10+
## Post-delivery deployment
1311

14-
When you set up an integration, you will be able to:
12+
### How it works
1513

16-
- Configure [auto-move events](/cloudflare-one/email-security/auto-moves/).
17-
- [Synchronize a directory](/cloudflare-one/email-security/directories/).
18-
- Auto pull EMLs for [reclassification](/cloudflare-one/email-security/email-monitoring/search-email/#reclassify-messages) whose disposition is "None".
19-
- Manually move messages to different inboxes.
14+
When you choose post-delivery, Cloudflare scans emails **after** they reach a users' inbox.
2015

21-
With Microsoft Graph API and BCC/Journaling, Cloudflare scans emails after they reach a users' inbox. MX/Inline instead scans emails before they reach users' inbox.
16+
If you are a Microsoft 365 user, this is done via Microsoft's Graph API or journaling.
2217

23-
## Microsoft Graph API
18+
If you are a Google Workspace or Microsoft Exchange user, this is done via BCC.
2419

25-
When you deploy Email Security via Microsoft Graph API, you authorize Email Security to scan domains via your email provider credentials.
20+
### Why you should consider post-delivery deployment
2621

27-
When you deploy Email Security via Microsoft Graph API:
22+
Post-delivery deployment is time-efficient, because it does not involve MX changes. Post-delivery deployment does not disrupt mail flow. Post-delivery deployment allows you to enable [auto-move events](/cloudflare-one/email-security/auto-moves/), quarantine your messages, and synchronize your [directory](/cloudflare-one/email-security/directories/) when you use Microsoft Graph API.
2823

29-
- You authorize Email Security to scan domains via your email provider credentials.
30-
- Microsoft Graph API requires minimal configuration effort.
31-
- Your email inbox is moderately protected.
32-
- Email Security gets API access into your tenant.
24+
:::note
25+
When you choose post-delivery deployment:
26+
- The threat is removed **after** receipt.
27+
- Post-delivery requires API scopes, or journaling rule configuration.
28+
- Auto-move is not available in BCC/Journaling paths.
29+
:::
3330

34-
## BCC/Journaling
31+
## Pre-delivery deployment
3532

36-
When you deploy Email Security via BCC/Journaling:
33+
### How it works
3734

38-
- You send messages to Email Security via BCC or Journaling configurations within your email provider.
39-
- BCC/Journaling requires moderate configuration effort.
40-
- Your email inbox has the lowest level of protection.
41-
- Email Security receives copies of your email.
35+
When you choose pre-delivery, Cloudflare scans emails **before** they reach a users' inbox. The MX record points to Cloudflare.
4236

43-
## MX/Inline
37+
### Why you should consider pre-delivery deployment
4438

45-
When you deploy Email Security via MX/Inline:
39+
Pre-delivery deployment provides the highest level of protection. It enforces [bannering](/cloudflare-one/email-security/detection-settings/configure-text-add-ons/) or link rewrite at delivery.
4640

47-
- You send messages to Email Security to scan before they reach your users' inbox. You may need to update your MX records.
48-
- MX/Inline requires significant configuration effort.
49-
- Your email inbox has the highest level of protection.
50-
- Email Security has partial access to your mail stream.
41+
Pre-delivery blocks threats in transit, and it adds banners or texts before the user views the email.
5142

52-
With MX/Inline, you will not be able to auto-move emails.
43+
:::note
44+
When you choose pre-delivery deployment:
45+
- You must edit MX records or create a connector.
46+
- You can enable auto-move events only once you associate an integration.
47+
- Cloudflare [egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) are allowed on downstream servers.
48+
:::
5349

54-
### Associate an integration
50+
## Dispositions
5551

56-
To associate an integration:
52+
Email traffic that flows through Email Security is given a final disposition, which represents Email Security's evaluation of that specific message. Refer to [Dispositions and attributes](/cloudflare-one/email-security/reference/dispositions-and-attributes/) to learn more.
5753

