Skip to content

Commit 8d1ad34

Browse files
Reorganize, adding table
1 parent 92110c6 commit 8d1ad34

30 files changed

+152
-163
lines changed

src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx

Lines changed: 8 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -2,41 +2,19 @@
22
title: How Cloudflare prevents email-based phishing attacks
33
pcx_content_type: overview
44
sidebar:
5-
order: 4
5+
order: 5
66
---
77

8-
Email-based phishing attacks can be divided into two main categories: Those with and without a malicious URL or attachment.
8+
Cloudflare Email Security uses a variety of factors to determine whether a given email message attachment, URL, or specific network traffic is part of a phishing campaign.
99

10-
Email Security uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a phishing campaign (marked with a `Malicious` [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions)) or other common campaigns (for example, `Spam`).
10+
These small pattern assessments are dynamic in nature. Cloudflare's automated systems use a combination of factors to clearly distinguish between a valid phishing campaign and benign traffic.
1111

12-
These small pattern assessments are dynamic in nature and — in many cases — no single one in and of itself will determine the final verdict. Instead, our automated systems use a combination of factors and non-factors to clearly distinguish between a valid phishing campaign and benign traffic.
12+
Cloudflare's vast global network detects emergent campaign infrastructure and aggregates data for Cloudflare's proprietary analytics engine SPARSE.
1313

14-
Emails without a Malicious URL or attachment typically fall into the Business Email Compromise (BEC) category. BEC is a type of social engineering attack. In a BEC attack, the attacker falsifies an email message to trick the victim into performing some action - most often transferring money to an account or location the attacker controls.
14+
SPARSE uses AI and ML models to make effective detections for all types of malicious emails, including Business Email Compromise (BEC).
1515

16-
To detect these low volume, malicious emails that do not contain malware, malicious links or email attachments, Cloudflare uses machine learning analysis, analyzing email threads, content, sentiment and context via message lexical analysis, subject analysis, word count assessment and sender analysis. Display names are also compared with known executive names for similarity using several matching modeling including the [Levenshtein Algorithm](https://en.wikipedia.org/wiki/Levenshtein_distance), and if matched, lagged when a sender is organization from an unknown domain.
16+
In a BEC attack, the attacker falsifies an email message to trick the victim into performing some action - most often transferring money to an account or location the attacker controls.
1717

18-
## Type of malicious attacks
18+
To detect these low volume, malicious emails that do not contain malware, malicious links or email attachments, Cloudflare analyzes the email thread, content, sentiment and context via message lexical analysis, subject analysis and sender analysis. Display names are also compared with known executive names for similarity using several matching models.
1919

20-
When malicious payloads or URLs are included or attached to an email, additional steps are taken to protect your users. For example:
21-
22-
### Malicious payload attached to the message
23-
24-
- **Example**: Classic campaign technique which utilizes a variety of active attachment types (EXE, DOC, XLS, PPT, OLE, PDF, and more) as the malicious payload for ransomware attacks, Trojans, viruses, and malware.
25-
- **Detections applied**: Machine learning (ML) models on binary bitmaps of the payload as well as higher-level attributes of the payload, with specific focus on signatureless detections for maximum coverage. Additionally, for relevant active payloads, the engine invokes a real-time sandbox to assess behavior and determine maliciousness.
26-
27-
### Encrypted malicious payload attached to the message, with password in message body as text
28-
29-
- **Example**: Campaigns that induce the user to apply a password within the message body to the attachment.
30-
- **Detections applied**: Real-time lexical parsing of message body for password extraction and ML models on binary bitmaps of the payload, signatureless detections for maximum coverage.
31-
32-
### Malicious URLs within message body
33-
34-
- **Example**: Typical phish campaigns with a socially engineered call to action URL that will implant malware (for example, watering hole attacks, malvertising, or scripting attacks).
35-
- **Detections applied**: Continuous web crawling, followed by real-time link crawling for a select group of suspicious urls, followed by machine learning applied to URL patterns in combination with other pattern rules and topic-based machine learning models for exhaustive coverage of link-based attacks.
36-
37-
### Malicious payload linked through a malicious payload linked through a URL
38-
39-
- **Example**: Campaigns where the URL links through to a remote malicious attachment (for example, in a .doc or .pdf file).
40-
- **Detections applied**: Remote document and/or attachment extraction followed by ML detection tree on the payload, instant crawl of links.
41-
42-
Additional attack types and detections can be found in the [Email Security Detection Methods](/cloudflare-one/email-security/reference/how-es-detects-phish/) documentation.
20+
Refer to [How we detect phish](/email-security/reference/how-we-detect-phish/#sample-attack-types-and-detections) to learn more about additional attack types and detections.

src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Protect your organization from phishing attacks
33
pcx_content_type: overview
44
sidebar:
5-
order: 5
5+
order: 6
66
---
77

88
In the early 2000s, Secure Email Gateways (SEGs) were introduced to deal with a growing need around the routing and filtering of email. While SEGs were successful at their mission for many years, their fundamental design has made it impossible for them to keep pace as phishing threats rapidly grow in scope and sophistication.

src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,9 @@
22
title: What is Email Security?
33
pcx_content_type: overview
44
sidebar:
5-
order: 3
5+
order: 4
66
---
77

8-
Email security is the process of preventing email-based cyber attacks and unwanted communications.
8+
Despite email's importance as a communication method, security and privacy were not built into the [The Simple Mail Transfer Protocol (SMTP) protocol](https://www.cloudflare.com/learning/email-security/what-is-smtp/) As a result, email is a major attack vector.
99

