diff --git a/public/__redirects b/public/__redirects index 4b59f640d1ef6f1..7070fd9e718f3ed 100644 --- a/public/__redirects +++ b/public/__redirects @@ -2435,7 +2435,7 @@ /cloudflare-one/email-security/detection-settings/trusted-domains/ /cloudflare-one/email-security/settings/trusted-domains/ 301 /cloudflare-one/email-security/settings/detection-settings/impersonation-registry/* /cloudflare-one/email-security/settings/impersonation-registry/:splat 301 /cloudflare-one/email-security/detection-settings/* /cloudflare-one/email-security/settings/detection-settings/:splat 301 - +/cloudflare-one/email-security/reference/domain-information/ /cloudflare-one/email-security/settings/domain-management/domain/ 301 # Learning paths diff --git a/src/content/changelog/email-security-cf1/2024-11-07-logpush-user-actions.mdx b/src/content/changelog/email-security-cf1/2024-11-07-logpush-user-actions.mdx index 9f19f19fdf1cab9..1ee50cf8adc4259 100644 --- a/src/content/changelog/email-security-cf1/2024-11-07-logpush-user-actions.mdx +++ b/src/content/changelog/email-security-cf1/2024-11-07-logpush-user-actions.mdx @@ -1,24 +1,24 @@ --- -title: Use Logpush for Email Security user actions -description: Send user action logs for Email Security to an endpoint of your choice with Cloudflare Logpush. +title: Use Logpush for Email security user actions +description: Send user action logs for Email security to an endpoint of your choice with Cloudflare Logpush. date: 2024-11-07T23:22:49Z --- -You can now send user action logs for Email Security to an endpoint of your choice with Cloudflare Logpush. +You can now send user action logs for Email security to an endpoint of your choice with Cloudflare Logpush. -Filter logs matching specific criteria you have set or select from multiple fields you want to send. For all users, we will log the date and time, user ID, IP address, details about the message they accessed, and what actions they took. +Filter logs matching specific criteria you have set or select from multiple fields you want to send. For all users, we will log the date and time, user ID, IP address, details about the message they accessed, and what actions they took. -When creating a new Logpush job, remember to select **Audit logs** as the dataset and filter by: +When creating a new Logpush job, remember to select **Audit logs** as the dataset and filter by: - **Field**: `"ResourceType"` - **Operator**: `"starts with"` -- **Value**: `"email_security"`. +- **Value**: `"email_security"`. ![Logpush-user-actions](~/assets/images/changelog/email-security/Logpush-User-Actions.png) -For more information, refer to [Enable user action logs](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs). +For more information, refer to [Enable user action logs](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs). -This feature is available across all Email Security packages: +This feature is available across all Email security packages: -- **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Enterprise** +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2024-12-19-escalate-user-submissions.mdx b/src/content/changelog/email-security-cf1/2024-12-19-escalate-user-submissions.mdx index cbc779921612b11..df77310ab1f6f9c 100644 --- a/src/content/changelog/email-security-cf1/2024-12-19-escalate-user-submissions.mdx +++ b/src/content/changelog/email-security-cf1/2024-12-19-escalate-user-submissions.mdx @@ -4,16 +4,16 @@ description: Escalate user-submitted messages for reclassification by the Cloudf date: 2024-12-19T23:22:49Z --- -After you triage your users' submissions (that are machine reviewed), you can now escalate them to our team for reclassification (which are instead human reviewed). User submissions from the submission alias, PhishNet, and our API can all be escalated. +After you triage your users' submissions (that are machine reviewed), you can now escalate them to our team for reclassification (which are instead human reviewed). User submissions from the submission alias, PhishNet, and our API can all be escalated. ![Escalate](~/assets/images/changelog/email-security/Escalate.png) -From **Reclassifications**, go to **User submissions**. Select the three dots next to any of the user submissions, then select **Escalate** to create a team request for reclassification. The Cloudflare dashboard will then show you the submissions on the **Team Submissions** tab. +From **Reclassifications**, go to **User submissions**. Select the three dots next to any of the user submissions, then select **Escalate** to create a team request for reclassification. The Cloudflare dashboard will then show you the submissions on the **Team Submissions** tab. -Refer to [User submissions](/cloudflare-one/email-security/reclassifications/user-submissions/) to learn more about this feature. +Refer to [User submissions](/cloudflare-one/email-security/reclassifications/user-submissions/) to learn more about this feature. -This feature is available across these Email Security packages: +This feature is available across these Email security packages: -- **Advantage** -- **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Advantage** +- **Enterprise** +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2024-12-19-reclassification-tab.mdx b/src/content/changelog/email-security-cf1/2024-12-19-reclassification-tab.mdx index 1afb1da75dec499..15029deeb67aefd 100644 --- a/src/content/changelog/email-security-cf1/2024-12-19-reclassification-tab.mdx +++ b/src/content/changelog/email-security-cf1/2024-12-19-reclassification-tab.mdx @@ -8,8 +8,8 @@ import { Render } from "~/components"; You now have more transparency about team and user submissions for phishing emails through a **Reclassification** tab in the Zero Trust dashboard. -Reclassifications happen when users or admins [submit a phish](/cloudflare-one/email-security/settings/phish-submissions/) to Email Security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models. +Reclassifications happen when users or admins [submit a phish](/cloudflare-one/email-security/settings/phish-submissions/) to Email security. Cloudflare reviews and - in some cases - reclassifies these emails based on improvements to our machine learning models. This new tab increases your visibility into this process, allowing you to view what submissions you have made and what the outcomes of those submissions are. -![Use the Reclassification area to review submitted phishing emails](~/assets/images/changelog/email-security/reclassifications-tab.png) \ No newline at end of file +![Use the Reclassification area to review submitted phishing emails](~/assets/images/changelog/email-security/reclassifications-tab.png) diff --git a/src/content/changelog/email-security-cf1/2025-02-07-check-status.mdx b/src/content/changelog/email-security-cf1/2025-02-07-check-status.mdx index 6f40d936b8188ee..c0085aac3426681 100644 --- a/src/content/changelog/email-security-cf1/2025-02-07-check-status.mdx +++ b/src/content/changelog/email-security-cf1/2025-02-07-check-status.mdx @@ -1,27 +1,27 @@ --- -title: Check status of Email Security or Area 1 -description: Check the operational status of Email Security and Area 1 on the Cloudflare Status page. +title: Check status of Email security or Area 1 +description: Check the operational status of Email security and Area 1 on the Cloudflare Status page. date: 2025-02-27T23:22:49Z --- -Concerns about performance for Email Security or Area 1? You can now check the operational status of both on the [Cloudflare Status page](https://www.cloudflarestatus.com/). +Concerns about performance for Email security or Area 1? You can now check the operational status of both on the [Cloudflare Status page](https://www.cloudflarestatus.com/). -For Email Security, look under **Cloudflare Sites and Services**. +For Email security, look under **Cloudflare Sites and Services**. -- **Dashboard** is the dashboard for Cloudflare, including Email Security -- **Email Security (Zero Trust)** is the processing of email -- **API** are the Cloudflare endpoints, including the ones for Email Security +- **Dashboard** is the dashboard for Cloudflare, including Email security +- **Email security (Zero Trust)** is the processing of email +- **API** are the Cloudflare endpoints, including the ones for Email security For Area 1, under **Cloudflare Sites and Services**: -- **Area 1 - Dash** is the dashboard for Cloudflare, including Email Security -- **Email Security (Area1)** is the processing of email -- **Area 1 - API** are the Area 1 endpoints +- **Area 1 - Dash** is the dashboard for Cloudflare, including Email security +- **Email security (Area1)** is the processing of email +- **Area 1 - API** are the Area 1 endpoints ![Status-page](~/assets/images/changelog/email-security/Status-Page.png) -This feature is available across these Email Security packages: +This feature is available across these Email security packages: -- **Advantage** -- **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Advantage** +- **Enterprise** +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-02-07-open-links-security-center.mdx b/src/content/changelog/email-security-cf1/2025-02-07-open-links-security-center.mdx index 0988e570a15d4b4..5e4e5a9de9aa247 100644 --- a/src/content/changelog/email-security-cf1/2025-02-07-open-links-security-center.mdx +++ b/src/content/changelog/email-security-cf1/2025-02-07-open-links-security-center.mdx @@ -12,7 +12,7 @@ From **Investigation**, go to **View details**, and look for the **Links identif For more details, refer to [Open links](/cloudflare-one/email-security/monitoring/search-email/#open-links). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Advantage** - **Enterprise** diff --git a/src/content/changelog/email-security-cf1/2025-02-25-dlp-assist-for-m365.mdx b/src/content/changelog/email-security-cf1/2025-02-25-dlp-assist-for-m365.mdx index 6e758697e0e90c7..109b144b62329b8 100644 --- a/src/content/changelog/email-security-cf1/2025-02-25-dlp-assist-for-m365.mdx +++ b/src/content/changelog/email-security-cf1/2025-02-25-dlp-assist-for-m365.mdx @@ -4,11 +4,11 @@ description: Quickly deploy a free Email DLP solution for Microsoft 365 environm date: 2025-02-25T23:22:49Z --- -Cloudflare Email Security customers who have Microsoft 365 environments can quickly deploy an Email DLP (Data Loss Prevention) solution for free. +Cloudflare Email security customers who have Microsoft 365 environments can quickly deploy an Email DLP (Data Loss Prevention) solution for free. -Simply deploy our add-in, create a DLP policy in Cloudflare, and configure Outlook to trigger behaviors like displaying a banner, alerting end users before sending, or preventing delivery entirely. +Simply deploy our add-in, create a DLP policy in Cloudflare, and configure Outlook to trigger behaviors like displaying a banner, alerting end users before sending, or preventing delivery entirely. -Refer to [Outbound Data Loss Prevention](/cloudflare-one/email-security/outbound-dlp/) to learn more about this feature. +Refer to [Outbound Data Loss Prevention](/cloudflare-one/email-security/outbound-dlp/) to learn more about this feature. In GUI alert: @@ -22,7 +22,7 @@ Prevent delivery: ![DLP-Blocked](~/assets/images/changelog/email-security/DLP-Blocked.png) -This feature is available across these Email Security packages: +This feature is available across these Email security packages: -- **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Enterprise** +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-03-01-logpush-detections.mdx b/src/content/changelog/email-security-cf1/2025-03-01-logpush-detections.mdx index 449682bcdfaa522..f24cc3507690d9e 100644 --- a/src/content/changelog/email-security-cf1/2025-03-01-logpush-detections.mdx +++ b/src/content/changelog/email-security-cf1/2025-03-01-logpush-detections.mdx @@ -1,18 +1,18 @@ --- -title: Use Logpush for Email Security detections +title: Use Logpush for Email security detections description: Send detection logs to an endpoint of your choice with Cloudflare Logpush. date: 2025-03-01T23:22:49Z --- -You can now send detection logs to an endpoint of your choice with Cloudflare Logpush. +You can now send detection logs to an endpoint of your choice with Cloudflare Logpush. -Filter logs matching specific criteria you have set and select from over 25 fields you want to send. When creating a new Logpush job, remember to select **Email security alerts** as the dataset. +Filter logs matching specific criteria you have set and select from over 25 fields you want to send. When creating a new Logpush job, remember to select **Email security alerts** as the dataset. ![logpush-detections](~/assets/images/changelog/email-security/Logpush-Detections.png) -For more information, refer to [Enable detection logs](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs). +For more information, refer to [Enable detection logs](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: -- **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Enterprise** +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx b/src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx index a72bdf1d19d19f8..171ec114c2587f2 100644 --- a/src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx +++ b/src/content/changelog/email-security-cf1/2025-04-01-casb-email-security.mdx @@ -1,12 +1,12 @@ --- -title: CASB and Email Security -description: Get two free CASB integrations with your Email Security subscription. +title: CASB and Email security +description: Get two free CASB integrations with your Email security subscription. date: 2025-04-01T23:22:49Z --- -With Email Security, you get two free CASB integrations. +With Email security, you get two free CASB integrations. -Use one SaaS integration for Email Security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more. +Use one SaaS integration for Email security to sync with your directory of users, take actions on delivered emails, automatically provide EMLs for reclassification requests for clean emails, discover CASB findings and more. With the other integration, you can have a separate SaaS integration for CASB findings for another SaaS provider. @@ -14,7 +14,7 @@ Refer to [Add an integration](/cloudflare-one/integrations/cloud-and-saas/#add-a ![CASB-EmailSecurity](~/assets/images/changelog/email-security/CASB-EmailSecurity.png) -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Enterprise** - **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-05-08-open-attachments-with-browser-isolation.mdx b/src/content/changelog/email-security-cf1/2025-05-08-open-attachments-with-browser-isolation.mdx index 58d46ed69c5dce8..784b14201100358 100644 --- a/src/content/changelog/email-security-cf1/2025-05-08-open-attachments-with-browser-isolation.mdx +++ b/src/content/changelog/email-security-cf1/2025-05-08-open-attachments-with-browser-isolation.mdx @@ -1,6 +1,6 @@ --- title: Open email attachments with Browser Isolation -description: A new attachment section in Email Security allows you to safely open attachments to view and investigate. +description: A new attachment section in Email security allows you to safely open attachments to view and investigate. date: 2025-05-15T23:22:49Z --- @@ -19,8 +19,8 @@ For more details, refer to our [setup guide](/cloudflare-one/remote-browser-isol Some attachment types may not render in Browser Isolation. If there is a file type that you would like to be opened with Browser Isolation, reach out to your Cloudflare contact. -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Advantage** - **Enterprise** -- **Enterprise + PhishGuard** \ No newline at end of file +- **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-05-15-open-links-browser-isolation.mdx b/src/content/changelog/email-security-cf1/2025-05-15-open-links-browser-isolation.mdx index 15d253bfb47dd20..7d8ed14aab541ab 100644 --- a/src/content/changelog/email-security-cf1/2025-05-15-open-links-browser-isolation.mdx +++ b/src/content/changelog/email-security-cf1/2025-05-15-open-links-browser-isolation.mdx @@ -17,7 +17,7 @@ To use this feature, you must: For more details, refer to our [setup guide](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Advantage** - **Enterprise** diff --git a/src/content/changelog/email-security-cf1/2025-08-07-expanded-link-isolation.mdx b/src/content/changelog/email-security-cf1/2025-08-07-expanded-link-isolation.mdx index e155b8b44eb2ea0..ebf8ca507cd7d69 100644 --- a/src/content/changelog/email-security-cf1/2025-08-07-expanded-link-isolation.mdx +++ b/src/content/changelog/email-security-cf1/2025-08-07-expanded-link-isolation.mdx @@ -12,7 +12,7 @@ For example, you may want to deliver suspicious messages but isolate the links f To isolate all links within a message based on the disposition, select **Settings** > **Link Actions** > **View** and select **Configure**. As with other other links you isolate, an interstitial will be provided to warn users that this site has been isolated and the link will be recrawled live to evaluate if there are any changes in our threat intel. Learn more about this feature on [Configure link actions](https://developers.cloudflare.com/cloudflare-one/email-security/settings/detection-settings/configure-link-actions/). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Enterprise** - **Enterprise + PhishGuard** diff --git a/src/content/changelog/email-security-cf1/2025-09-01-updated-new-roles.mdx b/src/content/changelog/email-security-cf1/2025-09-01-updated-new-roles.mdx index db4e3784fbeb71d..4bb1aac2ac571dd 100644 --- a/src/content/changelog/email-security-cf1/2025-09-01-updated-new-roles.mdx +++ b/src/content/changelog/email-security-cf1/2025-09-01-updated-new-roles.mdx @@ -1,25 +1,25 @@ --- -title: Updated Email Security roles -description: More granular controls for Email Security roles +title: Updated Email security roles +description: More granular controls for Email security roles date: 2025-09-01T23:25:49Z --- -To provide more granular controls, we refined the [existing roles](/cloudflare-one/roles-permissions/#email-security-roles) for Email Security and launched a new Email Security role as well. +To provide more granular controls, we refined the [existing roles](/cloudflare-one/roles-permissions/#email-security-roles) for Email security and launched a new Email security role as well. -All Email Security roles no longer have read or write access to any of the other Zero Trust products: +All Email security roles no longer have read or write access to any of the other Zero Trust products: - **Email Configuration Admin** - **Email Integration Admin** -- **Email Security Read Only** -- **Email Security Analyst** -- **Email Security Policy Admin** -- **Email Security Reporting** +- **Email security Read Only** +- **Email security Analyst** +- **Email security Policy Admin** +- **Email security Reporting** To configure [Data Loss Prevention (DLP)](/cloudflare-one/email-security/outbound-dlp/) or [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/#set-up-clientless-web-isolation), you now need to be an admin for the Zero Trust dashboard with the **Cloudflare Zero Trust** role. -Also through customer feedback, we have created a new additive role to allow **Email Security Analyst** to create, edit, and delete Email Security policies, without needing to provide access via the **Email Configuration Admin** role. This role is called **Email Security Policy Admin**, which can read all settings, but has write access to [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/). +Also through customer feedback, we have created a new additive role to allow **Email security Analyst** to create, edit, and delete Email security policies, without needing to provide access via the **Email Configuration Admin** role. This role is called **Email security Policy Admin**, which can read all settings, but has write access to [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Advantage** - **Enterprise** diff --git a/src/content/changelog/email-security-cf1/2025-09-11-regional-email-processing-gia.mdx b/src/content/changelog/email-security-cf1/2025-09-11-regional-email-processing-gia.mdx index 61630f21089d4d5..9010752e536aa15 100644 --- a/src/content/changelog/email-security-cf1/2025-09-11-regional-email-processing-gia.mdx +++ b/src/content/changelog/email-security-cf1/2025-09-11-regional-email-processing-gia.mdx @@ -4,27 +4,34 @@ description: Customers can now choose their preferred mail processing location t date: 2025-09-11T23:15:00Z --- -We’re excited to announce that Email Security customers can now choose their preferred mail processing location directly from the UI when onboarding a domain. This feature is available for the following onboarding methods: **MX**, **BCC**, and **Journaling**. +We’re excited to announce that Email security customers can now choose their preferred mail processing location directly from the UI when onboarding a domain. This feature is available for the following onboarding methods: **MX**, **BCC**, and **Journaling**. ### What’s new -Customers can now select where their email is processed. The following regions are supported: -- **Germany** -- **India** -- **Australia** -Global processing remains the default option, providing flexibility to meet both compliance requirements or operational preferences. +Customers can now select where their email is processed. The following regions are supported: + +- **Germany** +- **India** +- **Australia** + +Global processing remains the default option, providing flexibility to meet both compliance requirements or operational preferences. ### How to use it -When onboarding a domain with MX, BCC, or Journaling: -1. Select the desired processing location (Germany, India, or Australia). -2. The UI will display updated processing addresses specific to that region. -3. For MX onboarding, if your domain is managed by Cloudflare, you can automatically update MX records directly from the UI. + +When onboarding a domain with MX, BCC, or Journaling: + +1. Select the desired processing location (Germany, India, or Australia). +2. The UI will display updated processing addresses specific to that region. +3. For MX onboarding, if your domain is managed by Cloudflare, you can automatically update MX records directly from the UI. ### Availability -This feature is available across these Email Security packages: -- **Advantage** -- **Enterprise** -- **Enterprise + PhishGuard** + +This feature is available across these Email security packages: + +- **Advantage** +- **Enterprise** +- **Enterprise + PhishGuard** ### What’s next -We’re expanding the list of processing locations to match our [Data Localization Suite (DLS)](/data-localization/) footprint, giving customers the broadest set of regional options in the market without the complexity of self-hosting. + +We’re expanding the list of processing locations to match our [Data Localization Suite (DLS)](/data-localization/) footprint, giving customers the broadest set of regional options in the market without the complexity of self-hosting. diff --git a/src/content/changelog/email-security-cf1/2025-09-23-invalid-submissions.mdx b/src/content/changelog/email-security-cf1/2025-09-23-invalid-submissions.mdx index 35ab24c47bb783a..7123055b159bb37 100644 --- a/src/content/changelog/email-security-cf1/2025-09-23-invalid-submissions.mdx +++ b/src/content/changelog/email-security-cf1/2025-09-23-invalid-submissions.mdx @@ -1,10 +1,10 @@ --- title: Invalid Submissions Feedback -description: Feedback for invalid submissions that prevent Email Security from providing continuous protection +description: Feedback for invalid submissions that prevent Email security from providing continuous protection date: 2025-09-23T23:11:49Z --- -Email Security relies on your submissions to continuously improve our detection models. However, we often receive submissions in formats that cannot be ingested, such as incomplete EMLs, screenshots, or text files. +Email security relies on your submissions to continuously improve our detection models. However, we often receive submissions in formats that cannot be ingested, such as incomplete EMLs, screenshots, or text files. To ensure all customer feedback is actionable, we have launched two new features to manage invalid submissions sent to our team and user [submission aliases](/cloudflare-one/email-security/settings/phish-submissions/submission-addresses/): @@ -18,7 +18,7 @@ To ensure all customer feedback is actionable, we have launched two new features Learn more about this feature on [invalid submissions](https://developers.cloudflare.com/cloudflare-one/email-security/monitoring/search-email/#invalid-submissions). -This feature is available across these Email Security packages: +This feature is available across these Email security packages: - **Advantage** - **Enterprise** diff --git a/src/content/changelog/email-security-cf1/2025-10-16-on-demand-security-report.mdx b/src/content/changelog/email-security-cf1/2025-10-16-on-demand-security-report.mdx index fcd7ffe27186c28..08d5da3e4d09697 100644 --- a/src/content/changelog/email-security-cf1/2025-10-16-on-demand-security-report.mdx +++ b/src/content/changelog/email-security-cf1/2025-10-16-on-demand-security-report.mdx @@ -1,21 +1,21 @@ --- title: On-Demand Security Report -description: Generate on-demand reports to prove Email Security value +description: Generate on-demand reports to prove Email security value date: 2025-10-17T22:14:43Z --- -You can now generate on-demand security reports directly from the Cloudflare dashboard. This new feature provides a comprehensive overview of your email security posture, making it easier than ever to demonstrate the value of Cloudflare’s Email Security to executives and other decision makers. +You can now generate on-demand security reports directly from the Cloudflare dashboard. This new feature provides a comprehensive overview of your email security posture, making it easier than ever to demonstrate the value of Cloudflare’s Email security to executives and other decision makers. These reports offer several key benefits: -- **Executive Summary:** Quickly view the performance of Email Security with a high-level executive summary. +- **Executive Summary:** Quickly view the performance of Email security with a high-level executive summary. - **Actionable Insights:** Dive deep into trend data, breakdowns of threat types, and analysis of top targets to identify and address vulnerabilities. - **Configuration Transparency:** Gain a clear view of your policy, submission, and domain configurations to ensure optimal setup. To get started, refer to [Download a security report](/cloudflare-one/email-security/monitoring/download-report/#download-a-security-report). ![Report](~/assets/images/changelog/email-security/report.png) -This feature is available across the following Email Security packages: +This feature is available across the following Email security packages: - **Advantage** - **Enterprise** diff --git a/src/content/changelog/zero-trust-warp/2024-06-16-cloudflare-one.mdx b/src/content/changelog/zero-trust-warp/2024-06-16-cloudflare-one.mdx index 4750e14cd581c48..10577ea66b7de77 100644 --- a/src/content/changelog/zero-trust-warp/2024-06-16-cloudflare-one.mdx +++ b/src/content/changelog/zero-trust-warp/2024-06-16-cloudflare-one.mdx @@ -36,7 +36,7 @@ If you are looking for older product updates, refer to the following locations. - [Cloudflare Tunnel](/cloudflare-one/changelog/tunnel/) - [Data Loss Prevention](/cloudflare-one/changelog/dlp/) - [Digital Experience Monitoring](/cloudflare-one/changelog/dex/) -- [Email Security](/cloudflare-one/changelog/email-security/) +- [Email security](/cloudflare-one/changelog/email-security/) - [Gateway](/cloudflare-one/changelog/gateway/) - [Magic Cloud Networking](/magic-cloud-networking/changelog/) - [Magic Firewall](/magic-firewall/changelog/) diff --git a/src/content/dash-routes/index.json b/src/content/dash-routes/index.json index 2b9b5b55b512c93..2e6afdfe6bbcfb4 100644 --- a/src/content/dash-routes/index.json +++ b/src/content/dash-routes/index.json @@ -593,7 +593,7 @@ "parent": ["Email"] }, { - "name": "Email Security", + "name": "Email security", "deeplink": "/?to=/:account/:zone/email/security", "parent": ["Email"] }, diff --git a/src/content/docs/cloudflare-one/changelog/email-security.mdx b/src/content/docs/cloudflare-one/changelog/email-security.mdx index 508c258522fb6e0..a9f5a62ec5b729e 100644 --- a/src/content/docs/cloudflare-one/changelog/email-security.mdx +++ b/src/content/docs/cloudflare-one/changelog/email-security.mdx @@ -1,6 +1,6 @@ --- pcx_content_type: changelog -title: Email Security +title: Email security --- import { ProductChangelog, Render } from "~/components"; @@ -14,18 +14,18 @@ import { ProductChangelog, Render } from "~/components"; ## 2024-12-19 -**Email Security expanded folder scanning** +**Email security expanded folder scanning** Microsoft 365 customers can now choose to scan all folders or just the inbox when deploying via the Graph API. ## 2024-08-06 -**Email Security is live** +**Email security is live** -Email Security is now live under Zero Trust. +Email security is now live under Zero Trust. ## 2024-08-06 **Microsoft Graph API deployment.** -Customers using Microsoft Office 365 can set up Email Security via Microsoft Graph API. +Customers using Microsoft Office 365 can set up Email security via Microsoft Graph API. diff --git a/src/content/docs/cloudflare-one/data-loss-prevention/index.mdx b/src/content/docs/cloudflare-one/data-loss-prevention/index.mdx index 483ae5ec9b88599..ca9303582d96c36 100644 --- a/src/content/docs/cloudflare-one/data-loss-prevention/index.mdx +++ b/src/content/docs/cloudflare-one/data-loss-prevention/index.mdx @@ -22,7 +22,7 @@ To prevent interference, Cloudflare does not write scanned content to disk. Inst ## Data in transit -Data Loss Prevention complements [Secure Web Gateway](/cloudflare-one/traffic-policies/) to detect sensitive data transferred in HTTP requests. DLP scans the entire HTTP body, which may include uploaded or downloaded files, chat messages, forms, and other web content. You can also use DLP with [Email Security](/cloudflare-one/email-security/) to scan [outbound emails](/cloudflare-one/email-security/outbound-dlp/). +Data Loss Prevention complements [Secure Web Gateway](/cloudflare-one/traffic-policies/) to detect sensitive data transferred in HTTP requests. DLP scans the entire HTTP body, which may include uploaded or downloaded files, chat messages, forms, and other web content. You can also use DLP with [Email security](/cloudflare-one/email-security/) to scan [outbound emails](/cloudflare-one/email-security/outbound-dlp/). DLP requires [Gateway HTTP filtering](/cloudflare-one/traffic-policies/initial-setup/http/) with [TLS decryption](/cloudflare-one/traffic-policies/http-policies/tls-decryption/) for visibility into data in transit. The depth of visibility varies for each site or application. DLP does not scan any traffic that bypasses Cloudflare Gateway (such as traffic that matches a [Do Not Inspect](/cloudflare-one/traffic-policies/http-policies/#do-not-inspect) policy). diff --git a/src/content/docs/cloudflare-one/email-security/directories/index.mdx b/src/content/docs/cloudflare-one/email-security/directories/index.mdx index 7d608538dd6e687..198afd190a87497 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/index.mdx @@ -5,14 +5,14 @@ sidebar: order: 16 --- -Directories are folders to store user data. Email Security allows you to manage directories from the Cloudflare dashboard. +Directories are folders to store user data. Email security allows you to manage directories from the Cloudflare dashboard. To add a directory: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. 2. Select **Directories**. 3. Select **Add a directory** > **Connect an integration**. -4. Select either **Google Workspace CASB + EMAIL** or **Microsoft CASB+EMAIL**. +4. Select either **Google Workspace CASB + EMAIL** or **Microsoft CASB+EMAIL**. 5. Refer to [Enable Gmail BCC integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#enable-gmail-bcc-integration) if you choose Google Workspace. Refer to [Enable Microsoft integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration) if you choose Microsoft 365. To sync a directory: @@ -22,4 +22,4 @@ To sync a directory: :::note The **Auto sync** option is on by default. It is recommended to keep this option on at all times to ensure directories are always synchronized. -::: \ No newline at end of file +::: diff --git a/src/content/docs/cloudflare-one/email-security/directories/manage-es-directories.mdx b/src/content/docs/cloudflare-one/email-security/directories/manage-es-directories.mdx index 386f85354c4583f..f4fcf7e4bb67dc5 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/manage-es-directories.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/manage-es-directories.mdx @@ -1,41 +1,43 @@ --- -title: Manage Email Security directories +title: Manage Email security directories pcx_content_type: how-to sidebar: order: 5 --- -You can manage your Email Security directory by editing and deleting added users. +You can manage your Email security directory by editing and deleting added users. :::note[Registered users] -The Email Security directory contains registered users only. A registered user is a user added to the [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). +The Email security directory contains registered users only. A registered user is a user added to the [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). ::: -To modify or delete users in the Email Security directory: +To modify or delete users in the Email security directory: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Directories**. -2. Select **Email Security Directory**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Directories**. +2. Select **Email security Directory**. ## Add a user -To manually add a user to the Email Security directory: +To manually add a user to the Email security directory: 1. On the sidebar, go to **Settings** > **Impersonation registry** > **View**. 2. Select **Add a user**: - - Choose **Manual input** as the **Input method**. - - Under **User info**, enter the **Display name**. - - Under **User email**, enter the **Email addresses**. + +- Choose **Manual input** as the **Input method**. +- Under **User info**, enter the **Display name**. +- Under **User email**, enter the **Email addresses**. + 3. Select **Save**. To view users you manually added: 1. Go to **Directories**. -2. Select **Email Security Directory**. +2. Select **Email security Directory**. 3. Any manually added user will be displayed under the table as **REGISTERED**. ## Edit a user -To edit a user in the Email Security directory: +To edit a user in the Email security directory: 1. Select the user you want to edit. 2. Select the three dots > **Edit**. @@ -44,7 +46,7 @@ To edit a user in the Email Security directory: ## Delete a user -To delete a user from the Email Security directory: +To delete a user from the Email security directory: 1. Select the user you want to delete. 2. Select the three dots > **Delete**. @@ -53,4 +55,4 @@ To delete a user from the Email Security directory: To delete multiple users from the registry at once: 1. Select the users you want to delete. -2. Select the **Action** dropdown list > **Delete**. \ No newline at end of file +2. Select the **Action** dropdown list > **Delete**. diff --git a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/index.mdx b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/index.mdx index 7497d1d5aab93a3..0efd0deee39d88e 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/index.mdx @@ -10,7 +10,7 @@ sidebar: To manage an integrated directory: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Directories**. 4. Under **Directory name**, select your directory. -5. You will be redirected to a page where you can manage [Groups](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory/) or [Users](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory/) directories. \ No newline at end of file +5. You will be redirected to a page where you can manage [Groups](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory/) or [Users](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory/) directories. diff --git a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory.mdx b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory.mdx index b81e3255c4204ec..f5c7b3b48e69ce1 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory.mdx @@ -5,17 +5,17 @@ sidebar: order: 3 --- -Email Security allows you to view and manage your groups directory and their [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). When a group is added to the registry, all members are registered by default. +Email security allows you to view and manage your groups directory and their [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). When a group is added to the registry, all members are registered by default. To manage a group directory: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Directories**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Directories**. 2. Locate your directory, select the three dots > **View details**. 3. Select **Groups**. ## Add groups to registry -Email Security allows you to add group names to the registry. +Email security allows you to add group names to the registry. To add a single group to the registry: @@ -30,7 +30,7 @@ To add multiple groups to the registry at once: ## Remove groups from registry -Email Security allows you to remove group names from the registry. +Email security allows you to remove group names from the registry. To remove a single group from the registry: @@ -56,4 +56,4 @@ To filter the list: - **All**: To view registered and unregistered groups. - **Registered**: To view registered groups. - **Unregistered**: To view unregistered groups. -3. Select **Apply filters**. \ No newline at end of file +3. Select **Apply filters**. diff --git a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory.mdx b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory.mdx index d33463e32dc85ac..0323836747dec28 100644 --- a/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory.mdx +++ b/src/content/docs/cloudflare-one/email-security/directories/manage-integrated-directories/manage-users-directory.mdx @@ -5,11 +5,11 @@ sidebar: order: 4 --- -Email Security allows you to view and manage the [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) status of your users directory. +Email security allows you to view and manage the [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) status of your users directory. To manage users directory: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Directories**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Directories**. 2. Locate your directory, select the three dots > **View details**. 3. Select **Users**. @@ -28,7 +28,7 @@ To add multiple users to the registry at once: ## Remove users from registry -Email Security allows you to remove users from the registry. +Email security allows you to remove users from the registry. To remove a single user from the registry: @@ -71,4 +71,4 @@ To filter users: - **All**: To view users in groups and not in groups. - **Users in groups**: To view users in groups. - **Users not in groups**: To view users not in groups. -3. Select **Apply filters**. \ No newline at end of file +3. Select **Apply filters**. diff --git a/src/content/docs/cloudflare-one/email-security/email-security-api-docs.mdx b/src/content/docs/cloudflare-one/email-security/email-security-api-docs.mdx index e679e254e221ac5..006bbcc1108f840 100644 --- a/src/content/docs/cloudflare-one/email-security/email-security-api-docs.mdx +++ b/src/content/docs/cloudflare-one/email-security/email-security-api-docs.mdx @@ -1,7 +1,7 @@ --- pcx_content_type: navigation -title: Email Security API +title: Email security API sidebar: order: 20 external_link: /api/resources/email_security/ ---- \ No newline at end of file +--- diff --git a/src/content/docs/cloudflare-one/email-security/index.mdx b/src/content/docs/cloudflare-one/email-security/index.mdx index a24b1f6466f7798..b5dc656eed5086a 100644 --- a/src/content/docs/cloudflare-one/email-security/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/index.mdx @@ -1,5 +1,5 @@ --- -title: Email Security +title: Email security pcx_content_type: overview sidebar: order: 10 @@ -12,33 +12,33 @@ Refer to [Area 1](/email-security/) if you are looking for the Area 1 documentat ::: :::note -If you have not yet purchased Email Security, you can try Email Security with Retro Scan. Refer to [Retro Scan](/cloudflare-one/email-security/retro-scan/) to learn more. +If you have not yet purchased Email security, you can try Email security with Retro Scan. Refer to [Retro Scan](/cloudflare-one/email-security/retro-scan/) to learn more. ::: -Protect your email inbox with Email Security. +Protect your email inbox with Email security. -Email Security is the practice of protecting your email inbox from cyber attacks and unwanted communication sent via email. +Email security is the practice of protecting your email inbox from cyber attacks and unwanted communication sent via email. -Cloudflare's Email Security uses Artificial Intelligence (AI), threat intelligence, and expert security rules to analyze every incoming email. +Cloudflare's Email security uses Artificial Intelligence (AI), threat intelligence, and expert security rules to analyze every incoming email. -Email Security protects your email inbox from phishing attacks, malware, [Business Email Compromise](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/) attacks, and vendor email fraud. +Email security protects your email inbox from phishing attacks, malware, [Business Email Compromise](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/) attacks, and vendor email fraud. -Cloudflare's Email Security integrates with your existing email provider (such as Microsoft 365 or Gmail), and reduces the amount of spam and phishing emails landing in your inbox. You can configure Email Security via [API](/cloudflare-one/email-security/setup/post-delivery-deployment/api/), [BCC](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup/)/[Journaling](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/), or [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) deployment. All three deployments aim at protecting your organization from malicious activities. +Cloudflare's Email security integrates with your existing email provider (such as Microsoft 365 or Gmail), and reduces the amount of spam and phishing emails landing in your inbox. You can configure Email security via [API](/cloudflare-one/email-security/setup/post-delivery-deployment/api/), [BCC](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup/)/[Journaling](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/), or [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) deployment. All three deployments aim at protecting your organization from malicious activities. -When you complete the [setup process](/cloudflare-one/email-security/setup/), the Cloudflare dashboard will display the Email Security overview page. +When you complete the [setup process](/cloudflare-one/email-security/setup/), the Cloudflare dashboard will display the Email security overview page. -The Email Security overview provides you with: +The Email security overview provides you with: - **Quick actions**, where you can: - View [reclassifications](/cloudflare-one/email-security/reclassifications/) - Manage detection settings: manage [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) and [additional detections](/cloudflare-one/email-security/settings/detection-settings/additional-detections/). - [Run screens](/cloudflare-one/email-security/investigation/search-email/#screen-criteria) - **Recommendations**: A series of recommendations. For example, you may be recommended to learn how to submit emails for reclassification, create policies, or protect users at risk of [impersonation](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) -- **Email Security metrics**: Activity from the last seven days. +- **Email security metrics**: Activity from the last seven days. - **Recently modified policies** A list of modified policies. -- **Education and resources**: Links to [implementation guides](/cloudflare-one/implementation-guides/), [Email Security changelogs](/cloudflare-one/changelog/email-security/), and [API documentation](https://developers.cloudflare.com/api/resources/email_security/subresources/investigate/methods/get/) +- **Education and resources**: Links to [implementation guides](/cloudflare-one/implementation-guides/), [Email security changelogs](/cloudflare-one/changelog/email-security/), and [API documentation](https://developers.cloudflare.com/api/resources/email_security/subresources/investigate/methods/get/) -To access the Email Security overview: +To access the Email security overview: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Go to **Email Security** > **Overview**. \ No newline at end of file +2. Go to **Email security** > **Overview**. diff --git a/src/content/docs/cloudflare-one/email-security/investigation/search-email.mdx b/src/content/docs/cloudflare-one/email-security/investigation/search-email.mdx index c9fecfd7d3b05e1..bf4bafb6b07e8b7 100644 --- a/src/content/docs/cloudflare-one/email-security/investigation/search-email.mdx +++ b/src/content/docs/cloudflare-one/email-security/investigation/search-email.mdx @@ -5,16 +5,16 @@ sidebar: order: 1 --- -With Email Security, you can use different screen criteria to search through your email, reclassify and move a certain volume of messages, find similar emails, and export messages. +With Email security, you can use different screen criteria to search through your email, reclassify and move a certain volume of messages, find similar emails, and export messages. ## Screen criteria -Email Security allows you to use popular, regular, and advanced screening criteria to search through your inbox. Advanced screening will give you the most in-depth investigation of your inbox. +Email security allows you to use popular, regular, and advanced screening criteria to search through your inbox. Advanced screening will give you the most in-depth investigation of your inbox. To screen through your email traffic: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Investigation**, then **Run new screen**. 4. Choose between **Popular**, **Regular**, and **Advanced** screen methods. Refer to the explanation below to learn what each method does. @@ -78,7 +78,7 @@ Reclassifying messages allows you to choose the disposition of your messages if To reclassify a message: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** and select **Investigation**. 2. On the Investigation page, under **Your matching messages**, select the message you want to reclassify. 3. Select the three dots, then select **Request reclassification**. 4. Under **New disposition**, select among the following: @@ -95,7 +95,7 @@ To release messages in bulk, select **Select all messages** > **Action** > **Rel ### Upload EML files -Email Security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. +Email security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. On the **Investigation** page: @@ -110,7 +110,7 @@ Once you have reclassified your messages, you can access those on Reclassificati To view reclassifications: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Choose **Team submissions** to view emails your security team submitted for reclassification, or **User submissions** to view emails your users submitted for reclassification. ## Move messages @@ -119,7 +119,7 @@ Moving messages allows you to move messages to a specific folder. You can move u To move messages: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the Investigation page, select all the messages you want to move. 3. Select the **Action** dropdown, then select **Move**. 4. Select among one of the following folders: @@ -134,21 +134,21 @@ To move messages in bulk, select **Select all messages** > **Action** > **Move** ## Find similar emails -Each detection has an Email Detection Fingerprint (EDF) hash that Email Security sends to the Search API to retrieve similar detections. +Each detection has an Email Detection Fingerprint (EDF) hash that Email security sends to the Search API to retrieve similar detections. To find similar detection results: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the Investigation page, under **Your matching messages**, search for the **Similar emails** column. 3. Select the number of similar emails. Selecting the number will show you a list of similar emails. ## Export messages -With Email Security, you can export messages to a CSV file. +With Email security, you can export messages to a CSV file. To export messages: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the Investigation page, under **Your matching messages**, select **Export to CSV**. 3. Select **Export messages** on the pop-up message. You can export up to 500 messages from the dashboard. To export up to 1,000 matching messages, use the [API](/api/resources/email_security/subresources/investigate/methods/get/). @@ -156,18 +156,18 @@ To export messages in bulk, select **Select all messages** > **Export to CSV**. ## Email status -Email Security allows you to review the status and actions of each email. +Email security allows you to review the status and actions of each email. To view status and actions for each email: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the Investigation page, select the three dots. 3. Selecting the three dots will show you the following options: - If the email is quarantined: - **View details**: Refer to [Email details](#email-details) to learn more. - **View similar emails**: Find similar emails based on the `value_edf_hash` (Electronic Detection Fingerprint hash). - - **Release**: Email Security will no longer quarantine your chosen messages. + - **Release**: Email security will no longer quarantine your chosen messages. - **Request reclassification**: Choose the dispositions of your messages if they are incorrect. Refer to [Reclassify messages](#reclassify-messages) to learn more. - If the email is not quarantined: @@ -179,7 +179,7 @@ To view status and actions for each email: ## Email details -Email Security shows you the following email detail information: +Email security shows you the following email detail information: - Details - Action log @@ -188,7 +188,7 @@ Email Security shows you the following email detail information: ### Details -Email Security displays the following details: +Email security displays the following details: 1. **Threat type**: Threat type of the email, for example, [credential harvester](/cloudflare-one/email-security/reference/how-es-detects-phish/), and [IP-based spam](/cloudflare-one/email-security/reference/how-es-detects-phish/). 2. **Validation**: Email validation methods [SPF](https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/), [DKIM](https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/), [DMARC](https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/). The dashboard will display Pass if SPF, DKIM and DMARC checks have passed. @@ -198,7 +198,7 @@ Email Security displays the following details: - Autonomous sys number: This number identifies your [autonomous system (AS)](https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/). - Autonomous sys name: This name identifies your autonomous system (AS). - Country -4. **Links identified**: A list of malicious links identified by Email Security. Refer to [Open links](#open-links) to open links in Security Center, Browser Isolation or an external tool of your choice. +4. **Links identified**: A list of malicious links identified by Email security. Refer to [Open links](#open-links) to open links in Security Center, Browser Isolation or an external tool of your choice. 5. **Attachments**: If an email has an attachment, the Cloudflare dashboard will display the filename, and the disposition assigned. You can open attachments in [Browser Isolation](/cloudflare-one/remote-browser-isolation/). Only PDF files are currently supported. 6. **Reasons for disposition**: Description of why the email was deemed as malicious, suspicious, or spam. @@ -208,7 +208,7 @@ You can open links in Security Center or [Browser Isolation](/cloudflare-one/rem To open links in Security Center: -1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Open in Security Center**. @@ -218,19 +218,19 @@ To open links in Security Center: To open links in Browser Isolation: -1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Open in Browser Isolation**. 5. The link will open in a separate window where you will be able to browse the content securely. -Alternatively, you can directly [open links in Browser Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/). +Alternatively, you can directly [open links in Browser Isolation](/cloudflare-one/remote-browser-isolation/setup/clientless-browser-isolation/#open-links-in-browser-isolation). :::note If you purchased Gateway and [Browser Isolation](/cloudflare-one/remote-browser-isolation/), you can perform more actions when opening links. ::: -When opening links, Email Security will not allow you to: +When opening links, Email security will not allow you to: - [Copy (from remote to client)](/cloudflare-one/remote-browser-isolation/isolation-policies/) - [Paste (from client to remote)](/cloudflare-one/remote-browser-isolation/isolation-policies/) @@ -241,7 +241,7 @@ When opening links, Email Security will not allow you to: To open and investigate a link in an external tool: -1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Copy URL**. @@ -277,4 +277,4 @@ Mail trace allows you to track the path your selected message took from the send - **Date**: The date and time when the mail was tracked. - **Type**: An email can be inbound (email sent to you from another email), or outbound (emails sent from your email address). -- **Activity**: The activity taken on an email. For example, moving the email to the trash folder, releasing a quarantined email, and more. \ No newline at end of file +- **Activity**: The activity taken on an email. For example, moving the email to the trash folder, releasing a quarantined email, and more. diff --git a/src/content/docs/cloudflare-one/email-security/monitoring/download-report.mdx b/src/content/docs/cloudflare-one/email-security/monitoring/download-report.mdx index 89f7ca2bad9c5a9..a034d6d26659794 100644 --- a/src/content/docs/cloudflare-one/email-security/monitoring/download-report.mdx +++ b/src/content/docs/cloudflare-one/email-security/monitoring/download-report.mdx @@ -5,7 +5,7 @@ sidebar: order: 3 --- -Email Security allows you to download three types of reports: +Email security allows you to download three types of reports: - Disposition report - Retro scan report @@ -15,7 +15,7 @@ Email Security allows you to download three types of reports: A disposition report shows you all the email messages based on the type of disposition you selected. -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Select **Monitoring** > **Download report**. 3. In **Report type**, select **Email disposition report**. 4. Under **Email disposition report**, select the **Date Range** (required), and the **Disposition**. @@ -27,16 +27,16 @@ Refer to [Dispositions and attributes](/cloudflare-one/email-security/reference/ Retro scan scans the last 14 days of your emails, and gives you a report on bulk, spam, spoof, suspicious and malicious emails. -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Select **Monitoring** > **Download report**. -4. In **Report type**, select **Retro Scan report**. -5. Select **View report** to view a report of your last 14 days of emails. +3. In **Report type**, select **Retro Scan report**. +4. Select **View report** to view a report of your last 14 days of emails. Refer to [Retro Scan](/cloudflare-one/email-security/retro-scan/) to learn more. ## Download a security report -A security report provides an overview of your email traffic. The report can be generated on the last 30, 60, 90 days, or a timeframe of your choice. +A security report provides an overview of your email traffic. The report can be generated on the last 30, 60, 90 days, or a timeframe of your choice. The reports contains: @@ -46,8 +46,8 @@ The reports contains: To download a security report: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Select **Monitoring** > **Download report**. -4. In **Report type**, select **Security report** and the **Date range**. -5. Select **Generate report**. -6. Your security report is being generated. You will receive an email with the security report attached once it is ready. \ No newline at end of file +3. In **Report type**, select **Security report** and the **Date range**. +4. Select **Generate report**. +5. Your security report is being generated. You will receive an email with the security report attached once it is ready. diff --git a/src/content/docs/cloudflare-one/email-security/monitoring/index.mdx b/src/content/docs/cloudflare-one/email-security/monitoring/index.mdx index 2f75094dd8e2307..8ed2d9870eeeba3 100644 --- a/src/content/docs/cloudflare-one/email-security/monitoring/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/monitoring/index.mdx @@ -7,17 +7,17 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; -Once you have chosen a domain to scan, Email Security allows you to monitor the traffic scanned from your email inboxes. +Once you have chosen a domain to scan, Email security allows you to monitor the traffic scanned from your email inboxes. :::note -With Email Security, you can enable logs to send detection data to an endpoint of your choice. Refer to [Enable Email Security logs](/cloudflare-one/insights/logs/enable-logs/) for more information. +With Email security, you can enable logs to send detection data to an endpoint of your choice. Refer to [Enable Email security logs](/cloudflare-one/insights/logs/enable-logs/) for more information. ::: To monitor your inbox: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. -3. Under **Email Security**, select **Monitoring**. +2. Select **Email security**. +3. Under **Email security**, select **Monitoring**. The dashboard will display the following metrics: @@ -37,7 +37,7 @@ To view the live number of email scanned and dispositions scanned, enable **Live ## Disposition evaluation -Email traffic that flows through Email Security is given a final disposition, which represents Email Security's evaluation of that specific message. +Email traffic that flows through Email security is given a final disposition, which represents Email security's evaluation of that specific message. Disposition evaluation displays the following dispositions: @@ -92,7 +92,7 @@ Select **Review submissions** to review a filtered list of phish submissions rep ## Auto-move events -Auto-move events are emails moved to different inboxes based on the disposition Email Security assigned. +Auto-move events are emails moved to different inboxes based on the disposition Email security assigned. This panel shows you the total number of auto-moves and the source folder from which these retractions are originating from. @@ -102,8 +102,8 @@ Refer to [Auto-moves](/cloudflare-one/email-security/settings/auto-moves/) to co Detection settings metric displays information about: -- **Allowed traffic**: Traffic that Email Security will exempt emails that match certain patterns from normal detection scanning. Allowed traffic shows metrics on emails that were allowed to go through user inboxes. -- **Blocked traffic**: Traffic that Email Security automatically blocks from senders. Blocked traffic shows metrics on emails that were blocked from user inboxes. +- **Allowed traffic**: Traffic that Email security will exempt emails that match certain patterns from normal detection scanning. Allowed traffic shows metrics on emails that were allowed to go through user inboxes. +- **Blocked traffic**: Traffic that Email security automatically blocks from senders. Blocked traffic shows metrics on emails that were blocked from user inboxes. - **Domain age**: The number of days since domain registration. Select **Configure** to configure policy and rules for [allowed traffic](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [blocked traffic](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) and [domain age](/cloudflare-one/email-security/settings/detection-settings/additional-detections/). diff --git a/src/content/docs/cloudflare-one/email-security/monitoring/search-email.mdx b/src/content/docs/cloudflare-one/email-security/monitoring/search-email.mdx index 6f1a2cecda5c295..20dd85591317f39 100644 --- a/src/content/docs/cloudflare-one/email-security/monitoring/search-email.mdx +++ b/src/content/docs/cloudflare-one/email-security/monitoring/search-email.mdx @@ -5,16 +5,16 @@ sidebar: order: 2 --- -With Email Security, you can use different screen criteria to search through your email, reclassify and move a certain volume of messages, find similar emails, and export messages. +With Email security, you can use different screen criteria to search through your email, reclassify and move a certain volume of messages, find similar emails, and export messages. ## Screen criteria -Email Security allows you to use popular, regular, and advanced screening criteria to search through your inbox. Advanced screening will give you the most in-depth investigation of your inbox. +Email security allows you to use popular, regular, and advanced screening criteria to search through your inbox. Advanced screening will give you the most in-depth investigation of your inbox. To screen through your email traffic: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Investigation**, then **Run new screen**. 4. Choose between **Popular**, **Regular**, and **Advanced** screen methods. Refer to the explanation below to learn what each method does. @@ -78,7 +78,7 @@ Reclassifying messages allows you to choose the disposition of your messages if To reclassify a message: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** and select **Investigation**. 2. On the **Investigation** page, under **Your matching messages**, select the message you want to reclassify. 3. Select the three dots, then select **Request reclassification**. 4. Under **New disposition**, select among the following: @@ -95,7 +95,7 @@ To release messages in bulk, select **Select all messages** > **Action** > **Rel ### Upload EML files -Email Security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. +Email security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. On the **Investigation** page: @@ -110,7 +110,7 @@ Once you have reclassified your messages, you can access those on **Reclassifica To view reclassifications: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Choose **Team submissions** to view emails your security team submitted for reclassification, or **User submissions** to view emails your users submitted for reclassification. ### Team submissions @@ -171,7 +171,7 @@ Moving messages allows you to move messages to a specific folder. You can move u To move messages: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the **Investigation** page, select all the messages you want to move. 3. Select the **Action** dropdown, then select **Move**. 4. Select among one of the following folders: @@ -186,21 +186,21 @@ To move messages in bulk, select **Select all messages** > **Action** > **Move** ## Find similar emails -Each detection has an Email Detection Fingerprint (EDF) hash that Email Security sends to the Search API to retrieve similar detections. +Each detection has an Email Detection Fingerprint (EDF) hash that Email security sends to the Search API to retrieve similar detections. To find similar detection results: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the **Investigation** page, under **Your matching messages**, search for the **Similar emails** column. 