58-
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/) > **Email Security**.
59-
2. Go to **Settings** and locate your domain.
60-
3. Select the three dots > **Associate an integration**.
61-
4. Select the integration you want to associate, then select **Associate**.
54+
Dispositions allow you to configure policies and tune reporting. For example, you can configure a policy to move suspicious emails to your junk folder.
6255

63-
To enable post-delivery response and phish submission response:
56+
## Impersonation registry
6457

65-
1. Go to **Settings** > **Moves**.
66-
2. Go to **Auto-moves**, select **View** > **Configure**.
67-
3. Select **Post-delivery response (Recommended)** and **Phish submission response (Recommended)**.
68-
4. Select **Save**.
58+
Most Business Email Compromise targets executives or finance roles. You must add addresses of roles who are likely to be impersonated. Refer to [Impersonation registry](/cloudflare-one/email-security/detection-settings/impersonation-registry/) to learn how to add a user to the impersonation registry.
59+
60+
Roles you may to include in the impersonation registry are:
61+
62+
- C-suites
63+
- Finance roles
64+
- HR
65+
- IT help-desk.
66+
67+
You should review your impersonation registry on a quarterly basis as roles change.
68+
69+
## Reclassifications
70+
71+
A reclassification is a change to an email's disposition **after** initial scanning. It is Cloudflare's built-in feedback loop for correcting false positives/negatives **and** training the detection models to get smarter over time. Security teams and end users can make a reclassification. Refer to [Reclassify messages](/cloudflare-one/email-security/email-monitoring/search-email/#reclassify-messages) to learn more.
72+
73+
### Why you should reclassify messages
74+
75+
Reclassifications are critical because:
76+
77+
- **They help improve model accuracy**: Every validated reclassification teaches Cloudflare's machine learning to recognise new lures, language, infrastructure and benign patterns.
78+
- **They reduce alert fatigue**: Correcting *Suspicious* or *Spam* emails that users actually want tailors detections to your organization, cutting noise in the dashboard.
79+
- **They close the remediation loop**: When a disposition is upgraded to Malicious, Cloudflare auto-moves those emails out of every inbox (Graph API or Google Workspace API integrations).
80+
- **They can help you log activity taken on any reclassification**: Each reclassification displays a submission ID, details about original, requested and final dispositions, and more. Refer to [Reclassify messages](/cloudflare-one/email-security/email-monitoring/search-email/#reclassify-messages) to learn more about reclassifications.
81+
82+
To make the most of reclassifications:
83+
84+
1. Review reclassifications on a weekly basis.
85+
2. Ensure you have an integration associated with any MX/Inline deployment. When you associate an integration, you will not need to upload the EMLs every time, and we can use APIs to receive a copy of your email messages.
86+
3. Investigate any increase in [user submissions](/cloudflare-one/email-security/email-monitoring/search-email/#user-submissions) (users may have found a phish that bypassed filters) and confirm that analyst-final dispositions align with your policies.
87+
88+
A correct use of reclassifications ensures that Email Security delivers a stronger protection with less manual tuning.
89+
90+
## Configuration checklist
91+
92+
| Step | Post-delivery | Pre-delivery |
93+
|---------------------------------------------------------------------------------------------------------|---------------|--------------|
94+
| Authorize integration (Graph API or Google Workspace) | Required | Required |
95+
| Create service account and journaling rule | Required | Required |
96+
| Associate an integration with an MX/Inline domain | | Required |
97+
| Add/verify domains | Required | Required |
98+
| Update MX records/connector, then allow Cloudflare egress IPs on downstream mail server | | Required |
99+
| Enable Post‑delivery response and Phish submission response | Required | Required |
100+
| Populate Impersonation registry and allow / block lists | Required | Required |
101+
| Configure partner TLS and admin quarantine | | Required |
102+
| Configure Text Addons and Link Actions | | Required |
103+
| Send a test email and verify it appears in Monitoring → Email activity with expected disposition | Required | Required |

0 commit comments

Comments
 (0)