Skip to content

Commit b0a39bd

Browse files
[Email Security] Add secure mail flow (#24295)
* [Email Security] Add secure mail flow * Keep copy same as Area 1 * update copy to reflect the original * Updating docs based on Todd's suggestion * Use Google Workspace instead of Gmail * Update heading * Apply suggestions from code review Co-authored-by: Patricia Santa Ana <[email protected]> --------- Co-authored-by: Patricia Santa Ana <[email protected]>
1 parent 7066986 commit b0a39bd

File tree

2 files changed

+64
-3
lines changed

2 files changed

+64
-3
lines changed

src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar:
55
order: 4
66
---
77

8-
import { Render } from "~/components"
8+
import { Render, GlossaryTooltip } from "~/components"
99

1010
![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_Gmail_MX_Inline.png)
1111

@@ -64,4 +64,24 @@ If desired, you can create a separate quarantine for each of the dispositions.
6464

6565
## 4. Set up MX/Inline
6666

67-
<Render file="email-security/deployment/set-up-mx-inline-step"/>
67+
<Render file="email-security/deployment/set-up-mx-inline-step"/>
68+
69+
## 5. (Recommended) Secure Google Workspace from MX records bypass
70+
71+
One method of a DNS attack is to search for old MX records and send <GlossaryTooltip term="phishing">phishing</GlossaryTooltip> emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Google Workspace only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended.
72+
73+
:::caution[Important]
74+
This step should not be performed until 72 hours after all domains in your Google Workspace have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain.
75+
:::
76+
77+
After 72 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google Workspace only accepts messages that are first received by Email Security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email Security by injecting messages directly into Google Workspace.
78+
79+
1. Access the [Google Administrative Console](https://admin.google.com/), then select **Apps** > **Google Workspace** > **Gmail**.
80+
81+
2. Select **Spam, Phishing and Malware**.
82+
83+
3. Go to **Inbound gateway** and select **Edit Inbound gateway**.
84+
85+
4. Enable **Reject all mail not from gateway IPs** and select **Save**.
86+
87+
5. Select **Save** once more to commit and activate the configuration change in the Gmail advanced configuration console.

src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx

Lines changed: 42 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,4 +105,45 @@ To create the transport rules that will send emails with certain [dispositions](
105105

106106
## 5. Set up MX/Inline
107107

108-
<Render file="email-security/deployment/set-up-mx-inline-step"/>
108+
<Render file="email-security/deployment/set-up-mx-inline-step"/>
109+
110+
## 6. (Recommended) Secure Microsoft 365 from MX records bypass
111+
112+
One method of a DNS attack is to search for old MX records and send <GlossaryTooltip term="phishing">phishing</GlossaryTooltip> emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Microsoft 365 only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended.
113+
114+
:::caution[Important]
115+
This step should not be performed until 72 hours after all domains in your Microsoft 365 organization have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain.
116+
:::
117+
118+
#### Create Connector
119+
120+
1. Go to the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage).
121+
122+
2. Go to **Mail flow** > **Connectors**.
123+
124+
3. Select **Add a connector**.
125+
126+
4. Go to **Connection from** > **Partner organization**.
127+
128+
5. Select **Next**.
129+
130+
6. Set the following options:
131+
132+
- **Name** - `Secure M365 Inbound`
133+
- **Description** - `Only accept inbound email from Email Security`
134+
135+
7. Select **Next**.
136+
137+
8. Make sure **By Verifying that the sender domain matches one of the following domains** is selected.
138+
139+
9. Enter `*` in the text field, and select **+**.
140+
141+
10. Select **Next**.
142+
143+
11. Make sure **Reject email messages if they aren't sent over TLS** is selected.
144+
145+
12. Still in the same screen, select **Reject email messages if they aren't sent from within this IP address range**, and enter all the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page.
146+
147+
13. Select **Next**.
148+
149+
14. Review your settings and select **Create connector**.

0 commit comments

Comments
 (0)