You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/detection-settings/additional-detections.mdx
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,11 +23,13 @@ To configure additional detections:
23
23
24
24
The domain age is the time since the domain has been registered.
25
25
26
+
Because of the domain age detection, [trusted domains](/cloudflare-one/email-security/detection-settings/trusted-domains/) can be used to create an exception to the age detection.
27
+
26
28
To configure a domain age:
27
29
28
30
1. On the **Edit additional detections** page:
29
-
- Select **Malicious domain age**: Controls the threshold for a malicious disposition. Maximum of 100 days.
30
-
- Select **Suspicious domain age**: Controls the threshold for a suspicious disposition. Maximum of 100 days.
31
+
- Select **Malicious domain age**: Controls the threshold for a malicious disposition. Maximum of 100 days. It is recommended to set the **Malicious domain age** to 7 days.
32
+
- Select **Suspicious domain age**: Controls the threshold for a suspicious disposition. Maximum of 100 days. It is recommended to set the **Suspicious domain age** between 30 and 45 days.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx
+37-3Lines changed: 37 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,40 @@ import { Example, Details } from "~/components"
9
9
10
10
Email Security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning.
11
11
12
+
## How allow policies work
13
+
14
+
Allow policies are crucial for legitimate messages that may otherwise be blocked due to, for example, an incorrect setup.
15
+
16
+
<Exampletitle="Example of allow policy">
17
+
18
+
An example of allow policy is a phishing simulation product. You want to configure a phishing simulation product as **Accept sender** so Email Security does not scan the messages (or crawl links) in these simulated messages.
19
+
20
+
</Example>
21
+
22
+
Allow policies can be configured to match messages based on specific criteria such as individual email addresses, IP address ranges, or domains. This flexibility allows you to exempt legitimate messages from specific sources, even if those sources have low spam reputation or send bulk messages from their own servers.
23
+
24
+
Allow policies are used to mitigate false positives. When an email has been marked as malicious or suspicious, but you still want to receive that email, you configure that email as part of an allow policy.
25
+
26
+
### Accept sender
27
+
28
+
Allow policies in Email Security give you the option to choose **Accept sender**.
29
+
30
+
Accept sender creates exceptions for messages that would otherwise be marked as spam, bulk, or spoof. However, Email Security will continue to scan the message for maliciousness.
31
+
32
+
It is recommended to choose this option, as it is the safest option to protect your email inbox from malicious or suspicious activities.
33
+
34
+
<Exampletitle="Example of a use case where marketing emails that are legitimate have been blocked">
35
+
36
+
When a marketing email does not follow the correct template, it may be marked as malicious or spam. It may not be possible to change the template. However, in this scenario, the marketing email is legitimate.
37
+
38
+
To make sure that users still receive the marketing email, you will have to select **Accept sender** and add the marketing domain in **Rule Type** > **Domains**.
39
+
40
+
**Accept sender** and **Domains** combined exempt marketing emails that may not follow the correct template.
41
+
42
+
</Example>
43
+
44
+
## Configure allow policies
45
+
12
46
To configure allow policies:
13
47
14
48
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
@@ -23,10 +57,10 @@ To configure allow policies:
23
57
- **Exempt recipient**: Message to this recipient will bypass all detections.
24
58
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. Refer to [Allow policy configuration use cases](#use-case-1) for use case examples on how to configure allow policies for accept sender.
25
59
-**Rule type**: Specify the scope of your policy. Choose one of the following:
26
-
-**Email addresses**: Must be a valid email.
27
-
-**IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries.
60
+
-**Email addresses**: Must be a valid email. Enter an email address whose emails are going to be exempted.
61
+
-**IP addresses**: This is the IP address of the email server. Any email address sent from this email server is going to be allowed. The IP address can only be IPv4. IPv6 and CIDR are invalid entries.
28
62
-**Domains**: Must be a valid domain.
29
-
-**Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email.
63
+
-**Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email. For example, you can enter `.*@domain\.com` to exempt any email address that ends with `domain.com`.
30
64
-**(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email Security will only honor policies that pass authentication.
31
65
-**Notes**: Provide additional information about your allow policy.
32
66
-**Uploading an allow policy**: Upload a file no larger than 150 KB. The file can only contain `Pattern`, `Pattern Type`, `Verify Email`, `Trusted Sender`, `Exempt Recipient`, `Acceptable Sender`, `Notes` fields. The first row must be a header row. Refer to [CSV uploads](/cloudflare-one/email-security/detection-settings/allow-policies/#csv-uploads) for an example file.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/detection-settings/blocked-senders.mdx
+10-2Lines changed: 10 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,15 @@ sidebar:
5
5
order: 2
6
6
---
7
7
8
-
Email Security marks all messages from these senders with a [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/).