3. Select the number of similar emails. Selecting the number will show you a list of similar emails. ## Export messages -With Email Security, you can export messages to a CSV file. +With Email security, you can export messages to a CSV file. To export messages: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the **Investigation** page, under **Your matching messages**, select **Export to CSV**. 3. Select **Export messages** on the pop-up message. You can export up to 500 messages from the dashboard. To export up to 1,000 matching messages, use the [API](/api/resources/email_security/subresources/investigate/methods/get/). @@ -208,17 +208,17 @@ To export messages in bulk, select **Select all messages** > **Export to CSV**. ## Email status -Email Security allows you to review the status and actions of each email. +Email security allows you to review the status and actions of each email. To view status and actions for each email: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**, and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**, and select **Investigation**. 2. On the **Investigation** page, select the three dots. 3. Selecting the three dots will show you the following options: - If the email is quarantined: - **View details**: Refer to [Email details](/cloudflare-one/email-security/monitoring/search-email/#email-details) to learn more. - **View similar emails**: Find similar emails based on the `value_edf_hash` (Electronic Detection Fingerprint hash). - - **Release**: Email Security will no longer quarantine your chosen messages. + - **Release**: Email security will no longer quarantine your chosen messages. - **Request reclassification**: Choose the dispositions of your messages if they are incorrect. Refer to [Reclassify messages](/cloudflare-one/email-security/monitoring/search-email/#reclassify-messages) to learn more. 4. If the email is not quarantined: - **View details**. @@ -229,7 +229,7 @@ To view status and actions for each email: ## Email details -Email Security shows you the following email detail information: +Email security shows you the following email detail information: - Details - Action log @@ -238,7 +238,7 @@ Email Security shows you the following email detail information: ### Details -Email Security displays the following details: +Email security displays the following details: 1. **Threat type**: Threat type of the email, for example, [credential harvester](/cloudflare-one/email-security/reference/how-es-detects-phish/#credential-harvesters), and [IP-based spam](/cloudflare-one/email-security/reference/how-es-detects-phish/#ip-based-spam). 2. **Validation**: Email validation methods [SPF](https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/), [DKIM](https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/), [DMARC](https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/). The dashboard will display **Pass** if SPF, DKIM and DMARC checks have passed. @@ -248,7 +248,7 @@ Email Security displays the following details: - Autonomous sys number: This number identifies your [autonomous system (AS)](https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/). - Autonomous sys name: This name identifies your autonomous system (AS). - Country -4. **Links identified**: A list of malicious links identified by Email Security. Refer to [Open links](/cloudflare-one/email-security/monitoring/search-email/#open-links) to open links in Security Center, Browser Isolation or an external tool of your choice. +4. **Links identified**: A list of malicious links identified by Email security. Refer to [Open links](/cloudflare-one/email-security/monitoring/search-email/#open-links) to open links in Security Center, Browser Isolation or an external tool of your choice. 5. **Attachments**: If an email has an attachment, the Cloudflare dashboard will display the filename, and the disposition assigned. You can open attachments in [Browser Isolation](/cloudflare-one/remote-browser-isolation/). Only PDF files are currently supported. 6. **Reasons for disposition**: Description of why the email was deemed as malicious, suspicious, or spam. @@ -258,7 +258,7 @@ You can open links in [Security Center](/security-center/) or [Browser Isolation To open links in Security Center: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Open in Security Center**. @@ -268,7 +268,7 @@ To open links in Security Center: To open links in Browser Isolation: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Open in Browser Isolation**. @@ -279,7 +279,7 @@ Alternatively, you can directly [open links in Browser Isolation](/cloudflare-on :::note If you purchased [Gateway](/cloudflare-one/traffic-policies/) and [Browser Isolation](/cloudflare-one/remote-browser-isolation/), you can perform more actions when opening links. -When opening links, Email Security will not allow you to: +When opening links, Email security will not allow you to: - [Copy (from remote to client)](/cloudflare-one/remote-browser-isolation/isolation-policies/#copy-from-remote-to-client) - [Paste (from client to remote)](/cloudflare-one/remote-browser-isolation/isolation-policies/#paste-from-client-to-remote) @@ -292,7 +292,7 @@ When opening links, Email Security will not allow you to: To open and investigate a link in an external tool: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Investigation**. 2. Locate the message you want to open links for, select the three dots, then select **View details**. 3. Under **Details**, go to **Links identified**. 4. Locate the link you want to open, and select **Copy URL**. diff --git a/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx b/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx index 4f888fd18340663..f9cf84d2f58b689 100644 --- a/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx +++ b/src/content/docs/cloudflare-one/email-security/outbound-dlp.mdx @@ -22,7 +22,7 @@ An outbound policy allows you to control outbound email flow. To create an outbound DLP policy: -1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**. +1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email security** > **Outbound DLP**. 2. Select **Add a policy**. 3. Name your policy. 4. Build an expression to match specific email traffic. For example, you can create a policy that blocks outbound emails containing identifying numbers: @@ -35,29 +35,29 @@ To create an outbound DLP policy: 5. (Optional) Choose whether to use the default block message or a custom message. 6. Select **Create policy**. -After creating your policy, you can modify or reorder your policies in **Email Security** > **Outbound DLP**. +After creating your policy, you can modify or reorder your policies in **Email security** > **Outbound DLP**. ### Selectors -| Selector | Description | -| ------------------- | -------------------------------------------------------------------------------------------------------------------------- | -| Recipient email | The intended recipient of an outbound email. | -| Email sender | The user in your organization sending an email. | +| Selector | Description | +| ------------------- | ----------------------------------------------------------------------------------------------------------------- | +| Recipient email | The intended recipient of an outbound email. | +| Email sender | The user in your organization sending an email. | | Matched DLP profile | The [DLP profile](/cloudflare-one/data-loss-prevention/dlp-profiles/) that content of an email matches upon scan. | ## 2. DLP Assist add-in -The Data Loss Prevention (DLP) Assist add-in allows Microsoft 365 users to deploy a DLP solution for free using Cloudflare's Email Security. DLP Assist add-in protects your data egress from Outlook web and dekstop client. +The Data Loss Prevention (DLP) Assist add-in allows Microsoft 365 users to deploy a DLP solution for free using Cloudflare's Email security. DLP Assist add-in protects your data egress from Outlook web and dekstop client. To set up DLP Assist add-in: -1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email Security** > **Outbound DLP**. +1. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Email security** > **Outbound DLP**. 2. Select **View Microsoft add-in instructions** > Select **Download add-in**. This downloads a `.xml` file necessary to install the add-in on the client side. 3. Set up the add-in in Microsoft 365: - - Log in to the [Microsoft admin panel](https://security.microsoft.com/homepage) and go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**. - - Choose **Upload custom apps** and select **Office Add-in** for the application type. - - Select **Upload manifest file (.xml) from device**. - - Upload the Cloudflare add-in file you downloaded in step three. Then, verify and complete the wizard. It can take up to 24 hours for an add-in to propagate. + - Log in to the [Microsoft admin panel](https://security.microsoft.com/homepage) and go to **Microsoft 365 Admin Center** > **Settings** > **Integrated Apps**. + - Choose **Upload custom apps** and select **Office Add-in** for the application type. + - Select **Upload manifest file (.xml) from device**. + - Upload the Cloudflare add-in file you downloaded in step three. Then, verify and complete the wizard. It can take up to 24 hours for an add-in to propagate. The add-in works by inserting headers into the [EML](https://en.wikipedia.org/wiki/EML) on the client side before the message is sent out. @@ -68,16 +68,16 @@ To block, encrypt, or send approval, you can configure rules within Microsoft Pu 3. Do not choose any templates or custom policy. Select **Next**. 4. Choose a name and description for the policy: You can choose any name. However, this guide will use `Cloudflare Assist Block`. 5. Select **Next** on **Admin Units**: - - Choose to only apply to **Exchange Email**. - - Choose **Create or customize advanced DLP Rules**. + - Choose to only apply to **Exchange Email**. + - Choose **Create or customize advanced DLP Rules**. 6. Select **Create rule**: - - Create a policy name. - - Add the following conditions: - - **Header contains words or phrases**: `Key: cf_outbound_dlp with Value: BLOCK` - - Select **AND**. - - **Content is shared from Microsoft 365**: Select **with people from outside my organization**. + - Create a policy name. + - Add the following conditions: + - **Header contains words or phrases**: `Key: cf_outbound_dlp with Value: BLOCK` + - Select **AND**. + - **Content is shared from Microsoft 365**: Select **with people from outside my organization**. 7. Under **Actions**, the admin can choose what to do with the message. You can use the **Restrict access or encrypt the content in Microsoft 365 locations** to block the message or encrypt it. -8. Under **User notifications**, turn on notifications. Admins can also edit the message if they want to. You can also configure if the admin wants to receive a notification under **Incident reports** > **Use this severity level in admin alerts and reports**. +8. Under **User notifications**, turn on notifications. Admins can also edit the message if they want to. You can also configure if the admin wants to receive a notification under **Incident reports** > **Use this severity level in admin alerts and reports**. 9. Select **Save**. 10. Select **Turn the Policy On Immediately**. @@ -92,11 +92,11 @@ Outbound DLP presents its limitations: - Outbound DLP only protects user-managed inboxes. - Outbound DLP offers the most consistent experience on Outlook Web App and Outlook desktop, due to limitations imposed by Microsoft. -| Platform | Status | -|-------------------------------------- |---------------------------------------------------------- | -| Web client | Stable | -| New Outlook desktop client - Windows | Stable | -| Desktop client - macOS | Can cause scanning to be delayed due to Apple limitation | -| Old Outlook desktop client | Does not work due to Microsoft limitation | -| Mobile client - iOS | Unstable due to Apple limitation | -| Mobile client - Android | Unstable due to Microsoft limitation | \ No newline at end of file +| Platform | Status | +| ------------------------------------ | -------------------------------------------------------- | +| Web client | Stable | +| New Outlook desktop client - Windows | Stable | +| Desktop client - macOS | Can cause scanning to be delayed due to Apple limitation | +| Old Outlook desktop client | Does not work due to Microsoft limitation | +| Mobile client - iOS | Unstable due to Apple limitation | +| Mobile client - Android | Unstable due to Microsoft limitation | diff --git a/src/content/docs/cloudflare-one/email-security/phishguard.mdx b/src/content/docs/cloudflare-one/email-security/phishguard.mdx index 829de72d774d094..f0ba28ec71202dd 100644 --- a/src/content/docs/cloudflare-one/email-security/phishguard.mdx +++ b/src/content/docs/cloudflare-one/email-security/phishguard.mdx @@ -7,7 +7,7 @@ sidebar: PhishGuard is a team of analysts that routinely inspects your email environment and responds to threats that come through your email inbox. -While Email Security uses advanced technologies to protect your email inbox, PhishGuard offers an additional human component to protect your email environment against impersonation events, suspicious items, false negatives/false positives, and any new event that automated intelligent systems may miss due to a lack of context (for example, a compromised account activity). +While Email security uses advanced technologies to protect your email inbox, PhishGuard offers an additional human component to protect your email environment against impersonation events, suspicious items, false negatives/false positives, and any new event that automated intelligent systems may miss due to a lack of context (for example, a compromised account activity). PhishGuard only works on a post-delivery environment (only emails that have already landed in your email inbox are reviewed). As a result, PhishGuard analysts may perform a [reclassification](/cloudflare-one/email-security/investigation/search-email/#reclassify-messages) or [auto-move](/cloudflare-one/email-security/settings/auto-moves/) based on their findings. @@ -15,7 +15,7 @@ PhishGuard coordinates with the email detections team, allowing you to directly Additionally, PhishGuard analysts: -- Use real-time threat data to identify malicious activity. Email-based threats are responded to rapidly, and immediately reported and documented. +- Use real-time threat data to identify malicious activity. Email-based threats are responded to rapidly, and immediately reported and documented. - Review every [user](/cloudflare-one/email-security/investigation/search-email/#user-submissions) and [team](/cloudflare-one/email-security/investigation/search-email/#team-submissions) submission so your security team can focus on more critical activites. - Help you detect and mitigate threats faster, reducing the time attacks have access to your network. This also helps reducing business impact, because it prevents data breaches, financial loss, and reputational damage. @@ -92,4 +92,4 @@ If you select the three dots, you can: - **Details**: Displays information such as delivery disposition, current disposition, ES Alert ID, Message-ID, Timestamp, Subject, and Attempted Fraudulent Amount. - **Indicators of compromise (IOC)**: [Indicators of compromise (IOC)](https://www.cloudflare.com/en-gb/learning/security/what-are-indicators-of-compromise/) are information about a specific security breach that can help security teams determine if an attack has taken place. - Preview email. -- [Move email](/cloudflare-one/email-security/settings/auto-moves/). \ No newline at end of file +- [Move email](/cloudflare-one/email-security/settings/auto-moves/). diff --git a/src/content/docs/cloudflare-one/email-security/reclassifications/index.mdx b/src/content/docs/cloudflare-one/email-security/reclassifications/index.mdx index 9483c28b6756675..12965688856497e 100644 --- a/src/content/docs/cloudflare-one/email-security/reclassifications/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/reclassifications/index.mdx @@ -5,13 +5,13 @@ sidebar: order: 13 --- -Reclassifying messages allows you to choose the disposition of your messages if the disposition is incorrect. This helps improve Email Security's detection accuracy and ensures proper handling of email threats. +Reclassifying messages allows you to choose the disposition of your messages if the disposition is incorrect. This helps improve Email security's detection accuracy and ensures proper handling of email threats. ## Reclassify messages To reclassify a message: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** and select **Investigation**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** and select **Investigation**. 2. On the **Investigation** page, under **Your matching messages**, select the message you want to reclassify. 3. Select the three dots, then select **Request reclassification**. 4. Under **New disposition**, select among the following: @@ -28,7 +28,7 @@ To release messages in bulk, select **Select all messages** > **Action** > **Rel ## Upload EML files -Email Security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. +Email security classifies certain emails as "Clean". If you disagree with the disposition, you can upload an EML file and reclassify the email. On the **Investigation** page: @@ -45,7 +45,7 @@ Once you have reclassified your messages, you can access those on **Reclassifica To view reclassifications: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Choose from the following submission types: - [**Team submissions**](/cloudflare-one/email-security/reclassifications/team-submissions/): View emails your security team submitted for reclassification - [**User submissions**](/cloudflare-one/email-security/reclassifications/user-submissions/): View emails your users submitted for reclassification diff --git a/src/content/docs/cloudflare-one/email-security/reclassifications/invalid-submissions.mdx b/src/content/docs/cloudflare-one/email-security/reclassifications/invalid-submissions.mdx index 9497b26d6ce2ce9..cb92ab2e2bd8573 100644 --- a/src/content/docs/cloudflare-one/email-security/reclassifications/invalid-submissions.mdx +++ b/src/content/docs/cloudflare-one/email-security/reclassifications/invalid-submissions.mdx @@ -5,32 +5,24 @@ sidebar: order: 3 --- -A submission is invalid when it cannot be processed by Email Security due to various issues with the submission format or content. - -## What makes a submission invalid - A submission is invalid when: - A submission has no EML file attached. - A submission has been made with an incorrect file extension. - A submission was made to the wrong team or user alias. -## Ensure valid submissions - To ensure your submission is valid: - Ensure your submission has a file attached with a `.eml` file extension. - Ensure you configure the domain you are submitting emails for. - Ensure policies are configured correctly. -## View invalid submissions - To view invalid submissions: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Select **Invalid submissions**. You can search by submission ID or submitted email. -You can filter based on **Date Range** and **Submitted by** (which will list emails that made the invalid submissions). Once you have configured your desired filters, select **Apply filters**. \ No newline at end of file +You can filter based on **Date Range** and **Submitted by** (which will list emails that made the invalid submissions). Once you have configured your desired filters, select **Apply filters**. diff --git a/src/content/docs/cloudflare-one/email-security/reclassifications/team-submissions.mdx b/src/content/docs/cloudflare-one/email-security/reclassifications/team-submissions.mdx index 1b24f6a41f6daba..dd89d7c7ab7b249 100644 --- a/src/content/docs/cloudflare-one/email-security/reclassifications/team-submissions.mdx +++ b/src/content/docs/cloudflare-one/email-security/reclassifications/team-submissions.mdx @@ -5,7 +5,6 @@ sidebar: order: 1 --- - Team submissions are the emails your security team submitted for reclassification. All team submissions receive a human review by Cloudflare. ## View team submissions @@ -13,7 +12,7 @@ Team submissions are the emails your security team submitted for reclassificatio To view team submissions: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Select **Team submissions**. ## Filter team submissions @@ -35,4 +34,4 @@ The dashboard will populate the table with the list of emails your security team To gain more details on a specific reclassification: 1. Go to the reclassification you want to have more details for. -2. Select the three dots > select among **View more**, **View email message** and **View similar details**. \ No newline at end of file +2. Select the three dots > select among **View more**, **View email message** and **View similar details**. diff --git a/src/content/docs/cloudflare-one/email-security/reclassifications/user-submissions.mdx b/src/content/docs/cloudflare-one/email-security/reclassifications/user-submissions.mdx index 215aad23b8dcd77..c43662620ebc2a3 100644 --- a/src/content/docs/cloudflare-one/email-security/reclassifications/user-submissions.mdx +++ b/src/content/docs/cloudflare-one/email-security/reclassifications/user-submissions.mdx @@ -18,7 +18,7 @@ Any email that is reported as [phish](/cloudflare-one/email-security/settings/ph To view user submissions: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. +2. Select **Email security** > **Reclassifications**. 