Skip to content

Commit 92110c6

Browse files
Improve formatting
1 parent bf12bce commit 92110c6

File tree

8 files changed

+32
-15
lines changed

8 files changed

+32
-15
lines changed

.vscode/settings.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,6 @@
33
"editor.formatOnSave": true,
44
"editor.defaultFormatter": "esbenp.prettier-vscode",
55
"typescript.tsdk": "node_modules/typescript/lib",
6-
"cSpell.enableFiletypes": ["mdx"]
6+
"cSpell.enableFiletypes": ["mdx"],
7+
"editor.wordWrap": "on"
78
}

src/content/docs/cloudflare-one/implementation-guides/secure-o365-email.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
pcx_content_type: navigation
3-
title: Secure your Microsoft 365 email environment with Email Security
3+
title: Secure Microsoft 365 email with Email Security
44
external_link: /learning-paths/secure-o365-email/
55
sidebar:
66
order: 4

src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,19 +19,23 @@ To detect these low volume, malicious emails that do not contain malware, malici
1919

2020
When malicious payloads or URLs are included or attached to an email, additional steps are taken to protect your users. For example:
2121

22-
- **Attack type**: Malicious payload attached to the message.
22+
### Malicious payload attached to the message
23+
2324
- **Example**: Classic campaign technique which utilizes a variety of active attachment types (EXE, DOC, XLS, PPT, OLE, PDF, and more) as the malicious payload for ransomware attacks, Trojans, viruses, and malware.
2425
- **Detections applied**: Machine learning (ML) models on binary bitmaps of the payload as well as higher-level attributes of the payload, with specific focus on signatureless detections for maximum coverage. Additionally, for relevant active payloads, the engine invokes a real-time sandbox to assess behavior and determine maliciousness.
2526

26-
- **Attack type**: Encrypted malicious payload attached to the message, with password in message body as text.
27+
### Encrypted malicious payload attached to the message, with password in message body as text
28+
2729
- **Example**: Campaigns that induce the user to apply a password within the message body to the attachment.
2830
- **Detections applied**: Real-time lexical parsing of message body for password extraction and ML models on binary bitmaps of the payload, signatureless detections for maximum coverage.
2931

30-
- **Attack type**: Malicious URLs within message body.
32+
### Malicious URLs within message body
33+
3134
- **Example**: Typical phish campaigns with a socially engineered call to action URL that will implant malware (for example, watering hole attacks, malvertising, or scripting attacks).
3235
- **Detections applied**: Continuous web crawling, followed by real-time link crawling for a select group of suspicious urls, followed by machine learning applied to URL patterns in combination with other pattern rules and topic-based machine learning models for exhaustive coverage of link-based attacks.
3336

34-
- **Attack type**: Malicious payload linked through a Malicious payload linked through a URL in a messageURL in a message.
37+
### Malicious payload linked through a malicious payload linked through a URL
38+
3539
- **Example**: Campaigns where the URL links through to a remote malicious attachment (for example, in a .doc or .pdf file).
3640
- **Detections applied**: Remote document and/or attachment extraction followed by ML detection tree on the payload, instant crawl of links.
3741

src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ sidebar:
55
order: 5
66
---
77