10-
It spans protecting inboxes from takeover, protecting domains from spoofing, stopping phishing attacks, preventing fraud, blocking malware delivery, filtering spam, and using encryption to protect the contents of emails from unauthorized persons.
11-
12-
Security and privacy were not built into email when it was first invented, and despite email's importance as a communication method, these are still not built into email by default. As a result, email is a major attack vector for large and small organizations, and for individuals well.
13-
14-
For more information on email security, refer to the [Learning Center](https://www.cloudflare.com/learning/email-security/what-is-email/).
10+
Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery and filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/).

src/content/docs/learning-paths/secure-o365-email/concepts/what-is-phishing-attack.mdx

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,11 @@
22
title: What is a phishing attack?
33
pcx_content_type: overview
44
sidebar:
5-
order: 2
5+
order: 3
66
---
77

8-
Email security is the process of preventing email-based cyber attacks and unwanted communications.
8+
[Phishing](https://www.cloudflare.com/en-gb/learning/access-management/phishing-attack/) is an attempt to steal sensitive data, typically in the form of usernames, passwords, or other important account information. The phisher either uses the stolen information themselves, for instance to take over the user's accounts with their password, or sells the stolen information.
99

10-
It spans protecting inboxes from takeover, protecting domains from spoofing, stopping phishing attacks, preventing fraud, blocking malware delivery, filtering spam, and using encryption to protect the contents of emails from unauthorized persons.
10+
Phishing attackers disguise themselves as a reputable source. With an enticing or seemingly urgent request, an attacker lures the victim into providing information, just as a person uses bait while fishing.
1111

12-
Security and privacy were not built into email when it was first invented. Despite email's importance as a communication method, security and privacy are still not built into email by default. As a result, email is a major attack vector for large and small organizations, and for individuals well.
13-
14-
For more information on what a phishing attack is, refer to the [Learning Center](https://www.cloudflare.com/en-gb/learning/access-management/phishing-attack/).
12+
Phishing often takes place over email. Phishers either try to trick people into emailing information directly, or link to a webpage they control that is designed to look legitimate (for instance, a fake login page where the user enters their password).
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Active directory sync
2+
title: Manage your active directory
33
pcx_content_type: how-to
44
sidebar:
55
order: 2
@@ -31,7 +31,7 @@ To add multiple groups to the registry at once:
3131
2. Select the **Action** dropdown list.
3232
3. Select **Add to registry**.
3333

34-
In addition, Email Security Allows you to:
34+
In addition, Email Security allows you to:
3535

3636
- [Remove groups from the registry](/cloudflare-one/email-security/directories/manage-ms-directories/manage-groups-directory/#remove-groups-from-registry)
3737
- [Filter the impersonation registry](/cloudflare-one/email-security/directories/manage-ms-directories/manage-groups-directory/#filter-impersonation-registry)
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Enable audit logs
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 4
6+
---
7+
8+
With Email Security, you can enable logs to review actions performed on your account.
9+
10+
To enable audit logs:
11+
12+
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/).
13+
2. Select **Analytics & Logs** > Logpush.
14+
3. Select **Audit logs**.
15+
4. **Under Configure logpush job**:
16+
- **Job name**: Enter the job name.
17+
- **If logs match**: Select Filtered logs:
18+
- **Field**: Choose `ResourceType`.
19+
- **Operator**: Choose `starts with`.
20+
- **Value**: Enter `email_security`.
21+
5. Select **Submit**.
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Impersonation registry
2+
title: Add user to the impersonation registry
33
pcx_content_type: how-to
44
sidebar:
55
order: 3
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: Initial Email Security configuration
2+
title: Configure Email Security
33
pcx_content_type: overview
44
sidebar:
5-
order: 1
5+
order: 3
66
---
77

8-
With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up the tool.
8+
With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up Email Security.
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,21 @@
11
---
2-
title: Submit a phish
2+
title: Report phish
33
pcx_content_type: how-to
44
sidebar:
5-
order: 2
5+
order: 4
66
---
77

8-
import { GlossaryTooltip} from "~/components"
8+
Before deploying Email Security to production, you will have to consider reporting any phishing attacks, evaluating which disposition to assign a specific message, and using different screen criteria to search through your inbox.
99

1010
PhishNet is an add-in button that helps users to submit directly to Email Security phish samples missed by Email Security detection.
1111

12-
PhishNet is an add-in button that helps users to submit directly to Email Security <GlossaryTooltip term="phishing">phish</GlossaryTooltip> samples missed by Email Security's detection.
13-
1412
To set up PhishNet O365:
1513

1614
1. Log in to the Microsoft admin panel. Go to **Microsoft 365 admin center** > **Settings** > **Integrated Apps**.
1715
2. Select **Upload custom apps**.
1816
3. Choose **Provide link to manifest file** and paste the the following URL:
19-
```txt
20-
https://phishnet-o365.area1cloudflare-webapps.workers.dev?clientId=ODcxNDA0MjMyNDM3NTA4NjQwNDk1Mzc3MDIxNzE0OTcxNTg0Njk5NDEyOTE2NDU5ODQyNjU5NzYzNjYyNDQ3NjEwMzIxODEyMDk1NQ
21-
```
17+
18+
```txt
19+
https://phishnet-o365.area1cloudflare-webapps.workers.dev?clientId=ODcxNDA0MjMyNDM3NTA4NjQwNDk1Mzc3MDIxNzE0OTcxNTg0Njk5NDEyOTE2NDU5ODQyNjU5NzYzNjYyNDQ3NjEwMzIxODEyMDk1NQ
20+
```
2221
4. Verify and complete the wizard.

0 commit comments

Comments
 (0)