3. Select **User submissions**. ## Filter user submissions diff --git a/src/content/docs/cloudflare-one/email-security/reference/dispositions-and-attributes.mdx b/src/content/docs/cloudflare-one/email-security/reference/dispositions-and-attributes.mdx index c771f02a392518d..c7c18e3c19d87bf 100644 --- a/src/content/docs/cloudflare-one/email-security/reference/dispositions-and-attributes.mdx +++ b/src/content/docs/cloudflare-one/email-security/reference/dispositions-and-attributes.mdx @@ -7,15 +7,15 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; -Email Security uses a variety of factors to determine whether a given email message, domain, URL, or packet is part of a phishing campaign. These small pattern assessments are dynamic in nature and — in many cases — no single pattern will determine the final verdict. +Email security uses a variety of factors to determine whether a given email message, domain, URL, or packet is part of a phishing campaign. These small pattern assessments are dynamic in nature and — in many cases — no single pattern will determine the final verdict. :::note[Detection vs. disposition] -Detection is the process Email Security does to identify what threat an email may contain. An email can have multiple detections, but they will only have one and final disposition. The detections an email have will determine the disposition of the email. +Detection is the process Email security does to identify what threat an email may contain. An email can have multiple detections, but they will only have one and final disposition. The detections an email have will determine the disposition of the email. ::: ## Dispositions -Any traffic that flows through Email Security is given a final disposition, which represents our evaluation of that specific message. Each message will receive only one disposition header, so your organization can take clear and specific actions on different message types. +Any traffic that flows through Email security is given a final disposition, which represents our evaluation of that specific message. Each message will receive only one disposition header, so your organization can take clear and specific actions on different message types. You can use disposition values when [setting up auto-moves](/cloudflare-one/email-security/settings/auto-moves/). @@ -30,7 +30,7 @@ The following disposition values follow an order of maliciousness: ### Header structure -When Email Security adds a disposition header to an email message, that header matches the following format: +When Email security adds a disposition header to an email message, that header matches the following format: ```txt X-CFEmailSecurity-Disposition: [Value] @@ -44,22 +44,22 @@ X-CFEmailSecurity-Disposition: UCE ## Attributes -Traffic that flows through Email Security can also receive one or more Attributes, which indicate that a specific condition has been met. +Traffic that flows through Email security can also receive one or more Attributes, which indicate that a specific condition has been met. ### Available values -| Attribute | Notes | -| --------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| `CUSTOM_BLOCK_LIST` | This message matches a value you have defined in your custom block list. | -| `NEW_DOMAIN_SENDER=` | Alerts to mail from a newly registered domain. Formatted as yyyy-MM-dd HH:mm:ss ZZZ. | -| `NEW_DOMAIN_LINK=` | Alerts to mail with links pointing out to a newly registered domain. Formatted as yyyy-MM-dd HH:mm:ss ZZZ. | -| `ENCRYPTED` | Email message is encrypted. | -| `EXECUTABLE` | Email message contains an executable file. | +| Attribute | Notes | +| --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `CUSTOM_BLOCK_LIST` | This message matches a value you have defined in your custom block list. | +| `NEW_DOMAIN_SENDER=` | Alerts to mail from a newly registered domain. Formatted as yyyy-MM-dd HH:mm:ss ZZZ. | +| `NEW_DOMAIN_LINK=` | Alerts to mail with links pointing out to a newly registered domain. Formatted as yyyy-MM-dd HH:mm:ss ZZZ. | +| `ENCRYPTED` | Email message is encrypted. | +| `EXECUTABLE` | Email message contains an executable file. | | `BEC` | Indicates that an email address was contained in your [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) list. Associated with `MALICIOUS` or `SPOOF` dispositions. | ### Header structure -When Email Security adds a disposition header to an email message, that header matches the following format: +When Email security adds a disposition header to an email message, that header matches the following format: ```txt X-CFEmailSecurity-Attribute: [Value] diff --git a/src/content/docs/cloudflare-one/email-security/reference/domain-information.mdx b/src/content/docs/cloudflare-one/email-security/reference/domain-information.mdx deleted file mode 100644 index 7473461dddafb8c..000000000000000 --- a/src/content/docs/cloudflare-one/email-security/reference/domain-information.mdx +++ /dev/null @@ -1,10 +0,0 @@ ---- -title: Information about your domain -pcx_content_type: concept -sidebar: - order: 1 ---- - -import { GlossaryTooltip, Render } from "~/components"; - - diff --git a/src/content/docs/cloudflare-one/email-security/reference/how-es-detects-phish.mdx b/src/content/docs/cloudflare-one/email-security/reference/how-es-detects-phish.mdx index d124cf86a123cee..338b5684bf0c60e 100644 --- a/src/content/docs/cloudflare-one/email-security/reference/how-es-detects-phish.mdx +++ b/src/content/docs/cloudflare-one/email-security/reference/how-es-detects-phish.mdx @@ -1,5 +1,5 @@ --- -title: How Email Security detects phish +title: How Email security detects phish pcx_content_type: reference sidebar: order: 1 diff --git a/src/content/docs/cloudflare-one/email-security/retro-scan.mdx b/src/content/docs/cloudflare-one/email-security/retro-scan.mdx index 47cd4d38625e169..bebf20a24b5d975 100644 --- a/src/content/docs/cloudflare-one/email-security/retro-scan.mdx +++ b/src/content/docs/cloudflare-one/email-security/retro-scan.mdx @@ -14,7 +14,7 @@ Retro Scan is only available for Microsoft 365 accounts. To start a free scan: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Overview**. +2. Select **Email security** > **Overview**. 3. Select **Start a free scan** > **Generate report**. 4. Enable your [Microsoft integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration). Once you enabled your Microsoft integration, you will redirected to a page wheer you will add your domains and speficy your current email security system. 5. Generate Retro Scan report: diff --git a/src/content/docs/cloudflare-one/email-security/settings/auto-moves.mdx b/src/content/docs/cloudflare-one/email-security/settings/auto-moves.mdx index f34eb86b511e87e..d367f787433c03f 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/auto-moves.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/auto-moves.mdx @@ -5,9 +5,9 @@ sidebar: order: 3 --- -Auto-move events are events where emails are automatically moved to different inboxes based on the disposition Email Security assigned to them. +Auto-move events are events where emails are automatically moved to different inboxes based on the disposition Email security assigned to them. -Email Security shows you the total number of auto-moves and the source folder from which these moves are originating from. +Email security shows you the total number of auto-moves and the source folder from which these moves are originating from. To configure auto-move events: @@ -23,6 +23,6 @@ To configure auto-move events: - **Move to junk**: Moves the message to the junk or spam folder. - **No action**: Messages stay in the origin folder. 7. Select **Post-delivery** moves: - - **(Recommended) Post-delivery response**: Enabling this option allows Email Security to rescan delivered emails at multiple time intervals for previously unknown phishing sites or campaigns. - - **(Recommended) Phish submission response**: Enabling this option allows Email Security to move emails that your users reported as phishing and Email Security determined to be malicious. + - **(Recommended) Post-delivery response**: Enabling this option allows Email security to rescan delivered emails at multiple time intervals for previously unknown phishing sites or campaigns. + - **(Recommended) Phish submission response**: Enabling this option allows Email security to move emails that your users reported as phishing and Email security determined to be malicious. 8. Select **Save**. diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/additional-detections.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/additional-detections.mdx index dc458363a0b2436..d78437143e8d39f 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/additional-detections.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/additional-detections.mdx @@ -5,7 +5,7 @@ sidebar: order: 5 --- -Email Security allows you to configure the following additional detections: +Email security allows you to configure the following additional detections: - Domain age - Blank email detection @@ -15,7 +15,7 @@ Email Security allows you to configure the following additional detections: To configure additional detections: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**. 4. On the **Settings** page, go to **Detection settings** > **Additional detections**, and select **Edit**. diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/allow-policies.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/allow-policies.mdx index 5c4653e04e69eae..6ca800def019b81 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/allow-policies.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/allow-policies.mdx @@ -7,7 +7,7 @@ sidebar: import { Example, Details } from "~/components"; -Email Security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning. +Email security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning. ## How allow policies work @@ -15,7 +15,7 @@ Allow policies are crucial for legitimate messages that may otherwise be blocked -An example of allow policy is a phishing simulation product. You want to configure a phishing simulation product as **Accept sender** so Email Security does not scan the messages (or crawl links) in these simulated messages. +An example of allow policy is a phishing simulation product. You want to configure a phishing simulation product as **Accept sender** so Email security does not scan the messages (or crawl links) in these simulated messages. @@ -25,9 +25,9 @@ Allow policies are used to mitigate false positives. When an email has been mark ### Accept sender -Allow policies in Email Security give you the option to choose **Accept sender**. +Allow policies in Email security give you the option to choose **Accept sender**. -Accept sender creates exceptions for messages that would otherwise be marked as spam, bulk, or spoof. However, Email Security will continue to scan the message for maliciousness. +Accept sender creates exceptions for messages that would otherwise be marked as spam, bulk, or spoof. However, Email security will continue to scan the message for maliciousness. It is recommended to choose this option, as it is the safest option to protect your email inbox from malicious or suspicious activities. @@ -46,13 +46,13 @@ To make sure that users still receive the marketing email, you will have to sele To configure allow policies: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, then go to **Detection settings** > **Allow policies**. 4. On the **Detection settings** page, select **Add a policy**. 5. On the **Add an allow policy** page, enter the policy information: - **Input method**: Choose between **Manual input**, and **Uploading an allow policy**: - **Manual input**: - - **Action**: Select one of the following to choose how Email Security will handle messages that match your criteria: + - **Action**: Select one of the following to choose how Email security will handle messages that match your criteria: - **Trust sender**: Messages will bypass all detections and link following. - **Exempt recipient**: Message to this recipient will bypass all detections. - **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. Refer to [Allow policy configuration use cases](#use-case-1) for use case examples on how to configure allow policies for accept sender. @@ -61,7 +61,7 @@ To configure allow policies: - **IP addresses**: This is the IP address of the email server. Any email address sent from this email server is going to be allowed. The IP address can only be IPv4. IPv6 and CIDR are invalid entries. - **Domains**: Must be a valid domain. - **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email. For example, you can enter `.*@domain\.com` to exempt any email address that ends with `domain.com`. - - **(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email Security will only honor policies that pass authentication. + - **(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email security will only honor policies that pass authentication. - **Notes**: Provide additional information about your allow policy. - **Uploading an allow policy**: Upload a file no larger than 150 KB. The file can only contain `Pattern`, `Pattern Type`, `Verify Email`, `Trusted Sender`, `Exempt Recipient`, `Acceptable Sender`, `Notes` fields. The first row must be a header row. Refer to [CSV uploads](/cloudflare-one/email-security/settings/detection-settings/allow-policies/#csv-uploads) for an example file. 6. Select **Save**. @@ -72,7 +72,7 @@ The following use cases show how you could configure allow policies for accept s ### Use case 1 - + This use case can affect companies such as Shopify, PayPal, and Docusign. To solve this: @@ -85,7 +85,7 @@ The following use cases show how you could configure allow policies for accept s ### Use case 2 - + This use case can cause the emails you want to receive to follow the auto-moves rules you set up. This use case affects emails from internal tools (such as Salesforce, Atlassian, and Figma) that are given an incorrect disposition. @@ -98,7 +98,7 @@ To solve this, when you add an allow policy in the Cloudflare One dashboard: ### Use case 3 - + This use case impacts the emails from internal tools (such as Salesforce, Atlassian, and Figma) that are given an incorrect disposition. diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/blocked-senders.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/blocked-senders.mdx index 71d3f94054741c9..be5cbb8ad998e41 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/blocked-senders.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/blocked-senders.mdx @@ -5,7 +5,7 @@ sidebar: order: 2 --- -Email Security marks all messages from these senders with a malicious [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/). +Email security marks all messages from these senders with a malicious [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/). ## How blocked senders work @@ -18,7 +18,7 @@ Sometimes, the same email, IP address or domain always sends malicious emails to To configure blocked senders: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, go to **Detection settings** > **Blocked senders**. 4. On the **Detection settings** page, select **Add a sender**. 5. Select the **Input method**: Choose between **Manual input**, and **Upload blocked sender list**: diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-link-actions.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-link-actions.mdx index 5ce7ec72d985c02..3b0e1070d193295 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-link-actions.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-link-actions.mdx @@ -5,16 +5,16 @@ sidebar: order: 6 --- -You can configure how Email Security handles links in emails. +You can configure how Email security handles links in emails. :::note -You can only configure link actions if you deploy Email Security via [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/). +You can only configure link actions if you deploy Email security via [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/). ::: To configure link actions: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, then go to **Detection settings** > **Link actions** > **View**. You can configure **Link actions settings**, or **URL rewrite ignore patterns**. @@ -23,8 +23,7 @@ You can configure **Link actions settings**, or **URL rewrite ignore patterns**. To configure link actions, select **Configure**. -The dashboard will display **Open links evaluated as suspicious in a remote browser (Recommended)**. This option is turned on by default. Email Security will also allow you to select message dispositions to open all the links for dispositioned emails in a remote browser. - +The dashboard will display **Open links evaluated as suspicious in a remote browser (Recommended)**. This option is turned on by default. Email security will also allow you to select message dispositions to open all the links for dispositioned emails in a remote browser. Select one or more disposition, then select **Save**. @@ -40,4 +39,4 @@ You can add patterns for URLs that should be rewritten. To edit a pattern, go to the pattern you want to edit, select the three dots, then **Edit**. Once you have finished modifying the URL patter, select **Save**. -To delete a pattern, go to the pattern you want to delete, select the three dots, then **Delete**. \ No newline at end of file +To delete a pattern, go to the pattern you want to delete, select the three dots, then **Delete**. diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons.mdx index eb607bf1ccbc107..39f5a0bb8455c53 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons.mdx @@ -8,7 +8,7 @@ sidebar: You can create custom labels to be used as the subject or body prefix for emails with specific dispositions. :::note -You can only configure text add-ons if you deploy Email Security via [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/). +You can only configure text add-ons if you deploy Email security via [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/). ::: :::caution @@ -20,7 +20,7 @@ If you currently do not have text add-ons enabled, configuring text add-ons will To configure a subject prefix: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, then go to **Detection settings** > **Text add-ons** > **View**. 4. Select **Configure** > **Subject prefix**. 5. Populate each disposition with a subject prefix, and turn on the **Status** to enable the subject prefix for a specific disposition. diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/impersonation-registry.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/impersonation-registry.mdx index f7d4558045dba9c..697be9590ff5fa3 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/impersonation-registry.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/impersonation-registry.mdx @@ -9,15 +9,15 @@ The impersonation registry contains combinations of emails of users who are like :::note -The impersonation registry should contain a list of users who are likely to be impersonated. Email Security applies enhanced security to variations of registered email addresses for additional [Business Email Compromise (BEC)](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/) protection. +The impersonation registry should contain a list of users who are likely to be impersonated. Email security applies enhanced security to variations of registered email addresses for additional [Business Email Compromise (BEC)](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/) protection. -For easier tracking, the Email Security team recommends syncing and structuring VIPs in groups, and avoid doing manual inputs of users. +For easier tracking, the Email security team recommends syncing and structuring VIPs in groups, and avoid doing manual inputs of users. ::: To add a user to the impersonation registry: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings** > **Impersonation registry**. 4. Select **Add a user**. 5. Select **Input method**: Choose between **Manual input**, **Upload manual list**, and **Select from existing directories**: @@ -48,11 +48,11 @@ Phish Ee, phishee@nophish.com :::note -Administrators can edit the names and emails of users who belong to the Email Security directory. Administrators from other integrated directories cannot edit the name and the primary emails of users. +Administrators can edit the names and emails of users who belong to the Email security directory. Administrators from other integrated directories cannot edit the name and the primary emails of users. ::: -To edit users from the Email Security directory: +To edit users from the Email security directory: 1. Select the user you want to edit. 2. Select the three dots > **Edit**. @@ -70,7 +70,7 @@ To edit users from other integrations: :::note -Adiministrators can remove users who belong to the Email Security directory from the **Impersonation registry**. Users who come from an integrated directory cannot be removed from the **Impersonation registry** directly. +Adiministrators can remove users who belong to the Email security directory from the **Impersonation registry**. Users who come from an integrated directory cannot be removed from the **Impersonation registry** directly. To remove a user from an integrated directory: diff --git a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/trusted-domains.mdx b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/trusted-domains.mdx index 0c16d9c1a2b1cb3..f81683c43c264b7 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/detection-settings/trusted-domains.