8-
In the early 2000s, Secure Email Gateways (SEGs) were introduced to deal with a growing need around the routing and filtering of email. While SEGs were successful at their mission for many years, their fundamental design has made it impossible for them to keep pace as phishing threats rapidly grow in scope and sophistication. Continuously updating manual rulesets and policies that were originally built for on-prem servers only inflates the amount of time and effort involved in maintaining a SEG. This has resulted in an increase in cost and complexity while still falling short of catching the most dangerous threats, such as business email compromise (BEC) attacks.
8+
In the early 2000s, Secure Email Gateways (SEGs) were introduced to deal with a growing need around the routing and filtering of email. While SEGs were successful at their mission for many years, their fundamental design has made it impossible for them to keep pace as phishing threats rapidly grow in scope and sophistication.
9+
10+
Continuously updating manual rulesets and policies that were originally built for on-prem servers only inflates the amount of time and effort involved in maintaining a SEG. This has resulted in an increase in cost and complexity while still falling short of catching the most dangerous threats, such as business email compromise (BEC) attacks.
11+
912
As organizations continue to adopt Microsoft 365 to enhance communication and collaboration for their hybrid workforce, it is crucial to take advantage of Microsoft's native security features while integrating complementary, machine learning-based solutions to automatically block and isolate the most dangerous threats. This strategy not only significantly reduces phishing risk, but also simplifies workflows, minimizing the time and effort needed for ongoing security management.
10-
Analysts agree that consolidating capabilities to minimize overlapping functionality is helping organizations reduce cost and complexity. However, they also advise organization's to carefully assess native features to ensure they satisfy all use cases. As Microsoft continues to build out its essential email security features, the growing overlap with SEGs has given organizations an opportunity to streamline security operations by leveraging capabilities already included in their E3 or E5 license. This shift enables organizations to eliminate complex and costly SEG deployments, redirecting a fraction of that budget to integrate lightweight solutions that effectively address the most dangerous phishing threats. Cloudflare Email Security provides an integrated, low-touch solution that augments Microsoft 365 using machine learning threat analysis to automate the detection of BEC and multi-channel attacks.
13+
14+
Analysts agree that consolidating capabilities to minimize overlapping functionality is helping organizations reduce cost and complexity. However, they also advise organization's to carefully assess native features to ensure they satisfy all use cases. As Microsoft continues to build out its essential email security features, the growing overlap with SEGs has given organizations an opportunity to streamline security operations by leveraging capabilities already included in their E3 or E5 license.
15+
16+
This shift enables organizations to eliminate complex and costly SEG deployments, redirecting a fraction of that budget to integrate lightweight solutions that effectively address the most dangerous phishing threats. Cloudflare Email Security provides an integrated, low-touch solution that augments Microsoft 365 using machine learning threat analysis to automate the detection of BEC and multi-channel attacks.

src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,10 @@ sidebar:
55
order: 3
66
---
77

8-
Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications.
8+
Email security is the process of preventing email-based cyber attacks and unwanted communications.
99

1010
It spans protecting inboxes from takeover, protecting domains from spoofing, stopping phishing attacks, preventing fraud, blocking malware delivery, filtering spam, and using encryption to protect the contents of emails from unauthorized persons.
1111

12-
Security and privacy were not built into email when it was first invented, and despite email's importance as a communication method, these are still not built into email by default. As a result, email is a major attack vector for large and small organizations, and for individuals well.
12+
Security and privacy were not built into email when it was first invented, and despite email's importance as a communication method, these are still not built into email by default. As a result, email is a major attack vector for large and small organizations, and for individuals well.
13+
14+
For more information on email security, refer to the [Learning Center](https://www.cloudflare.com/learning/email-security/what-is-email/).

src/content/docs/learning-paths/secure-o365-email/concepts/what-is-phishing-attack.mdx

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,10 @@ sidebar:
55
order: 2
66
---
77

8-
Email security is the process of preventing [email](https://www.cloudflare.com/learning/email-security/what-is-email/)-based cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery, filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/), and using [encryption](https://www.cloudflare.com/learning/ssl/what-is-encryption/) to protect the contents of emails from unauthorized persons.*
8+
Email security is the process of preventing email-based cyber attacks and unwanted communications.
99

10-
Security and [privacy](https://www.cloudflare.com/learning/privacy/what-is-data-privacy/) were not built into email when it was first invented, and despite email's importance as a communication method, these are still not built into email by default. As a result, email is a major [attack vector](https://www.cloudflare.com/learning/security/glossary/attack-vector/) for large and small organizations, and for individuals well.*
10+
It spans protecting inboxes from takeover, protecting domains from spoofing, stopping phishing attacks, preventing fraud, blocking malware delivery, filtering spam, and using encryption to protect the contents of emails from unauthorized persons.
11+
12+
Security and privacy were not built into email when it was first invented. Despite email's importance as a communication method, security and privacy are still not built into email by default. As a result, email is a major attack vector for large and small organizations, and for individuals well.
13+
14+
For more information on what a phishing attack is, refer to the [Learning Center](https://www.cloudflare.com/en-gb/learning/access-management/phishing-attack/).

src/content/docs/learning-paths/secure-o365-email/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ new_learning_path: true
55
pcx_content_type: learning-path
66
head:
77
- tag: title
8-
content: Secure Microsoft 365 email with Email Security
8+
content: Secure Microsoft 365 email with Email Security.
99
description: Protect Microsoft 365 email from phishing and malware attacks.
1010

1111
---
1212

1313
import { LearningPath } from "~/components"
1414

15-
<LearningPath file="secure-o365-email" />
15+
<LearningPath file="secure-o365-email" />

src/content/learning-paths/secure-o365-email.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@
55
"description": "Use Cloudflare's Email Security to protect your Microsoft 365 email inbox from phishing and malware attacks.",
66
"products": ["Email Security"],
77
"product_group": "Cloudflare One"
8-
}
8+
}

0 commit comments

Comments
 (0)