Skip to content

Commit a2ecb9b

Browse files
Reorder pages, change content type, adding set up api page, add subheading, add links for seo
1 parent 5345d11 commit a2ecb9b

File tree

10 files changed

+39
-8
lines changed

10 files changed

+39
-8
lines changed

src/content/docs/learning-paths/secure-o365-email/configure-email-security/audit-logs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Enable audit logs
33
pcx_content_type: how-to
44
sidebar:
5-
order: 4
5+
order: 6
66
---
77

88
With Email Security, you can enable logs to review actions performed on your account.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Create allow policies
33
pcx_content_type: how-to
44
sidebar:
5-
order: 4
5+
order: 3
66
---
77

88
Email Security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/index.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,6 @@ sidebar:
55
order: 3
66
---
77

8-
With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up Email Security.
8+
With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up Email Security.
9+
10+
In this module, you will configure your email environment.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/report-phish.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Report phish
33
pcx_content_type: how-to
44
sidebar:
5-
order: 4
5+
order: 5
66
---
77

88
Before deploying Email Security to production, you will have to consider reporting any phishing attacks, evaluating which disposition to assign a specific message, and using different screen criteria to search through your inbox.

src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Set additional detections
33
pcx_content_type: how-to
44
sidebar:
5-
order: 5
5+
order: 4
66
---
77

88
Email Security allows you to configure the following additional detections:

src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure auto-moves
3-
pcx_content_type: overview
3+
pcx_content_type: how-to
44
sidebar:
55
order: 3
66
---

src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/index.mdx

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,14 @@ sidebar:
55
order: 4
66
---
77

8+
Now that you have set up your email environment, you can enable auto-move events.
9+
10+
:::caution
11+
Ensure you have completed the previous modules before enabling auto-moves.
12+
:::
13+
14+
Auto-move events are events where emails are automatically moved to different inboxes based on the disposition Email Security assigned to them.
15+
816
When you set up auto-moves, you can move messages manually or set up automatic moves to send messages matching certain [dispositions](/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions/) to specific folders within a user's mailbox.
917

1018
You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email Security. Scanned emails that were previously delivered and now match this new phishing information will be moved.
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Set up Microsoft Graph API
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 6
6+
---
7+
8+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
9+
2. Select **Email Security**.
10+
3. Select **Monitoring**.
11+
4. Enable **Microsoft Integration**:
12+
1. **Name integration**: Add your integration name, then select **Continue**.
13+
2. **Authorize integration**:
14+
- Select **Authorize**. Selecting **Authorize** will take you to the Microsoft Sign in page where you will have to enter your email address.
15+
- Once you enter your email address, select **Next**.
16+
- After selecting **Next**, the system will show a dialog box with a list of requested permissions. Select **Accept** to authorize Email Security. Upon authorization, you will be redirected to a page where you can review details and enroll integration.
17+
3. **Review details**: Review your integration details, then:
18+
- Select **Complete Email Security set up** where you will be able to connect your domains and configure auto-moves.
19+
- Select **Continue to Email Security**.

src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/monitor-detections.mdx

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,4 +30,6 @@ There are three ways for searching emails:
3030

3131
Additional information on search can be found on the [Screen criteria](/email-security/reporting/search/) documentation.
3232

33+
### Export messages
34+
3335
With Email Security, you can export messages to a CSV file. Via the dashboard, you can export up to 1,000 rows. If you want to export all messages, you can use the [API](https://developers.cloudflare.com/api/operations/email_security_get_message).

src/content/partials/learning-paths/zero-trust/email-dispositions.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,6 @@
77
|-------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|----------------------------------------------------------------------------|---|
88
| MALICIOUS | Traffic invoked multiple phishing verdict triggers, met thresholds for bad behavior, and is associated with active campaigns. | Block | |
99
| SUSPICIOUS | Traffic associated with phishing campaigns (and is under further analysis by our automated systems). | Research these messages internally to evaluate legitimacy. | |
10-
| SPOOF | Traffic associated with phishing campaigns that is either non-compliant with your email authentication policies (SPF, DKIM, DMARC) or have mismatching Envelope From and Header From values. | Block after investigating (can be triggered by third-party mail services). | |
10+
| SPOOF | Traffic associated with phishing campaigns that is either non-compliant with your email authentication policies ([SPF](https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-spf-record/), [DKIM](https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-dkim-record/), [DMARC](https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-dmarc-record/)) or have mismatching Envelope From and Header From values. | Block after investigating (can be triggered by third-party mail services). | |
1111
| SPAM | Traffic associated with non-malicious, commercial campaigns. | Route to existing Spam quarantine folder. | |
12-
| BULK | Traffic associated with Graymail, that falls in between the definitions of SPAM and SUSPICIOUS. For example, a marketing email that intentionally obscures its unsubscribe link. | Monitor or tag | |
12+
| BULK | Traffic associated with [Graymail](https://en.wikipedia.org/wiki/Graymail), that falls in between the definitions of SPAM and SUSPICIOUS. For example, a marketing email that intentionally obscures its unsubscribe link. | Monitor or tag | |

0 commit comments

Comments
 (0)