8
+
Email Security marks all messages from these senders with a malicious [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/).
9
+
10
+
## How blocked senders work
11
+
12
+
Blocked senders ensures messages from any sender is automatically marked as malicious, preventing them from reaching users' inbox.
13
+
14
+
Sometimes, the same email, IP address or domain always sends malicious emails to the company. In this case, you can add an email address, IP address or domain as a blocked sender. You can choose to enter a regular expression by turning **Regular expression** on.
15
+
16
+
## Configure blocked senders
9
17
10
18
To configure blocked senders:
11
19
@@ -19,7 +27,7 @@ To configure blocked senders:
19
27
- **Email addresses**: Must be a valid email.
20
28
- **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries.
21
29
- **Domains**: Must be a valid domain.
22
-
- **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email.
30
+
- **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email. For example, you can enter `.*@domain\.com` to exempt any email address that ends with `domain.com`.
23
31
-**Notes**: Provide additional information about the blocked sender policy.
24
32
-**Upload blocked sender list**: Upload a file no larger than 150 KB. The file cannot can only contain `Blocked_Sender`, `Pattern Type,` and `Notes` fields. The first row must be a header row. Refer to [CSV uploads](/cloudflare-one/email-security/detection-settings/blocked-senders/#csv-uploads) for an example file.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/detection-settings/trusted-domains.mdx
+25-1Lines changed: 25 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,31 @@ sidebar:
5
5
order: 3
6
6
---
7
7
8
-
Email Security allows you to exempt known partner and internal domains from typical detection scanning. Adding trusted domains helps to reduce false positives on [malicious, suspicious, and spoof dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/).
8
+
Email Security allows you to exempt known partner and internal domains from typical detection scanning. Adding trusted domains helps to reduce false positives on [malicious, suspicious, and spoof dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/). Email Security only checks the date when the domain is created.
9
+
10
+
## How trusted domains work
11
+
12
+
Trusted domains are not for the email message itself, but for entire domains.
13
+
14
+
By default, Email Security automatically detects lookalike domains. Lookalike domains can be something like this: `thisisdomain.com` and `thisisadomain.com`. Both domains almost look identical.
15
+
16
+
If an email is received from a domain that looks like a configured domain, this will trigger a detection. Trusted domain is configured to ignore this detection.
17
+
18
+
In [Additional detections](/cloudflare-one/email-security/detection-settings/additional-detections/), you can configure malicious domain and suspicious [domain age](/cloudflare-one/email-security/detection-settings/additional-detections/).
19
+
20
+
Malicious domain age means that someone may create a domain today, similar to a target, and start sending emails with that domain. This is usually how many phish campaigns start. In this case, the domain is usually marked as Malicious. Malicious domain age is usually set to 7 days.
21
+
22
+
Suspicious domain age means that after 7 days (this number corresponds to the Malicious domain age), a domain may not be malicious, but it can still be suspicious. Email Security will mark these domains as Suspicious. It is recommended to configure the **Suspicious domain age** between 30 and 45 days.
23
+
24
+
To view whether a domain is malicious or suspicious:
25
+
26
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **Investigation**.
27
+
2. Run a screen. For example, select **Run screen** for **Malicious emails**, then select **Run screen**.
28
+
3. Under **Your matching messages**, if any message displays **Domain Age** under **Threat types**, that means that the domain age is too low, and therefore the disposition assigned is Malicious. If the domain is legitimate, you can add it as a trusted domain:
29
+
- Go to **Settings** > **Trusted Domains**.
30
+
- Under **Domain Info**, add the domain, and select **New Domain**. This will mark the domain whose age is low as a trusted domain.
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/email-security/email-monitoring/search-email.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -257,7 +257,7 @@ Email Security shows you the following email detail information:
257
257
Email Security displays the following details:
258
258
259
259
1.**Threat type**: Threat type of the email, for example, [credential harvester](/cloudflare-one/email-security/reference/how-es-detects-phish/#credential-harvesters), and [IP-based spam](/cloudflare-one/email-security/reference/how-es-detects-phish/#ip-based-spam).
2.**Validation**: Email validation methods [SPF](https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/), [DKIM](https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/), [DMARC](https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/). The dashboard will display **Pass** if SPF, DKIM and DMARC checks have passed.
0 commit comments