Skip to content

Commit e5c9579

Browse files
Adding module 3
1 parent b7afd0f commit e5c9579

File tree

13 files changed

+201
-7
lines changed

13 files changed

+201
-7
lines changed
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Active directory sync
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 2
6+
---
7+
8+
Directories are folders to store user data. Email Security allows you to manage directories from the Cloudflare dashboard.
9+
10+
To manage a Microsoft directory:
11+
12+
1. Log in to [Zero Trust ](https://one.dash.cloudflare.com/).
13+
2. Select **Email security**.
14+
3. Select **Directories**.
15+
4. Under **Directory name**, select **MS directory**.
16+
5. From here, you can manage **Groups** or **Users** directories.
17+
18+
Email Security allows you to view and manage your groups directory and their [impersonation registry](https://developers.cloudflare.com/cloudflare-one/email-security/detection-settings/impersonation-registry/).
19+
When a group is added to the registry, all members are registered by default.
20+
21+
To manage your group directory, on the **MS directory** page, select **Groups**.
22+
23+
To add a single group to the registry:
24+
25+
1. Select the group name you want to add.
26+
2. Select the three dots > **Add to registry**.
27+
28+
To add multiple groups to the registry at once:
29+
30+
1. Select the group names you want to add to the registry.
31+
2. Select the **Action** dropdown list.
32+
3. Select **Add to registry**.
33+
34+
In addition, Email Security Allows you to:
35+
36+
- [Remove groups from the registry](/cloudflare-one/email-security/directories/manage-ms-directories/manage-groups-directory/#remove-groups-from-registry)
37+
- [Filter the impersonation registry](/cloudflare-one/email-security/directories/manage-ms-directories/manage-groups-directory/#filter-impersonation-registry)
38+
- [Manage users in your directory](/cloudflare-one/email-security/directories/manage-ms-directories/manage-users-directory/)
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Create allow policies
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 4
6+
---
7+
8+
Email Security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning.
9+
10+
You can choose how Email Security will handle messages that match your criteria:
11+
12+
- **Trusted Sender**: Messages will bypass all [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) and link following by Email Security. Typically, it only applies to phishing simulations from vendors such as KnowBe4.
13+
- **Exempt Recipient**: Will exempt messages from all Email Security [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) intended for recipients matching this pattern (email address or regular expression only). Typically, this only applies to submission mailboxes for user reporting to security.
14+
- **Acceptable Sender**: Will exempt messages from the `SPAM`, `SPOOF`, and `BULK` [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/) (but not `MALICIOUS` or `SUSPICIOUS`). Commonly used for external domains and sources that send mail on behalf of your organization, such as marketing emails or internal tools.
15+
16+
## Configure allow policies
17+
18+
To configure allow policies:
19+
20+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
21+
2. Select **Email Security**.
22+
3. Select **Settings**, then go to **Detection settings** > **Allow policies**.
23+
4. On the **Detection settings** page, select **Add a policy**.
24+
5. On the **Add an allow policy** page, enter the policy information:
25+
- **Input method**: Choose between **Manual input**, and **Uploading an allow policy**:
26+
- **Manual input**:
27+
- **Action**: Select one of the following to choose how Email Security will handle messages that match your criteria:
28+
- **Trust sender**: Messages will bypass all detections and link following.
29+
- **Exempt recipient**: Message to this recipient will bypass all detections.
30+
- **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions.
31+
- **Rule type**: Specify the scope of your policy. Choose one of the following:
32+
- **Email addresses**: Must be a valid email.
33+
- **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries.
34+
- **Domains**: Must be a valid domain.
35+
- **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email.
36+
- **(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email Security will only honor policies that pass authentication.
37+
- **Notes**: Provide additional information about your allow policy.
38+
- **Uploading an allow policy**: Upload a file no larger than 150 KB. The file can only contain `Pattern`, `Notes`, `Verify Email`, `Trusted Sender`, `Exempt Recipient` and `Acceptable Sender` fields. The first row must be a header row.
39+
6. Select **Save**.
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
title: Impersonation registry
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 3
6+
---
7+
8+
Attackers often try to impersonate executives within an organization when sending malicious emails (with requests about banking information, trade secrets, and more), which is known as a Business Email Compromise (BEC) attack .
9+
10+
This feature protects against these attacks by looking for spoofs of known key users in an organization . Information about key users you either synced with your directory or entered manually in the dashboard is used by Email Security to run enhanced scan techniques and find these spoofed emails.
11+
12+
To add a user to the impersonation registry:
13+
14+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
15+
2. Select **Email Security**.
16+
3. Select **Settings** > **Impersonation registry**.
17+
4. Select **Add a user**.
18+
5. Select **Input method**: Choose between **Manual input**, **Upload manual list**, and **Select from existing directories**:
19+
- **Manual input**: Enter the following information:
20+
- **User info**: enter a valid **Display name**.
21+
- **User email**: Enter one of the following:
22+
- **Email address**: Enter all known email addresses, separated by a comma.
23+
- **Regular expressions**: Must be valid Java expressions.
24+