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/detection-settings/trusted-domains.mdx @@ -5,21 +5,21 @@ sidebar: order: 3 --- -Email Security allows you to exempt known partner and internal domains from typical detection scanning. Adding trusted domains helps to reduce false positives on [malicious, suspicious, and spoof dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/). Email Security only checks the date when the domain is created. +Email security allows you to exempt known partner and internal domains from typical detection scanning. Adding trusted domains helps to reduce false positives on malicious, suspicious, and spoof [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/). Email security only checks the date when the domain is created. ## How trusted domains work Trusted domains are not for the email message itself, but for entire domains. -By default, Email Security automatically detects lookalike domains. Lookalike domains can be something like this: `thisisdomain.com` and `thisisadomain.com`. Both domains almost look identical. +By default, Email security automatically detects lookalike domains. Lookalike domains can be something like this: `thisisdomain.com` and `thisisadomain.com`. Both domains almost look identical. If an email is received from a domain that looks like a configured domain, this will trigger a detection. Trusted domain is configured to ignore this detection. -In [Additional detections](/cloudflare-one/email-security/settings/detection-settings/additional-detections/), you can configure malicious domain and suspicious [domain age](/cloudflare-one/email-security/settings/detection-settings/additional-detections/). +In [Additional detections](/cloudflare-one/email-security/settings/detection-settings/additional-detections/), you can configure malicious domain and suspicious [domain age](/cloudflare-one/email-security/settings/detection-settings/additional-detections/#configure-domain-age). Malicious domain age means that someone may create a domain today, similar to a target, and start sending emails with that domain. This is usually how many phish campaigns start. In this case, the domain is usually marked as Malicious. Malicious domain age is usually set to 7 days. -Suspicious domain age means that after 7 days (this number corresponds to the Malicious domain age), a domain may not be malicious, but it can still be suspicious. Email Security will mark these domains as Suspicious. It is recommended to configure the **Suspicious domain age** between 30 and 45 days. +Suspicious domain age means that after 7 days (this number corresponds to the Malicious domain age), a domain may not be malicious, but it can still be suspicious. Email security will mark these domains as Suspicious. It is recommended to configure the **Suspicious domain age** between 30 and 45 days. To view whether a domain is malicious or suspicious: @@ -34,7 +34,7 @@ To view whether a domain is malicious or suspicious: To configure a trusted domain: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, go to **Detection settings** > **Trusted domains**. 4. On the **Detection settings** page, select **Add a domain**. 5. Select the **Input method**: Choose between **Manual input**, and **Upload trusted domain list**: diff --git a/src/content/docs/cloudflare-one/email-security/settings/invalid-submissions.mdx b/src/content/docs/cloudflare-one/email-security/settings/invalid-submissions.mdx index ec72d2ff4ba0829..f772ba6a96828f6 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/invalid-submissions.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/invalid-submissions.mdx @@ -7,26 +7,12 @@ sidebar: hideIndex: true --- -### Invalid submissions +You can be notified by email when you provide an invalid submission. -A submission is invalid when: - -- A submission has no EML file attached. -- A submission has been made with an incorrect file extension. -- A submission was made to the wrong team or user alias. - -To ensure your submission is valid: - -- Ensure your submission has a file attached with a `.eml` file extension. -- Ensure you configure the domain you are submitting emails for. -- Ensure policies are configured correctly. - -To view invalid submissions: +To turn on Invalid submission email notifications: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Reclassifications**. -3. Select **Invalid submissions**. - -You can search by submission ID or submitted email. +2. Select **Email security** > **Settings**. +3. Go to **Invalid submission emails** and turn on **Invalid submission email notifications**. -You can filter based on **Date Range** and **Submitted by** (which will list emails that made the invalid submissions). Once you have configured your desired filters, select **Apply filters**. \ No newline at end of file +Refer to [Invalid submission](/cloudflare-one/email-security/reclassifications/invalid-submissions/) to learn more. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/index.mdx b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/index.mdx index ff1c8ef5539c1e8..1339b67f306c26a 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/index.mdx @@ -7,7 +7,7 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; -As part of your continuous email security posture, administrators and security analysts need to submit missed phishing samples to Email Security, so Cloudflare can process them and take necessary action. +As part of your continuous email security posture, administrators and security analysts need to submit missed phishing samples to Email security, so Cloudflare can process them and take necessary action. Submitting missed phish samples to Cloudflare is of paramount importance and necessary for continuous protection. Submitting missed phish samples helps Cloudflare improve our machine learning (ML) models, and alerts us of new attack vectors before they become prevalent. @@ -20,7 +20,7 @@ There are three routes you can use to report an email as a phish: ## Reclassify an email 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security** > **Investigation**. +2. Select **Email security** > **Investigation**. 3. On the **Investigation** page, under **Your matching messages**, select the message you want to reclassify. Select the three dots, then select **Request reclassification**. By selecting **Request reclassification**, you are requesting a new disposition for the message. 4. Select the new disposition, then select **Save**. diff --git a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/phishnet-365.mdx b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/phishnet-365.mdx index 75e9d145b6f6fc0..1668553701af34e 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/phishnet-365.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/phishnet-365.mdx @@ -5,16 +5,14 @@ sidebar: order: 1 --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -PhishNet is an add-in button that helps users to submit directly to Email Security phish samples missed by Email Security's detection. - -## PhishNet M365 +PhishNet is an add-in button that helps users to submit directly to Email security phish samples missed by Email security's detection. To set up PhishNet M365: 1. Get the customized manifest URL from [Cloudflare One](https://one.dash.cloudflare.com/?to=/:account/email-security/settings/email-policy/phish-submission?tab=phish-submission). -2. Log in to the [Microsoft admin panel](https://admin.microsoft.com/). +2. Log in to the [Microsoft admin panel](https://admin.microsoft.com/). 3. Go to **Microsoft 365 admin center** > **Settings** > **Integrated Apps**. 4. Select **Upload custom apps**. 5. Choose **Provide link to manifest file** and paste the URL you copied from the Cloudflare One dashboard. diff --git a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/submission-addresses.mdx b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/submission-addresses.mdx index 764b4d691cf0e6d..ef50c355bf85a68 100644 --- a/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/submission-addresses.mdx +++ b/src/content/docs/cloudflare-one/email-security/settings/phish-submissions/submission-addresses.mdx @@ -8,8 +8,8 @@ sidebar: To view the destination addresses of user and team submissions: 1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**. 4. Go to **Phish submission** > **Submission addresses** > **View**. -The dashboard will display **User submission addresses** and **Team submission addresses**. \ No newline at end of file +The dashboard will display **User submission addresses** and **Team submission addresses**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/index.mdx index c59d2e0c7ce102c..cd138ae8e2eb747 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/index.mdx @@ -12,20 +12,20 @@ import { Markdown } from "~/components"; Before you start the onboarding process, you will have to: -1. Choose a deployment path: Email Security provides two deployment modes, [post-delivery](/cloudflare-one/email-security/setup/post-delivery-deployment/) for API and BCC/Journaling and [pre-delivery](/cloudflare-one/email-security/setup/pre-delivery-deployment/) for MX/Inline. +1. Choose a deployment path: Email security provides two deployment modes, [post-delivery](/cloudflare-one/email-security/setup/post-delivery-deployment/) for API and BCC/Journaling and [pre-delivery](/cloudflare-one/email-security/setup/pre-delivery-deployment/) for MX/Inline. 2. Learn about dispositions, impersonation registry, and reclassifications. 3. Know the steps to configure your email environment correctly. The following table compares features available across API, BCC/Journaling and MX/Inline: -| Feature | API | BCC | Journaling | MX/Inline | -|-------------------------- |----------------------------------------------------- |----------------------------------------------------- |----------------------------------------------------------------- |-------------------------------------------------------------- | -| Deployment Type | Post-delivery | Post-delivery | Post-delivery | Pre-delivery (Inline) | -| Supported Email Provider | Microsoft 365 | Gmail, Microsoft 365 | Microsoft 365 | All email providers | -| Inspection Timing | Scans messages already in the mailbox | Scans a copy of the message upon delivery | Scans a copy of the message upon delivery | Scans the message before delivery | -| Mechanism | Uses MS Graph API to integrate with Microsoft 365. | Uses a BCC rule to send a copy to Cloudflare | Uses a Journal Rule in the Microsoft Purview portal | Changes MX records to point email traffic to Cloudflare | -| Message Remediation | Auto-moves through Read/Write API permissions | Auto-moves through Google or Microsoft integration | Auto-moves through Microsoft integration | Messages can be blocked, quarantined, or modified inline | -| Message Modification | Primarily deletion/move post-delivery | Primarily deletion/move post-delivery | Primarily deletion/move post-delivery. | Move post-delivery. Supports link actions and text add-ons.[^1] | +| Feature | API | BCC | Journaling | MX/Inline | +| ------------------------ | -------------------------------------------------- | -------------------------------------------------- | --------------------------------------------------- | --------------------------------------------------------------- | +| Deployment Type | Post-delivery | Post-delivery | Post-delivery | Pre-delivery (Inline) | +| Supported Email Provider | Microsoft 365 | Gmail, Microsoft 365 | Microsoft 365 | All email providers | +| Inspection Timing | Scans messages already in the mailbox | Scans a copy of the message upon delivery | Scans a copy of the message upon delivery | Scans the message before delivery | +| Mechanism | Uses MS Graph API to integrate with Microsoft 365. | Uses a BCC rule to send a copy to Cloudflare | Uses a Journal Rule in the Microsoft Purview portal | Changes MX records to point email traffic to Cloudflare | +| Message Remediation | Auto-moves through Read/Write API permissions | Auto-moves through Google or Microsoft integration | Auto-moves through Microsoft integration | Messages can be blocked, quarantined, or modified inline | +| Message Modification | Primarily deletion/move post-delivery | Primarily deletion/move post-delivery | Primarily deletion/move post-delivery. | Move post-delivery. Supports link actions and text add-ons.[^1] | [^1] With [inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/), Cloudflare recommends setting up the integrations to allow post-delivery response and phish submission response to work. Refer to step 7 in [Auto-moves](/cloudflare-one/email-security/settings/auto-moves/) to learn more. @@ -45,10 +45,11 @@ Post-delivery deployment is time-efficient, because it does not involve MX chang :::note When you choose post-delivery deployment: + - The threat is removed **after** the message has been delivered to the inbox. - It requires API scopes, or BCC/Journaling rule configuration. - Auto-move is only available in BCC/Journaling if you associate an integration. -::: + ::: ### Pre-delivery deployment @@ -62,10 +63,11 @@ Pre-delivery blocks threats in transit, and it adds banners or texts before the :::note When you choose pre-delivery deployment: + - You must edit MX records or create a connector. - You can enable auto-move events only after you associate an integration. - Cloudflare [egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) are allowed on downstream mail servers. -::: + ::: ## 2. Understand dispositions @@ -91,10 +93,9 @@ You should review your impersonation registry on a quarterly basis as roles chan A reclassification is a change to an email's disposition **after** initial scanning. It is Cloudflare's built-in feedback loop for correcting false positives/negatives **and** training the detection models to get smarter over time. Refer to [Reclassify messages](/cloudflare-one/email-security/investigation/search-email/#reclassify-messages) to learn how to reclassify a message. - ### Who can reclassify messages -[Security teams](/cloudflare-one/email-security/investigation/search-email/#team-submissions) and [end users](/cloudflare-one/email-security/investigation/search-email/#user-submissions) can submit a reclassification. +[Security teams](/cloudflare-one/email-security/monitoring/search-email/#team-submissions) and [end users](/cloudflare-one/email-security/monitoring/search-email/#user-submissions) can submit a reclassification. ### Why you should reclassify messages @@ -109,27 +110,28 @@ To make the most of reclassifications: 1. Review reclassifications on a weekly basis. 2. Ensure you have an integration associated with any MX/Inline deployment. When you associate an integration, you will not need to upload the EMLs every time; Cloudflare can use APIs to receive a copy of your email messages. -3. Investigate any increase in [user submissions](/cloudflare-one/email-security/investigation/search-email/#user-submissions) (users may have found a phish that bypassed filters) and confirm that analyst-final dispositions align with your policies. +3. Investigate any increase in [user submissions](/cloudflare-one/email-security/monitoring/search-email/#user-submissions) (users may have found a phish that bypassed filters) and confirm that analyst-final dispositions align with your policies. -A correct use of reclassifications ensures that Email Security delivers a stronger protection with less manual tuning. +A correct use of reclassifications ensures that Email security delivers a stronger protection with less manual tuning. ## 5. Configuration checklist Follow the below checklist to ensure your email environment is set up correctly: -| Step | Post-delivery | Pre-delivery | -|---------------------------------------------------------------------------------------------------------|---------------|--------------| -| Authorize integration ([Graph API](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration) or [Google Workspace](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/)) | Required[^1] | Required [^2] | -| Associate an integration with an MX/Inline domain | | Required | -| Add/verify domains | Required | Required | -| [Update MX records/connector](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/), then allow Cloudflare [egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) on downstream mail server | | Required | -| Enable [Post‑delivery response and Phish submission response](/cloudflare-one/email-security/settings/auto-moves/) | Required | Required | -| Populate [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) and [allow](/cloudflare-one/email-security/settings/detection-settings/allow-policies/)/[block](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) lists | Required | Required | -| Configure [partner domain TLS](/cloudflare-one/email-security/setup/pre-delivery-deployment/partner-domain-tls/) and admin quarantine | | Required | -| Configure [text add-ons](/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons/) and [link actions](/cloudflare-one/email-security/settings/detection-settings/configure-link-actions/) | | Required | -| Send a test email and verify it appears in **Monitoring** > [**Email activity**](/cloudflare-one/email-security/monitoring/#email-activity) with expected disposition | Required | Required | +| Step | Post-delivery | Pre-delivery | +| -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------- | ------------- | +| Authorize integration ([Graph API](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration) or [Google Workspace](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/)) | Required[^1] | Required [^2] | +| Associate an integration with an MX/Inline domain | | Required | +| Add/verify domains | Required | Required | +| [Update MX records/connector](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/), then allow Cloudflare [egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) on downstream mail server | | Required | +| Enable [Post‑delivery response and Phish submission response](/cloudflare-one/email-security/settings/auto-moves/) | Required | Required | +| Populate [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) and [allow](/cloudflare-one/email-security/settings/detection-settings/allow-policies/)/[block](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) lists | Required | Required | +| Configure [partner domain TLS](/cloudflare-one/email-security/setup/pre-delivery-deployment/partner-domain-tls/) and admin quarantine | | Required | +| Configure [text add-ons](/cloudflare-one/email-security/settings/detection-settings/configure-text-add-ons/) and [link actions](/cloudflare-one/email-security/settings/detection-settings/configure-link-actions/) | | Required | +| Send a test email and verify it appears in **Monitoring** > [**Email activity**](/cloudflare-one/email-security/monitoring/#email-activity) with expected disposition | Required | Required | [^1]: Associating an integration with BCC/Journaling is required for post-delivery but not for pre-delivery. + [^2]: Still used for directory/auto‑move insight if desired as well as authorizing free API CASB. -Now that you know which deployment path to choose, you can begin your onboarding process. \ No newline at end of file +Now that you know which deployment path to choose, you can begin your onboarding process. diff --git a/src/content/docs/cloudflare-one/email-security/setup/manage-domains.mdx b/src/content/docs/cloudflare-one/email-security/setup/manage-domains.mdx index b616a7949b8fe8f..fb68b2d2bde6701 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/manage-domains.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/manage-domains.mdx @@ -4,26 +4,22 @@ sidebar: order: 4 --- -Once you have deployed your domain, Email Security allows you to filter and edit domains. You can also choose to stop a domain from being scanned. +Once you have deployed your domain, Email security allows you to filter and edit domains. You can also choose to stop a domain from being scanned. ## Filter domains To filter your domains: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. -3. Select **Show filters** > **Configured method**. Choose among the following filters: - - **MS Graph API**: To view domains connected via MS Graph API. - - **BCC/Journaling**: To view domains connected via BCC/Journaling. - - **MX/Inline**: To view domains connected via MX/Inline. - - **Retro Scan**: To view domains scanned by Retro Scan. -4. Select **Apply filters**. +3. Select **Show filters** > **Configured method**. Choose among the following filters: - **MS Graph API**: To view domains connected via MS Graph API. - **BCC/Journaling**: To view domains connected via BCC/Journaling. - **MX/Inline**: To view domains connected via MX/Inline. - **Retro Scan**: To view domains scanned by Retro Scan. +4. Select **Apply filters**. ## Edit domains To edit your domains: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. 3. On the **Domains** page, locate your domain, select the three dots > **Edit**. 4. If you did not manually add your domain, you will only be able to edit **Hops**. If you manually added your domain, you will be able to edit **Domain name** and **Hops**. @@ -33,7 +29,7 @@ To edit your domains: To stop scanning domains: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. 