You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/reference-architecture/architectures/cloudflare-sase-with-microsoft.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Microsoft and Cloudflare can be integrated in the following ways.
50
50
* Leveraging Microsoft [InTune](https://learn.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune) device posture in Cloudflare policies to ensure only managed, trusted devices have access to protected resources
51
51
* Using Cloudflare [CASB](/cloudflare-one/applications/scan-apps/) to inspect your [Microsoft 365](https://www.microsoft.com/en-us/microsoft-365/what-is-microsoft-365) tenants and alert on security findings for incorrectly configured accounts and shared files containing sensitive data
52
52
* Using Cloudflare's [Secure Web Gateway](/cloudflare-one/policies/gateway/) to control access to Microsoft SaaS applications such as Outline, OneDrive and Teams
53
-
* Using Cloudflare's [Cloud Email Security](/email-security/) service to increase protection of email from phishing attacks and business email compromise.
53
+
* Using Cloudflare's [Email Security](/email-security/) service to increase protection of email from phishing attacks and business email compromise.
54
54
55
55
### Microsoft Entra ID with Cloudflare
56
56
@@ -91,7 +91,7 @@ Cloudflare's Secure Web Gateway (SWG) can help organizations achieve safe and se
91
91
92
92
By leveraging Cloudflare SWG as a secure gateway for Microsoft 365 access, organizations can benefit from advanced threat protection, granular access controls, traffic inspection, and centralized visibility, ensuring a safe and secure experience for their users while mitigating risks and maintaining compliance.
93
93
94
-
### Cloudflare's Cloud Email Security for improved email protection
94
+
### Cloudflare's Email Security for improved email protection
95
95
96
96
Phishing is the root cause of upwards of 90% of breaches that lead to financial loss and brand damage. Cloudflare's email security solution sits in front of all email going to your Microsoft 365 tenant, filtering out spam, bulk, malicious and spoof content. The solution can leverage Microsoft [rules for quarantine actions](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine/), allowing you to fine tune how different email detections are handled.
97
97
@@ -101,7 +101,7 @@ It is also possible to configure cloud email security to scan [Microsoft 365 inb
101
101
102
102
## Summary
103
103
104
-
By leveraging Cloudflare and its integrations with Microsoft, organizations can establish a Zero Trust security posture that goes beyond the limitations of traditional network security models. With Cloudflare's Zero Trust Network Access (ZTNA), organizations can replace self hosted VPNs and enforce conditional access based on user identity and device posture. The integration with Microsoft Entra ID allows for authentication and access control, while Microsoft InTune provides device posture information. Additionally, Cloudflare's CASB offers visibility into the security of Microsoft 365 configuration, the Secure Web Gateway inspects and filters traffic to Microsoft 365, and Cloud Email Security protects against phishing attacks, ensuring a secure and compliant environment. This approach enables faster and more secure access to applications, while providing granular control over user access based on identity and device posture.
104
+
By leveraging Cloudflare and its integrations with Microsoft, organizations can establish a Zero Trust security posture that goes beyond the limitations of traditional network security models. With Cloudflare's Zero Trust Network Access (ZTNA), organizations can replace self hosted VPNs and enforce conditional access based on user identity and device posture. The integration with Microsoft Entra ID allows for authentication and access control, while Microsoft InTune provides device posture information. Additionally, Cloudflare's CASB offers visibility into the security of Microsoft 365 configuration, the Secure Web Gateway inspects and filters traffic to Microsoft 365, and Email Security protects against phishing attacks, ensuring a secure and compliant environment. This approach enables faster and more secure access to applications, while providing granular control over user access based on identity and device posture.
105
105
106
106

