Skip to content

Commit cd4c001

Browse files
Adding some bits of module 4
1 parent 5fa12f4 commit cd4c001

File tree

8 files changed

+82
-1
lines changed

8 files changed

+82
-1
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
---
2+
title: Audit logs
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 4
6+
---
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
title: Email dispositions
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 2
6+
---
7+
8+
{/* CREATE PARTIAL */}
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
title: Enable auto-move options
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 2
6+
---
7+
8+
When you set up auto-moves in Section 5, you can move messages manually or set up automatic moves to send messages matching certain dispositions to specific folders within a user’s mailbox. You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email Security. Scanned emails that were previously delivered and now match this new phishing information will be moved.
9+
10+
Refer to the Office 365 guide in section 5 for detailed information.
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
title: What to consider prior to production deployment
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 1
6+
---
7+
8+
Before deploying Email Security to production, you will have to consider reporting any phishing attacks, evaluating which disposition to assign a specific message, and using different screen criteria to search through your inbox.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: Phish reports
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 4
6+
---
7+
8+
Email Security automatically generates a Phishing Risk Assessment Report (PRA) to provide an overview of your email traffic. The report only includes malicious emails. Spam and bulk emails are not included.
9+
10+
To generate a phishing risk assessment report:
11+
12+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
13+
2. Select **Monitoring**.
14+
3. Select **Generate summary report**.
15+
4. Select **Generate and download**.
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Search through your inbox
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 3
6+
---
7+
8+
With Email Security, you can use different screen criteria to search through your email inbox.There are three to scan through your email inbox:
9+
10+
- **Popular screen**: Allows you to view messages based on common pre-defined criteria.
11+
- **Regular screen**: Allows you to investigate your inbox by inserting a term to screen across all criteria.
12+
- **Advanced screen**: Allows you to narrow message results based on specific criteria.
13+
14+
Refer to [Search email](https://developers.cloudflare.com/cloudflare-one/insights/email-monitoring/search-email/) for advanced documentation.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: Submit a phish
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 2
6+
---
7+
8+
PhishNet is an add-in button that helps users to submit directly to Email Security phish samples missed by Email Security detection.
9+
10+
PhishNet is an add-in button that helps users to submit directly to Email Security <GlossaryTooltip term="phishing">phish</GlossaryTooltip> samples missed by Email Security's detection.
11+
12+
To set up PhishNet O365:
13+
14+
1. Log in to the Microsoft admin panel. Go to **Microsoft 365 admin center** > **Settings** > **Integrated Apps**.
15+
2. Select **Upload custom apps**.
16+
3. Choose **Provide link to manifest file** and paste the the following URL:
17+
```txt
18+
https://phishnet-o365.area1cloudflare-webapps.workers.dev?clientId=ODcxNDA0MjMyNDM3NTA4NjQwNDk1Mzc3MDIxNzE0OTcxNTg0Njk5NDEyOTE2NDU5ODQyNjU5NzYzNjYyNDQ3NjEwMzIxODEyMDk1NQ
19+
```
20+
4. Verify and complete the wizard.

src/content/docs/learning-paths/zero-trust-web-access/access-application/best-practices.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ Access applications have an inherently flexible and powerful domain structure ca
2424

2525
Many customers who have workflows designed around internal web applications, especially those that were built internally, often see challenges related to interdependencies on multiple internal services. Separately, there can be challenges related to SPAs (Single-Page Applications) that make onboarding to a Zero Trust Web Access service difficult. For example, an application may have iFrames or other embedded systems that rely on different internal and/or external addresses.
2626

27-
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/zero-trust-web-access/terraform/) or another Infrastructure as Code (IaC) service.
27+
If your internal service operates in this way, we recommend specifying multiple top-level domains in a single Access application. Otherwise, if the goal of using multiple domains is to streamline or simplify policy creation, we recommend making one primary domain per application, and automating the rest of your deployment [using Terraform](/learning-paths/zero-trust-web-access/terraform/) or another Infrastructure as Code (IaC) service.

0 commit comments

Comments
 (0)