3. On the **Domains** page, locate your domain, select the three dots > **Stop scanning**. -4. Select **Stop scanning** again to stop Cloudflare from scanning your domain. \ No newline at end of file +4. Select **Stop scanning** again to stop Cloudflare from scanning your domain. diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/index.mdx index 3e062de34824b25..4ad29066c26abb6 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/index.mdx @@ -5,12 +5,11 @@ sidebar: order: 1 --- -When you choose an API deployment, email messages only reach Email Security after they have already reached a user's inbox. +When you choose an API deployment, email messages only reach Email security after they have already reached a user's inbox. -Then, through an integration with your email provider, Email Security can [auto-move messages](/cloudflare-one/email-security/settings/auto-moves/) based on your organization's policies. - -![With API deployment, messages travel through Email Security's email filter after reaching your users.](~/assets/images/email-security/deployment/api-setup/M365_API_Deployment_Graph.png) +Then, through an integration with your email provider, Email security can [auto-move messages](/cloudflare-one/email-security/settings/auto-moves/) based on your organization's policies. +![With API deployment, messages travel through Email security's email filter after reaching your users.](~/assets/images/email-security/deployment/api-setup/M365_API_Deployment_Graph.png) ## Benefits @@ -23,9 +22,9 @@ When you choose API deployment, you get the following benefits: However, API deployment also has the following disadvantages: -- Email Security is dependent on Microsoft's Graph API, and outages will increase the message dwell time in the inbox. -- Your email provider may throttle API requests from Email Security. -- Email Security requires read and write access to mailboxes. +- Email security is dependent on Microsoft's Graph API, and outages will increase the message dwell time in the inbox. +- Your email provider may throttle API requests from Email security. +- Email security requires read and write access to mailboxes. - Requires API support from your email provider (does not typically support on-premise providers). - Detection rates may be lower if multiple solutions exist. -- Messages cannot be modified or quarantined. \ No newline at end of file +- Messages cannot be modified or quarantined. diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api.mdx index 497150f28995d3c..e21a879b441f694 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api.mdx @@ -7,23 +7,23 @@ sidebar: import { Render } from "~/components"; -This guide will instruct you through setting up Microsoft 365 with Email Security via the Cloudflare dashboard. +This guide will instruct you through setting up Microsoft 365 with Email security via the Cloudflare dashboard. ## Prerequisites -To use Email Security, you will need to have: +To use Email security, you will need to have: -## Enable Email Security via the dashboard +## Enable Email security via the dashboard -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) and select **Email Security**.. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) and select **Email security**.. 2. Select **Overview**. Select one of the following options depending on your use case: -- If you have not purchased Email Security, select **Contact sales**. +- If you have not purchased Email security, select **Contact sales**. - If you have not associated any integration: - Select **Set up**. - Choose **MS Graph API** > **Authorize**. @@ -41,19 +41,19 @@ To enable Microsoft integration: 3. **Authorize integration**: - Select **Authorize**. Selecting **Authorize** will take you to the Microsoft Sign in page where you will have to enter your email address. - Once you enter your email address, select **Next**. - - After selecting **Next**, the system will show a dialog box with a list of requested permissions. Select **Accept** to authorize Email Security. Upon authorization, you will be redirected to a page where you can review details and enroll integration. + - After selecting **Next**, the system will show a dialog box with a list of requested permissions. Select **Accept** to authorize Email security. Upon authorization, you will be redirected to a page where you can review details and enroll integration. 4. **Review details**: Review your integration details, then: - - Select **Complete Email Security set up** where you will be able to connect your domains and configure auto-moves. - - Select **Continue to Email Security**. + - Select **Complete Email security set up** where you will be able to connect your domains and configure auto-moves. + - Select **Continue to Email security**. Continue with [Connect your domains](#connect-your-domains) for the next steps. ### Connect your domains -On the **Set up Email Security** page, you will be able to connect your Microsoft domains. To connect your domains: +On the **Set up Email security** page, you will be able to connect your Microsoft domains. To connect your domains: 1. **Connect domains**: Select at least one domain. Then, select **Continue**. -2. (Optional) **Modify default scanning**: You can configure which folder Email Security can scan. +2. (Optional) **Modify default scanning**: You can configure which folder Email security can scan. 3. (Optional - select **Skip for now** to skip this step) **Redirect messages**: Refer to [Auto-moves](/cloudflare-one/email-security/settings/auto-moves/) to learn what auto-moves are, and how to configure auto-moves. 4. **Review details**: Review your connected domains, then select **Go to Domains**. @@ -63,10 +63,10 @@ Your domains are now connected successfully. To connect new domains: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Select **Settings** > **Domain management** > **Domains**, then select **View**. 3. Select **Add a domain**. -4. Select a method for connecting your mail environment to Email Security: +4. Select a method for connecting your mail environment to Email security: - If you select **MS Graph API**, refer to [Enable Microsoft integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration). - If you select BCC/Journaling, choose how to connect your domains: - If you select **Integrate with MS**, refer to [Enable Microsoft integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration). @@ -77,7 +77,7 @@ To connect new domains: If you want to prevent Cloudflare from scanning a domain: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. 3. On the **Domain management** page, select the domain you do not want to be scanned. 4. Select the three dots > **Stop scanning**. @@ -86,12 +86,12 @@ If you want to prevent Cloudflare from scanning a domain: To view the integration for each connected domain: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), select **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. 3. Select a domain. 4. Select the three dots > **View integration**. -Once you have set up Email Security to scan through your inbox, Email Security will display detailed information about your inbox. Refer to [Monitor your inbox](/cloudflare-one/email-security/monitoring/) to learn more. +Once you have set up Email security to scan through your inbox, Email security will display detailed information about your inbox. Refer to [Monitor your inbox](/cloudflare-one/email-security/monitoring/) to learn more. phishing attacks. The following email flow shows how this works: +For customers using Microsoft Exchange, setting up Email security via BCC is quick and easy. You need to configure an inbound rule to send emails to Email security via BCC for processing and detection of potential phishing attacks. The following email flow shows how this works: -![Email flow when setting up a phishing assessment risk for Microsoft Exchange with Email Security.](~/assets/images/email-security/deployment/api-setup/exchange/bcc-exchange-flow.png) +![Email flow when setting up a phishing assessment risk for Microsoft Exchange with Email security.](~/assets/images/email-security/deployment/api-setup/exchange/bcc-exchange-flow.png) :::note[Auto-moves for Microsoft Exchange customers] Microsoft Exchange customers can auto-move if your email service is on-premise and you are using Microsoft Exchange online. @@ -49,9 +49,9 @@ Microsoft Exchange customers can auto-move if your email service is on-premise a ![Select external e-mail address](~/assets/images/email-security/deployment/api-setup/exchange/step8.png) -9. Enter the BCC address provided by Email Security. This address is specific to your account. +9. Enter the BCC address provided by Email security. This address is specific to your account. - ![Enter the BCC address provided by Email Security](~/assets/images/email-security/deployment/api-setup/exchange/step9.png) + ![Enter the BCC address provided by Email security](~/assets/images/email-security/deployment/api-setup/exchange/step9.png) 10. Select **OK** > **OK** to return to the main configuration page of the transport rule. @@ -71,13 +71,13 @@ Microsoft Exchange customers can auto-move if your email service is on-premise a :::note -If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email Security. Usually, the Email Security BCC rule will be at the top of the ruleset. The configured conditions of the Email Security BCC rule will only trigger for inbound messages. +If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email security. Usually, the Email security BCC rule will be at the top of the ruleset. The configured conditions of the Email security BCC rule will only trigger for inbound messages. ::: ## Email processing and reports -In BCC mode, all emails are put through automated phishing detections by Email Security. Emails that trigger phishing detections are logged for reporting via product portal, email and Slack. Emails that do not trigger any detections are deleted. +In BCC mode, all emails are put through automated phishing detections by Email security. Emails that trigger phishing detections are logged for reporting via product portal, email and Slack. Emails that do not trigger any detections are deleted. ## Next steps - \ No newline at end of file + diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/add-bcc-rules.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/add-bcc-rules.mdx index 40211f6d6737b5f..69ef8318e09b8ca 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/add-bcc-rules.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/add-bcc-rules.mdx @@ -8,27 +8,24 @@ sidebar: 1. Log in to the [Google Admin Console](https://admin.google.com/). 2. On the sidebar, go to **Apps** > **Google Workspace** > **Gmail** > **Compliance**. 3. Go to **Content Compliance** > Select **Edit**. -4. Add a **Content Compliance** filter, and name it `Email Security - BCC`. +4. Add a **Content Compliance** filter, and name it `Email security - BCC`. 5. In **Email messages to affect**, select **Inbound**. -6. Select the recipients you want to send emails to Email Security via BCC. Under **Add expressions that describe the content you want to search for in each message**: - - Select **If ANY of the following match the message**. - - Select **Add** to configure the expression. - - Select **Advanced content match**. - - In **Location**, select **Headers + Body**. - - In **Match type**, select **Matches regex**. - - In **Regexp**, input `.*`. You can customize the regex as needed and test within the admin page or on sites like [Regexr](https://regexr.com/). - - Select **SAVE**. +6. Select the recipients you want to send emails to Email security via BCC. Under **Add expressions that describe the content you want to search for in each message**: + - Select **If ANY of the following match the message**. + - Select **Add** to configure the expression. + - Select **Advanced content match**. + - In **Location**, select **Headers + Body**. + - In **Match type**, select **Matches regex**. + - In **Regexp**, input `.*`. You can customize the regex as needed and test within the admin page or on sites like [Regexr](https://regexr.com/). + - Select **SAVE**. 7. In **If the above expressions match, do the following**: - - Select **Modify message**. - - Ensure that **Envelope recipient** > **Change envelope recipient** is unselected, so that emails will not be dropped as an unintended consequence. You will select this option at a later stage. - - Go to **Also deliver to**, select **Add more recipients** > **ADD** > Choose **Advanced**: - - Under **Envelope recipient**, select **Change envelope recipient** > **Replace recipient** > Enter the service address. This is the service address you copied and pasted in step 5 when [connecting your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/). - If you did not copy and paste the service address: - - In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**. - - Go to **Settings** and locate your domain under **Your domains**. - - Select the three dots > **View domain** > **Service address**. Copy and paste the service address. - - Under **Spam and delivery options**, select **Suppress bounces from this recipient**. - - Under **Headers**, select **Add X-Gm-Spam and X-Gm-Phishy headers**. - - Select **SAVE**. + - Select **Modify message**. + - Ensure that **Envelope recipient** > **Change envelope recipient** is unselected, so that emails will not be dropped as an unintended consequence. You will select this option at a later stage. + - Go to **Also deliver to**, select **Add more recipients** > **ADD** > Choose **Advanced**: + - Under **Envelope recipient**, select **Change envelope recipient** > **Replace recipient** > Enter the service address. This is the service address you copied and pasted in step 5 when [connecting your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/). + If you did not copy and paste the service address: - In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**. - Go to **Settings** and locate your domain under **Your domains**. - Select the three dots > **View domain** > **Service address**. Copy and paste the service address. + - Under **Spam and delivery options**, select **Suppress bounces from this recipient**. + - Under **Headers**, select **Add X-Gm-Spam and X-Gm-Phishy headers**. + - Select **SAVE**. 8. In **Account types to affect**, select **Users** and **Groups**. -9. Select **SAVE**. \ No newline at end of file +9. Select **SAVE**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx index 780fd620ee4ee2a..9131d6e9f2a7f53 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains.mdx @@ -5,22 +5,22 @@ sidebar: order: 3 --- -import { GlossaryTooltip, Render } from "~/components" +import { GlossaryTooltip, Render } from "~/components"; -To connect your domains, you will need to [enable your Gmail BCC integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#enable-gmail-bcc-integration). Once you have enabled your Gmail BCC integration, the Cloudflare dashboard will redirect you to the **Set up Email Security** page. +To connect your domains, you will need to [enable your Gmail BCC integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#enable-gmail-bcc-integration). Once you have enabled your Gmail BCC integration, the Cloudflare dashboard will redirect you to the **Set up Email security** page. -On the **Set up Email Security** page: +On the **Set up Email security** page: 1. **Connect domains**: Select at least one domain. Then, select **Continue**. 2. (**Optional**) **Add manual domains**: Select **Add domain name** to manually enter additional domains. Then, select **Continue**. 3. (**Optional**) **Adjust hop count**: Enter the number of hops. Then, select **Continue**. 4. (**Optional**, select **Skip for now** to skip this step) **Move messages**: Refer to [Auto-moves](/cloudflare-one/email-security/settings/auto-moves/) to configure auto-moves. Then, select **Continue**. -5. **Select your processing location**: Configure where you want Cloudflare to process your email. **Global** will be the default option. If you choose **Global**, `@CF-emailsecurity.com` will be your regional service address. Once you have chosen your processing location, select **Continue**. +5. **Select your processing location**: Configure where you want Cloudflare to process your email. **Global** will be the default option. If you choose **Global**, `@CF-emailsecurity.com` will be your regional service address. Once you have chosen your processing location, select **Continue**. 6. **Review details**: Review your connected domains and service addresses. Then, select **Go to domains.** Your domains are now added successfully. -On the **Domains** page, select the three dots > **View integration**. The dashboard will display your [domain information](/cloudflare-one/email-security/reference/domain-information/). +On the **Domains** page, select the three dots > **View integration**. The dashboard will display your [domain information](/cloudflare-one/email-security/settings/domain-management/domain/). Under **Source**, the dashboard will display **Google integration**, along with the **Integration name**. @@ -28,15 +28,18 @@ Under **Source**, the dashboard will display **Google integration**, along with To add additional domains: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security** > **Settings**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security** > **Settings**. 2. Select **Connect an integration** > **BCC/Journaling** > **Integrate with Google** > **Authorize**. 3. **Connect domains**: Select the domains you want to add, then select **Next**. 4. (Optional) Select **Add manual domains**: Enter additional domains manually, then select **Next**. 5. (Optional) Select **Adjust hop count**: Enter the number of hops. 6. **Review details**: Review your selected domains, then use the following email to configure the service address with your third-party email provider: - ```txt - @CF-emailsecurity.com - ``` + ```txt + @CF-emailsecurity.com + ``` 7. Select **Save**. - \ No newline at end of file + diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx index c7a6b9aac7488f4..07cd3638a3652ed 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-auto-moves.mdx @@ -7,9 +7,9 @@ sidebar: If you do not have an integration: -1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email Security**. +1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Email security**. 2. Go to **Settings** > **Domain management** > **Domains** > select **View**. 3. Locate your domain, select the three dots > Select **Associate an integration**. 4. Select **Connect an integration**. You will then be redirected to the **Add an integration** page. 5. Select **Google Workspace CASB+EMAIL** > **Select Integration**. -6. Once you select an integration, you can [enable Gmail BCC integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#enable-gmail-bcc-integration). \ No newline at end of file +6. Once you select an integration, you can [enable Gmail BCC integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#enable-gmail-bcc-integration). diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx index 25c9be987363a69..d18eb0eb3988893 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration.mdx @@ -9,7 +9,7 @@ import { Render } from "~/components"; ## Prerequisites -To use Email Security, you will need to have: +To use Email security, you will need to have: **Authorize**. @@ -49,8 +49,8 @@ To use Email Security, you will need to have: On the [Google Cloud Console](https://console.cloud.google.com/welcome/new): 1. On the sidebar, select **IAM & Admim** > **Service Accounts**. -2. Locate your email, select the three dots, then select **Manage keys**. -3. Select **Add key** > **Create new key**. +2. Locate your email, select the three dots, then select **Manage keys**. +3. Select **Add key** > **Create new key**. 4. Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use when [uploading a JSON key](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/#3-upload-json-key). ### 3. Upload JSON Key @@ -59,11 +59,12 @@ On the [Cloudflare One dashboard](https://one.dash.cloudflare.com/), upload the ### 4. Enable Necessary Google Workspace APIs in GCP -Enable the following APIs on the Google Cloud Console: -- [Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) -- [Google Drive API](https://console.cloud.google.com/apis/library/drive.googleapis.com?project=winter-surf-439414-h1) +Enable the following APIs on the Google Cloud Console: + +- [Google Calendar API](https://console.cloud.google.com/apis/library/calendar-json.googleapis.com?project=winter-surf-439414-h1) +- [Google Drive API](https://console.cloud.google.com/apis/library/drive.googleapis.com?project=winter-surf-439414-h1) - [Google Admin SDK API](https://console.cloud.google.com/apis/library/admin.googleapis.com?project=winter-surf-439414-h1) -- [Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) +- [Gmail API](https://console.cloud.google.com/apis/library/gmail.googleapis.com?project=winter-surf-439414-h1) - [Google Service Usage API](https://console.cloud.google.com/apis/library/serviceusage.googleapis.com?project=winter-surf-439414-h1) ### 5. Log in to Google Workspace Admin Console @@ -85,7 +86,7 @@ Enter the email associated with the Google Workspace Administrator account. Your 1. Select **Create integration**. 