| Replacing your VPN |[Using Cloudflare to replace your VPN](/learning-paths/replace-vpn/)|
673
673
674
674
If you would like to discuss your SASE requirements in greater detail and connect with one of our architects, please visit [https://www.cloudflare.com/cloudflare-one/](https://www.cloudflare.com/cloudflare-one/) and request a consultation.
Copy file name to clipboardExpand all lines: src/content/docs/reference-architecture/architectures/security.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -574,7 +574,7 @@ The same DLP profiles can also be used in our Cloud Access Security Broker (CASB
574
574
575
575
A lot of this section has focused on protecting access to private networks and applications, but a business must also protect their employees and their devices. Our [secure web gateway](/cloudflare-one/policies/gateway/) (SWG) service sits between users connected to Cloudflare and any resource they are attempting to access, both public and private. Policies can be written to prevent employees from accessing high-risk websites or known sites that distribute malware. Policies can also be written to mitigate phishing attacks by blocking access to domains and websites known to be part of phishing campaigns. Protecting users and their devices from Internet threats also reduces associated risks of those same users and devices accessing private resources.
576
576
577
-
Another critical private resource to secure is email. This is often one of the most private of all resources, as it contains confidential communications across your entire organization. It's also a common attack surface, mostly by way of phishing attacks. [Cloud Email Security](https://www.cloudflare.com/zero-trust/products/email-security/) (CES) examines all emails in your employee's inboxes and detects spoofed, malicious, or suspicious emails and can be configured to act accordingly. CES can be integrated by changing your domain MX records and redirecting all email via Cloudflare. Another option, for Microsoft and Google, is to integrate via API and inspect email already in a user’s inbox. For suspicious emails, links in the email are rewritten to leverage Cloudflare's [browser isolation service](/cloudflare-one/policies/browser-isolation/) so that when a user heads to that website, their local machine is protected against any malicious code that might be running in the browser.
577
+
Another critical private resource to secure is email. This is often one of the most private of all resources, as it contains confidential communications across your entire organization. It's also a common attack surface, mostly by way of phishing attacks. [Email Security](https://www.cloudflare.com/zero-trust/products/email-security/) (CES) examines all emails in your employee's inboxes and detects spoofed, malicious, or suspicious emails and can be configured to act accordingly. CES can be integrated by changing your domain MX records and redirecting all email via Cloudflare. Another option, for Microsoft and Google, is to integrate via API and inspect email already in a user’s inbox. For suspicious emails, links in the email are rewritten to leverage Cloudflare's [browser isolation service](/cloudflare-one/policies/browser-isolation/) so that when a user heads to that website, their local machine is protected against any malicious code that might be running in the browser.
578
578
579
579

Copy file name to clipboardExpand all lines: src/content/partials/email-security/deployment/journaling-connector.mdx
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ On the other hand, if your email architecture requires outbound messages to trav
65
65
66
66
12. Select **Next**.
67
67
68
-
13. You need to validate the connector by using your tenant’s specific journaling address. To find this address, go to the [Cloud Email Security dashboard](https://horizon.area1security.com/support/service-addresses) > **Support** > **Service Addresses page**.
68
+
13. You need to validate the connector by using your tenant’s specific journaling address. To find this address, go to the [Email Security dashboard](https://horizon.area1security.com/support/service-addresses) > **Support** > **Service Addresses page**.
69
69
70
70

71
71
@@ -103,7 +103,7 @@ Your connector is now active. You can find it in **Exchange admin center** > **M
103
103
104
104
7. Select **New rule** to configure a journaling rule, and configure it as follows:
105
105
106
-
***Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Cloud Email Security dashboard](https://horizon.area1security.com/support/service-addresses). For example, `<customer_name>@journaling.mxrecord.io`.
106
+
***Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email Security dashboard](https://horizon.area1security.com/support/service-addresses). For example, `<customer_name>@journaling.mxrecord.io`.
107
107
***Journal Rule Name**: `Journal Messages to CloudflareArea 1`
108
108
***Journal messages sent or received from**: *Everyone*
109
109
***Type of message to journal**: *External messages only*
@@ -114,7 +114,7 @@ Your connector is now active. You can find it in **Exchange admin center** > **M
114
114
115
115

