Skip to content

Commit dbbde76

Browse files
Apply suggestions from code review
Co-authored-by: Pedro Sousa <[email protected]>
1 parent 02003f0 commit dbbde76

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

src/content/docs/cloudflare-one/email-security/detection-settings/allow-policies.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ To configure allow policies:
2121
- **Action**: Select one of the following to choose how Email Security will handle messages that match your criteria:
2222
- **Trust sender**: Messages will bypass all detections and link following.
2323
- **Exempt recipient**: Message to this recipient will bypass all detections.
24-
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. Refer to [Allow policy configuration use cases](/cloudflare-one/email-security/detection-settings/allow-policies/#use-case-1) for use case examples on how to configure allow policies for accept sender.
24+
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. Refer to [Allow policy configuration use cases](#use-case-1) for use case examples on how to configure allow policies for accept sender.
2525
- **Rule type**: Specify the scope of your policy. Choose one of the following:
2626
- **Email addresses**: Must be a valid email.
2727
- **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries.
@@ -34,26 +34,26 @@ To configure allow policies:
3434

3535
<Details header="Allow policy configuration use cases">
3636

37-
The following use cases present some scenarios that will show you how to properly configure allow policies for accept sender.
37+
The following use cases show how you could configure allow policies for accept sender.
3838

3939
### Use case 1
4040

41-
<Example title = "Company receives emails from third party providers not used internally. These emails are sent from the service provider, and Email Security gives these emails an incorrect disposition.">
41+
<Example title="Company receives emails from third-party providers not used internally. These emails are sent from the service provider, and Email Security gives these emails an incorrect disposition.">
4242
This use case can affect companies such as Shopify, PayPal, and Docusign.
4343

4444
To solve this:
4545

46-
1. Submit a [team submission](/cloudflare-one/email-security/email-monitoring/search-email/#team-submissions).
46+
1. Create a [team submission](/cloudflare-one/email-security/email-monitoring/search-email/#team-submissions).
4747
2. Inform your Cloudflare contact about the escalation.
48-
3. Do not set up allow policies, or blocked senders. In this use case, configuring allow policies will create a security gap. Setting up blocked senders will block legitimate emails from providers such as Shopify, PayPal, and Docusign.
48+
3. Do not set up allow policies or blocked senders. In this use case, configuring allow policies will create a security gap. Setting up blocked senders will block legitimate emails from providers such as Shopify, PayPal, and Docusign.
4949
</Example>
5050

5151
### Use case 2
5252

5353

54-
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof.">
54+
<Example title="Company receives emails via third-party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof.">
5555

56-
This use case can cause the emails you want to receive to follow the auto-moves rules you set up. This use case affects emails from internal tools (such as Salesforce, Atlassian, Figma, and more) that are given an incorrect disposition.
56+
This use case can cause the emails you want to receive to follow the auto-moves rules you set up. This use case affects emails from internal tools (such as Salesforce, Atlassian, and Figma) that are given an incorrect disposition.
5757

5858
To solve this, when you add an allow policy in the Zero Trust dashboard:
5959

@@ -65,9 +65,9 @@ The following use cases present some scenarios that will show you how to properl
6565

6666
### Use case 3
6767

68-
<Example title = "Company receives emails via third party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof. The custom email domain does not support DMARC, SPF, DKIM, and would fail Sender Verification">
68+
<Example title="Company receives emails via third-party providers that are used internally. These emails are sent from the company's custom domain, but Email Security marks these emails as bulk, spam, or spoof. The custom email domain does not support DMARC, SPF, or DKIM, and would fail Sender Verification.">
6969

70-
This use case impacts the emails from internal tools (such as Salesforce, Atlassian, Figma, and more) that are given an incorrect disposition.
70+
This use case impacts the emails from internal tools (such as Salesforce, Atlassian, and Figma) that are given an incorrect disposition.
7171

7272
To solve this, when you add an allow policy in the Zero Trust dashboard:
7373

0 commit comments

Comments
 (0)