You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/email-security/account-setup/escalation-contacts.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,4 +43,4 @@ You can enable these special notifications through an opt-in process:
43
43
If you select **Critical Service Events**, the contact will be sent a text and/or an email message. They will need to select the link to confirm the subscriptions.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/account-setup/sso/azure.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ Your Azure configuration is now complete. It should look similar to this:
72
72
73
73
:::note
74
74
75
-
Now that the application configuration is complete, update **User Assignments** and **Application Properties** as needed to ensure that authorized personnel are able to access the new application from their Apps Catalog. Additionally, you may choose to update the application logo image file or the privacy policy URL.
75
+
Now that the application configuration is complete, update **User Assignments** and **Application Properties** as needed to ensure that authorized personnel are able to access the new application from their Apps Catalog. Additionally, you may choose to update the application logo image file or the privacy policy URL.
76
76
:::
77
77
78
78
## 2. Configure Email Security to connect to Azure
Copy file name to clipboardExpand all lines: src/content/docs/email-security/deployment/api/setup/exchange-bcc-setup.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ For customers using Microsoft Exchange, setting up Email Security via BCC is qui
77
77
78
78
:::note
79
79
80
-
If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email Security (formerly Area 1). Usually, the Email Security BCC rule will be at the top of the ruleset. The configured conditions of the Email Security BCC rule will only trigger for inbound messages.
80
+
If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email Security (formerly Area 1). Usually, the Email Security BCC rule will be at the top of the ruleset. The configured conditions of the Email Security BCC rule will only trigger for inbound messages.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/deployment/inline/setup/gsuite-area1-mx.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,7 +161,7 @@ When you are finished entering these details, select **SAVE**.
161
161
162
162
:::note
163
163
164
-
Google handles Groups (that is, distributions lists) differently from user mail accounts. The compliance filters actions are limited to the **Users** account type. If you heavily use Google Groups (that is, distribution lists), quarantining malicious messages using the Email Security quarantine is the recommended method to ensure full protection.
164
+
Google handles Groups (that is, distributions lists) differently from user mail accounts. The compliance filters actions are limited to the **Users** account type. If you heavily use Google Groups (that is, distribution lists), quarantining malicious messages using the Email Security quarantine is the recommended method to ensure full protection.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/email-configuration/email-policies/link-actions.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Email Link Isolation is now enabled.
55
55
56
56
:::note
57
57
58
-
Email Link Isolation does not have advanced configuration options. If you need more fine-grained control over what users can do in an isolated browser session, you must have a Cloudflare Zero Trust account and make your changes on [Browser Isolation](/cloudflare-one/policies/browser-isolation/).
58
+
Email Link Isolation does not have advanced configuration options. If you need more fine-grained control over what users can do in an isolated browser session, you must have a Cloudflare Zero Trust account and make your changes on [Browser Isolation](/cloudflare-one/policies/browser-isolation/).
Copy file name to clipboardExpand all lines: src/content/docs/email-security/email-configuration/phish-submissions/index.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ To enable PSR:
55
55
56
56
:::note
57
57
58
-
PSR works only for the phish samples submitted to [user submission addresses](https://horizon.area1security.com/support/service-addresses/). Refer to [Retract settings](/email-security/email-configuration/retract-settings/) to learn more about manual and automatic retraction.
58
+
PSR works only for the phish samples submitted to [user submission addresses](https://horizon.area1security.com/support/service-addresses/). Refer to [Retract settings](/email-security/email-configuration/retract-settings/) to learn more about manual and automatic retraction.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/email-configuration/phish-submissions/phishnet-o365.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ To set up PhishNet with Office 365, you will need:
17
17
18
18
:::note
19
19
20
-
Only admin users can deploy PhishNet for all users in Office 365. Non-admin users can deploy PhishNet for themselves, but no other users will have access to it.
20
+
Only admin users can deploy PhishNet for all users in Office 365. Non-admin users can deploy PhishNet for themselves, but no other users will have access to it.
21
21
:::
22
22
23
23
## Set up PhishNet for Office 365
@@ -80,7 +80,7 @@ You have now installed PhishNet for Office 365. After the process is complete, P
80
80
81
81
:::note
82
82
83
-
If you cannot find the PhishNet icon, select the **More actions** menu (the three dots menu).
83
+
If you cannot find the PhishNet icon, select the **More actions** menu (the three dots menu).
84
84
:::
85
85
86
86
3. Under **Select Submission Type**, select the type of your submission - Spam or Phish.
Email Security (formerly Area 1) provides two architectures to protect your organization: inline or API setup. Inline architecture evaluates email messages before they reach a user's inbox. API architecture evaluates emails when they have already reached a user's inbox.
33
+
Email Security (formerly Area 1) provides two architectures to protect your organization: inline or API setup. Inline architecture evaluates email messages before they reach a user's inbox. API architecture evaluates emails when they have already reached a user's inbox.
In addition to standard logins, Email Security (formerly Area 1) offers support for <GlossaryTooltipterm="SAML">SAML</GlossaryTooltip> based single sign-on (SSO) logins to your dashboard.
37
+
In addition to standard logins, Email Security (formerly Area 1) offers support for <GlossaryTooltipterm="SAML">SAML</GlossaryTooltip> based single sign-on (SSO) logins to your dashboard.
Attackers often try to impersonate executives within an organization when sending malicious emails. The Business email compromise (BEC) feature protects against these attacks.
41
+
Attackers often try to impersonate executives within an organization when sending malicious emails. The Business email compromise (BEC) feature protects against these attacks.
42
42
</Feature>
43
43
44
44
***
45
45
46
46
## Related products
47
47
48
48
<RelatedProductheader="Cloudflare Zero Trust"href="/cloudflare-one/"product="cloudflare-one">
49
-
Cloudflare Zero Trust replaces legacy security perimeters with Cloudflare's global network, making the Internet faster and safer for teams around the world.
49
+
Cloudflare Zero Trust replaces legacy security perimeters with Cloudflare's global network, making the Internet faster and safer for teams around the world.
Email Routing simplifies the way you create and manage custom email addresses. Email Security (formerly Area 1) helps secure your mail infrastructure from phishing attacks.
53
+
Email Routing simplifies the way you create and manage custom email addresses. Email Security (formerly Area 1) helps secure your mail infrastructure from phishing attacks.
Copy file name to clipboardExpand all lines: src/content/docs/email-security/reporting/audit-logs.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,5 +32,5 @@ To review preview logs:
32
32
4. From the dropdown, select one of the **Preview** logs. This will show you what would have been retracted with Post Delivery Response or Phish Submission Response enabled.
0 commit comments