116
116
117
-
Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Cloud Email Security. After it propagates, you can access the Cloudflare Cloud Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Cloud Email Security from your Exchange server.
117
+
Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email Security. After it propagates, you can access the Cloudflare Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email Security from your Exchange server.
118
118
119
119
### 3. Compliance
120
120
@@ -144,7 +144,7 @@ After creating the distribution lists based on regions for your users, configure
144
144
145
145
7. Select **New rule** to configure a journaling rule, and configure it as follows:
146
146
147
-
***Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Cloud Email Security dashboard](https://horizon.area1security.com/support/service-addresses). If you need to process emails in certain geographic regions, refer to the [Geographic locations](#geographic-locations) table for more information on what address you should use.
147
+
***Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email Security dashboard](https://horizon.area1security.com/support/service-addresses). If you need to process emails in certain geographic regions, refer to the [Geographic locations](#geographic-locations) table for more information on what address you should use.
148
148
***Journal Rule Name**: `Journal Messages to CloudflareArea 1`
149
149
***Journal messages sent or received from**: *A specific user or group* and select the user group you [created above](#3-compliance).
150
150
***Type of message to journal**: *External messages only*
@@ -155,4 +155,4 @@ After creating the distribution lists based on regions for your users, configure
155
155
156
156

157
157
158
-
Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Cloud Email Security. After it propagates, you can access the Cloudflare Cloud Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Cloud Email Security from your Exchange server.
158
+
Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email Security. After it propagates, you can access the Cloudflare Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email Security from your Exchange server.
Copy file name to clipboardExpand all lines: src/content/partials/email-security/deployment/mx-geographic-locations.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@
5
5
6
6
When configuring the Email Security (formerly Area 1) MX records, it is important to configure hosts with the correct MX priority. This will allow mail flows to the preferred hosts and fail over as needed.
7
7
8
-
Choose from the following Cloud Email Security MX hosts, and order them by priority. For example, if you are located outside the US and want to prioritize email processing in the EU, add `mailstream-eu1.mxrecord.io` as your first host, and then the US servers.
8
+
Choose from the following Email Security MX hosts, and order them by priority. For example, if you are located outside the US and want to prioritize email processing in the EU, add `mailstream-eu1.mxrecord.io` as your first host, and then the US servers.
To create the transport rules that will send emails with certain <GlossaryTooltipterm="disposition">dispositions</GlossaryTooltip> to Cloud Email Security:
9
+
To create the transport rules that will send emails with certain <GlossaryTooltipterm="disposition">dispositions</GlossaryTooltip> to Email Security:
10
10
11
11
1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage).
Copy file name to clipboardExpand all lines: src/content/partials/email-security/deployment/setup-api-overview.mdx
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,11 @@
3
3
4
4
---
5
5
6
-
When you choose an **API deployment** for your [Email Security (formerly Area 1) setup](/email-security/deployment/), email messages only reach Cloud Email Security after they have already reached a user's inbox.
6
+
When you choose an **API deployment** for your [Email Security (formerly Area 1) setup](/email-security/deployment/), email messages only reach Email Security after they have already reached a user's inbox.
7
7
8
-
Then, through on integrations with your email provider, Cloud Email Security can [retract messages](/email-security/email-configuration/retract-settings/) based on your organization's policies.
8
+
Then, through on integrations with your email provider, Email Security can [retract messages](/email-security/email-configuration/retract-settings/) based on your organization's policies.
9
9
10
-

10
+

11
11
12
12
## Benefits
13
13
@@ -21,10 +21,10 @@ When you choose API deployment, you get the following benefits:
21
21
22
22
However, API deployment also has the following disadvantages:
23
23
24
-
*Cloud Email Security is dependent on your email provider's API infrastructure and outages will increase the message dwell time in the inbox.
25
-
*Cloud Email Security requires read and write access to mailboxes.
24
+
* Email Security is dependent on your email provider's API infrastructure and outages will increase the message dwell time in the inbox.
25
+
* Email Security requires read and write access to mailboxes.
26
26
* Requires API support from your email provider (does not typically support on-premise providers).
27
-
* Your email provider may throttle API requests from Cloud Email Security.
27
+
* Your email provider may throttle API requests from Email Security.
28
28
* Detection rates may be lower if multiple solutions exist.
29
29
* Messages cannot be modified or quarantined.
30
30
* Certain URL rewrite schemes cannot be decoded (for example, Mimecast).
0 commit comments