- **Upload manual list**: You can upload a file no larger than 150 KB containing all variables of potential emails. The file must contain `Display_Name` and `Email`, and the first row must be the header row.
25+
- **Select from existing directories**:
26+
- **Select directory**: Select your directory.
27+
- **Add users or groups**: Choose the users or groups you want to register.
28+
6. Select **Save**.
29+
30+
For more information on how to edit and remove users, refer to [Impersonation Registry](/cloudflare-one/email-security/detection-settings/impersonation-registry/#edit-users).
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
---
2+
title: Initial Email Security Configuration
3+
pcx_content_type: overview
4+
sidebar:
5+
order: 1
6+
---
7+
8+
With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up the tool.
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Set additional detections
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 5
6+
---
7+
8+
Email Security allows you to configure the following additional detections:
9+
10+
- [Domain age](/cloudflare-one/email-security/detection-settings/additional-detections/#configure-domain-age)
11+
- [Blank email detection](/cloudflare-one/email-security/detection-settings/additional-detections/#configure-blank-email-detection)
12+
- [Automated Clearing House (ACH)](/cloudflare-one/email-security/detection-settings/additional-detections/#configure-ach-change-from-free-email-detection) change from free email detection.
13+
- [HTML attachment email detection](/cloudflare-one/email-security/detection-settings/additional-detections/#configure-html-attachment-email-detection)
14+
15+
To configure additional detections:
16+
17+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
18+
2. Select **Email Security**.
19+
3. Select **Settings**.
20+
4. On the Settings page, go to **Detection settings** > **Additional detections**, and select **Edit**.
21+
22+
## Configure domain age
23+
24+
The domain age is the time since the domain has been registered.
25+
26+
To configure a domain age:
27+
28+
1. On the **Edit additional detections** page:
29+
- Select **Malicious domain age**: Controls the threshold for a malicious disposition. Maximum of 100 days.
30+
- Select **Suspicious domain age**: Controls the threshold for a suspicious disposition. Maximum of 100 days.
31+
2. Select **Save**.
32+
33+
## Configure blank email detection
34+
35+
Blank email detection detects emails with blank bodies and assigns a default disposition. You can choose between **Malicious** and **Suspicious** as dispositions.
36+
37+
To enable blank email detection:
38+
39+
1. On the **Edit additional detections** page, enable **Blank email detection**.
40+
2. Choose between **Malicious** and **Suspicious**.
41+
3. Select **Save**.
42+
43+
## Configure ACH change from free email detection
44+
45+
[Automated Clearing House (ACH)](https://en.wikipedia.org/wiki/Automated_clearing_house) is a banking term related to direct deposits. ACH change from free email detection detects payroll inquiries or change requests from free email domains and assigns a default disposition. You can choose between **Malicious** and **Suspicious** as dispositions.
46+
47+
To enable ACH change from free email detection:
48+
49+
1. On the **Edit additional detections** page, enable **ACH change from free email detection**.
50+
2. Choose between **Malicious** and **Suspicious**.
51+
3. Select **Save**.
52+
53+
## Configure HTML Attachment Email Detection
54+
55+
HTML attachment email detection detects HTM and HTML attachments in emails and assigns a default disposition.
56+
57+
To enable HTML attachment email detection:
58+
59+
1. On the **Edit additional detections** page, enable **HTML attachment email detection**.
60+
2. Choose between **Malicious** and **Suspicious**.
61+
3. Select **Save**.
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Testing before production deployment
3+
pcx_content_type: how-to
4+
sidebar:
5+
order: 6
6+
---
7+
8+
Email Security can be deployed quickly. Setting up the Graph API only takes a few minutes.
9+
10+
Email Security uses machine learning techniques to better understand your email environment. For this reason, there is a 5-7 day baseline period in which False Negative and False Positives are to be expected while the system learns what your normal mail patterns are.
11+
12+
Moving from a cold start straight into production is not recommended.
13+
14+
You can use the following testing methods which provide visibility during the baseline period without disruption to mail flow:
15+
16+
- [Microsoft O365 Journaling Setup](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/office365-journaling/)
17+
- [Microsoft O365 Graph API Setup](/cloudflare-one/email-security/setup/post-delivery-deployment/api/)

src/content/docs/learning-paths/secure-o365-email/get-started/create-email-security-account.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ If you do not have a Cloudflare account, you can create one for free by referrin
1111

1212
From there, your account team will create an Email Security account for you. To establish your tenant, you will need the following information:
1313

14-
- *Average Monthly Inbound Message Volume*
15-
- *Number of Active Email Users*
16-
- *Domain(s)*
17-
- *Admin Email Address*
14+
- Average monthly inbound message volume
15+
- Number of active email users
16+
- At least one domain
17+
- Admin email address

src/content/docs/learning-paths/secure-o365-email/get-started/deployment-models.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,5 @@ sidebar:
88
While there are multiple deployment methods, the easiest way to get started with Email Security is via the API deployment method.
99

1010
When you choose the [API deployment](/cloudflare-one/email-security/setup/post-delivery-deployment/api/), Email Security can both scan and take actions on emails after they have reached a user's inbox.
11+
1112
With a [Journaling setup](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/office365-journaling/) alone without API integration, Email Security can only scan emails after it has reached a user's inbox.

0 commit comments

Comments
 (0)