2. Once you created your integration, you will be redirected to the **Review details** page, where you will be able to review **Integration details**. -3. Review your details, then select **Complete Email Security set up** > **Continue to Email Security**. +3. Review your details, then select **Complete Email security set up** > **Continue to Email security**. ## Verify integration @@ -95,7 +96,7 @@ To verify that the integration has been successful: 2. Under **Your integrations**, locate your integration, and ensure that the integration displays **CASB+EMAIL** under **Type**. :::note -If you do not reach the step to complete the Email Security set up: +If you do not reach the step to complete the Email security set up: 1. Go to **Integrations** > **Cloud & SaaS Integrations** > **Integrations**. 2. Delete the integration, if present. Locate your integration, select **Configure**, then select **Delete**. @@ -106,5 +107,5 @@ If you do not reach the step to complete the Email Security set up: Now that you have created an integration: -- [Connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) for Email Security to start scanning your inbox. +- [Connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/) for Email security to start scanning your inbox. - [Enable logs](/cloudflare-one/insights/logs/enable-logs/) to send detection data to an endpoint of your choice. diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx index 251cfea79e990dc..7980d5adfb4c123 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/gmail-bcc-setup.mdx @@ -5,13 +5,12 @@ sidebar: order: 1 --- - -For customers using Gmail as their email provider, setting up Email Security is quick and easy. +For customers using Gmail as their email provider, setting up Email security is quick and easy. You will need to [create an integration](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/enable-gmail-integration/), [add BCC rules](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/add-bcc-rules/), and [connect your domain(s)](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/). You can choose to [add additional domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/bcc-setup/gmail-bcc-setup/connect-domains/#add-additional-domains) at a later stage. -Once you set up Google integration, Email Security will receive a copy of your email messages. You will need a Google integration to enable [auto-moves](/cloudflare-one/email-security/settings/auto-moves/). +Once you set up Google integration, Email security will receive a copy of your email messages. You will need a Google integration to enable [auto-moves](/cloudflare-one/email-security/settings/auto-moves/). The following email flow shows how this works: -![Gmail BCC deployment flow](~/assets/images/email-security/deployment/api-setup/gmail/Gmail_BCC_with_auto-move.png) \ No newline at end of file +![Gmail BCC deployment flow](~/assets/images/email-security/deployment/api-setup/gmail/Gmail_BCC_with_auto-move.png) diff --git a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling.mdx b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling.mdx index dae623e14073db3..dc9639611dc0c9e 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling.mdx @@ -7,14 +7,14 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; -When you receive an email, the email lands on your Microsoft 365 inbox, and then Email Security receives a copy of that email. The following email flow shows how this works: +When you receive an email, the email lands on your Microsoft 365 inbox, and then Email security receives a copy of that email. The following email flow shows how this works: -![Email flow when setting up Microsoft 365 with Email Security.](~/assets/images/email-security/deployment/api-setup/journaling/Email_Security_MS365_Journaling_Diagram.png) +![Email flow when setting up Microsoft 365 with Email security.](~/assets/images/email-security/deployment/api-setup/journaling/Email_Security_MS365_Journaling_Diagram.png) To enable Microsoft 365 journaling deployment: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. -2. Select **Overview**. If you have not purchased Email Security, select **Contact Sales**. Otherwise, select **Set up** > **BCC/Journaling**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. +2. Select **Overview**. If you have not purchased Email security, select **Contact Sales**. Otherwise, select **Set up** > **BCC/Journaling**. 3. Select **Integrate with MS** > **Authorize**. 4. Continue with [Integrate with Microsoft 365](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/#1-integrate-with-microsoft-365) to connect your Microsoft integration. @@ -26,16 +26,16 @@ To integrate with Microsoft 365: 2. **Authorize integration**: - Select **Authorize**. Selecting **Authorize** will take you to the **Microsoft Sign in** page where you will have to enter your email address. - Once you enter your email address, select **Next**. - - After selecting **Next**, the dashboard will show you a dialog box with a list of requested permissions. Select **Accept to authorize Email Security**. Upon authorization, you will be redirected to a page where you can review details and enroll the integration. + - After selecting **Next**, the dashboard will show you a dialog box with a list of requested permissions. Select **Accept to authorize Email security**. Upon authorization, you will be redirected to a page where you can review details and enroll the integration. 3. **Review details**: Review your integration details, then: - - Select **Complete Email Security set up** where you will be able to connect your domains and configure auto-moves. - - Select **Continue to Email Security**. + - Select **Complete Email security set up** where you will be able to connect your domains and configure auto-moves. + - Select **Continue to Email security**. Continue with [Connect your domains](#connect-your-domains) for the next steps. ### Connect your domains -On the **Set up Email Security** page: +On the **Set up Email security** page: 1. **Connect domains**: Select at least one domain. Then, select **Continue**. 2. (**Optional**) **Add manual domains**: Select **Add domain name** to manually enter additional domains. Then, select **Continue**. @@ -65,7 +65,7 @@ To view your connected domains: 6. Select **New rule** to configure a journaling rule, and configure it as follows: - **Send journal reports to**: This is the address you copied and pasted in step 5 of [Connect your domains](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/#connect-your-domains). - - **Journal rule name**: `Journal Messages to Email Security` + - **Journal rule name**: `Journal Messages to Email security` - **Journal messages sent or received from**: _Everyone_ - **Type of message to journal**: _External messages only_ @@ -73,7 +73,7 @@ To view your connected domains: 8. Verify the information is correct, and select **Submit** > **Done**. -Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Email Security. After it propagates, you can [monitor your inbox](/cloudflare-one/email-security/monitoring/) in the Cloudflare dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Email Security from your Exchange server. +Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Email security. After it propagates, you can [monitor your inbox](/cloudflare-one/email-security/monitoring/) in the Cloudflare dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Email security from your Exchange server. **Email Security**. -2. Select **Overview**. If you have not purchased Email Security, select **Contact Sales**. Otherwise, select **Set up** > **BCC/Journaling**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. +2. Select **Overview**. If you have not purchased Email security, select **Contact Sales**. Otherwise, select **Set up** > **BCC/Journaling**. 3. Select **Manual add**. ## Users with domains on Cloudflare -On the **Set up Email Security** page: +On the **Set up Email security** page: 1. **Connect domains**: Select at least one domain. Then, select **Continue**. 2. (**Optional**) **Add manual domains**: Manually enter additional domains. Then, select **Continue**. 3. (**Optional**) **Adjust hop count**: Enter the number of hops, and then select **Continue**. -4. **Select your processing location**: Configure where you want Cloudflare to process your email. **Global** will be the default option. If you choose **Global**, `@CF-emailsecurity.com` will be your regional service address. Once you have chosen your processing location, select **Continue**. +4. **Select your processing location**: Configure where you want Cloudflare to process your email. **Global** will be the default option. If you choose **Global**, `@CF-emailsecurity.com` will be your regional service address. Once you have chosen your processing location, select **Continue**. 5. **Review details**: Review your connected domains and regional service address. Then, select **Go to domains.** ## Users who do not have domains with Cloudflare @@ -44,7 +44,7 @@ Selecting **Add a domain to Cloudflare** will redirect you to a new page where y ### Enter domain manually -On the **Set up Email Security** page: +On the **Set up Email security** page: 1. **Connect domains**: Select at least one domain. Then, select **Continue**. 2. (**Optional**) **Add manual domains**: Manually enter additional domains. Then, select **Continue**. @@ -58,7 +58,7 @@ To enable auto-move events, you will have to associate an integration. To associate an integration: -1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email Security**. +1. Log in to [Cloudflare One](https://one.dash.cloudflare.com/) > **Email security**. 2. Go to **Settings** > **Domain management** > **Domains** > Select **View**. 3. On the **Domain management** page, locate your domain, select the three dots, then select **Associate an integration**. 4. Select **Connect an integration**. Follow the steps to [enable the Microsoft 365 integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/m365-api/#enable-microsoft-integration). diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx index fa6df714059faa8..37f4d34f1e0b52c 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx @@ -5,7 +5,7 @@ sidebar: order: 4 --- -When you set up Email Security using an [MX/Inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/), your existing email provider will accept messages coming from Email Security's egress IP addresses. +When you set up Email security using an [MX/Inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/), your existing email provider will accept messages coming from Email security's egress IP addresses. Setting up egress IPs allows Cloudflare to deliver emails to your inbox. @@ -82,4 +82,4 @@ Use these IPv4 addresses for Microsoft 365, instead of the `/19` and `/23` subne 104.30.63.0/24 134.195.26.0/24 134.195.27.0/24 -``` \ No newline at end of file +``` diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx index c944232c0a4b0ef..3341727395d81d8 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx @@ -9,7 +9,7 @@ import { Render } from "~/components"; ## Prerequisites -To use Email Security, you will need to have: +To use Email security, you will need to have: **Set up**. +4. After you have associated an integration, go to **Email security** > **Set up**. 5. Follow the instructions to [connect a domain](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/#connect-a-domain). ## Connect a domain @@ -52,20 +52,20 @@ To associate an integration: If you have verified zones on Cloudflare, continue with the following steps: 1. **Connect a domain**: Select your domain. Then, select **Continue**. -2. **Select position**: This step allows you to choose where Email Security fits into your mail flow and configure position settings: +2. **Select position**: This step allows you to choose where Email security fits into your mail flow and configure position settings: - **Select position**: Choose between: - - **Sit first (hop count = 1)**: Email Security is the first server that receives the email. There are no other email scanners or services between the Internet and Cloudflare. - - **Sit in the middle (hop count > 1)**: Email Security sits anywhere other than the first position. Other servers receive emails _before_ Email Security. There are other email scanners or email services in between. - - **Position settings**: Refine how Email Security receives and forwards emails: - - **Forwarding address**: This is your mail flow next hop after Email Security. This value is auto-filled, but you can still change it. + - **Sit first (hop count = 1)**: Email security is the first server that receives the email. There are no other email scanners or services between the Internet and Cloudflare. + - **Sit in the middle (hop count > 1)**: Email security sits anywhere other than the first position. Other servers receive emails _before_ Email security. There are other email scanners or email services in between. + - **Position settings**: Refine how Email security receives and forwards emails: + - **Forwarding address**: This is your mail flow next hop after Email security. This value is auto-filled, but you can still change it. - **Outbound TLS**: Choose between: 1. **Forward all messages over TLS** (recommended). 2. **Forward all messages using opportunistic TLS**. - Select **Continue**. 3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types of incoming messages from reaching a recipient's inbox. 4. (Optional) **Update MX records**: - - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under **Your mail processing location**, select your mail processing location. - - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. When Email Security updates MX records, we replace your original MX records with Email Security MX records. + - Email security can automatically update MX records for domains that proxy traffic through Cloudflare. Under **Your mail processing location**, select your mail processing location. + - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. When Email security updates MX records, we replace your original MX records with Email security MX records. - Select **Continue**. 5. **Review details**: Review your domain, then select **Go to domains**. @@ -81,7 +81,7 @@ If you do not have domains with Cloudflare, the dashboard will display two optio 1. **Add domains**: Manually enter domain names. 2. **Review all domains**: Review all your domains, then select **Continue**. 3. **Verify your domains**: It may take up to 24 hours for your domains to be verified. Select **Done**. -4. Once your domains have been verified, the dashboard will display a message like this: **You have verified domains ready to connect to Email Security**. This means that you can now set up Email Security via MX/Inline. +4. Once your domains have been verified, the dashboard will display a message like this: **You have verified domains ready to connect to Email security**. This means that you can now set up Email security via MX/Inline. 5. Select **Set up**, then select **MX/Inline**. 6. Follow the steps to [initiate MX/Inline configuration](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/#initiate-mxinline-configuration). @@ -91,4 +91,7 @@ Selecting **Add a domain to Cloudflare** will redirect you to a new page where y Then, follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/). - \ No newline at end of file + diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx index e1febd1a3b0eb59..9dfdae45cd462ee 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx @@ -5,26 +5,26 @@ sidebar: order: 2 --- -With pre-delivery deployment, also known as Inline deployment, Email Security evaluates email messages before they reach a user's inbox. +With pre-delivery deployment, also known as Inline deployment, Email security evaluates email messages before they reach a user's inbox. ![Inline deployment diagram](~/assets/images/email-security/deployment/inline-setup/CF_A1S_Deployment_Inline_Diagrams.png) -Before you change your MX records, you will have to set up the [Time to Live (TTL)](/dns/manage-dns-records/reference/ttl/) on your DNS records. If you do not set up the TTL, the DNS propagation will take longer to happen. +Before you change your MX records, you will have to set up the [Time to Live (TTL)](/dns/manage-dns-records/reference/ttl/) on your DNS records. If you do not set up the TTL, the DNS propagation will take longer to happen. Cloudflare recommends to decrease the TTL to five minutes (also known as [Auto](/dns/manage-dns-records/reference/ttl/#proxied-records)) 3 to 5 days prior to the planned MX record change. Reducing the TTL allows the DNS record to propagate ahead of time, so changes take effect rapidly. Once you have completed your onboarding process, you can choose to increase the TTL. -When you have configured your TTL, you can deploy Email Security via MX/Inline. An MX record is a [DNS record](/dns/manage-dns-records/). +When you have configured your TTL, you can deploy Email security via MX/Inline. An MX record is a [DNS record](/dns/manage-dns-records/). If your DNS records are hosted by Cloudflare (or any other provider, except for Google), you can [edit your DNS records](/dns/manage-dns-records/how-to/create-dns-records/#edit-dns-records) via the dashboard or the API to point your MX records to Cloudflare. -By changing your MX records, Email Security will be positioned between your incoming emails and Microsoft 0365 or Gmail. +By changing your MX records, Email security will be positioned between your incoming emails and Microsoft 0365 or Gmail. -Email Security becomes a hop in the [SMTP](https://www.cloudflare.com/en-gb/learning/email-security/what-is-smtp/) processing chain and physically interacts with incoming email messages. Based on your policies, various messages are blocked before reaching the inbox. +Email security becomes a hop in the [SMTP](https://www.cloudflare.com/en-gb/learning/email-security/what-is-smtp/) processing chain and physically interacts with incoming email messages. Based on your policies, various messages are blocked before reaching the inbox. When you choose an inline deployment, you get the following benefits: - Messages are processed and physically blocked before arriving in a user's mailbox. - Your deployment is simpler, because any complex processing can happen downstream and without modification. -- Email Security can modify delivered messages, adding subject or body mark-ups. -- Email Security can offer high availability and adaptive message pooling. -- You can set up advanced handling downstream for non-quarantined messages with added X-headers. \ No newline at end of file +- Email security can modify delivered messages, adding subject or body mark-ups. +- Email security can offer high availability and adaptive message pooling. +- You can set up advanced handling downstream for non-quarantined messages with added X-headers. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx index ab00b2649222403..4284558384b237b 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -1,5 +1,5 @@ --- -title: Cisco - Email Security as MX Record +title: Cisco - Email security as MX Record pcx_content_type: integration-guide sidebar: order: 5 @@ -7,16 +7,16 @@ sidebar: import { Render } from "~/components"; -![A schematic showing where Email Security sits in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/Cisco_to_Email_Security_MX_Inline.png) +![A schematic showing where Email security sits in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/Cisco_to_Email_Security_MX_Inline.png) -In this tutorial, you will learn how to configure Cisco IronPort with Email Security as MX record. +In this tutorial, you will learn how to configure Cisco IronPort with Email security as MX record. -## 1. Add a Sender Group for Email Security Email Protection IPs +## 1. Add a Sender Group for Email security Email Protection IPs To add a new Sender Group: @@ -25,9 +25,9 @@ To add a new Sender Group: 2. Select **Add Sender Group**. 3. Configure the new Sender Group as follows: - - **Name**: `Email Security`. + - **Name**: `Email security`. - **Order**: Order above the existing **WHITELIST** sender group. - - **Comment**: `Email Security Email Protection egress IP Addresses`. + - **Comment**: `Email security Email Protection egress IP Addresses`. - **Policy**: `TRUSTED` (by default, spam detection is disabled for this mail flow policy). - **SBRS**: Leave blank. - **DNS Lists**: Leave blank. @@ -37,7 +37,7 @@ To add a new Sender Group: ## 2. Configure Incoming Relays -You need to configure the Incoming Relays section to tell IronPort to ignore upstream hops, since all the connections are now coming from Email Security. This step is needed so the IronPort can retrieve the original IPs to calculate IP reputation. IronPort also uses this information in the Anti-Spam (IPAS) scoring of messages. +You need to configure the Incoming Relays section to tell IronPort to ignore upstream hops, since all the connections are now coming from Email security. This step is needed so the IronPort can retrieve the original IPs to calculate IP reputation. IronPort also uses this information in the Anti-Spam (IPAS) scoring of messages. 1. To enable the Incoming Relays Feature, select **Network** > **Incoming Relays**. 2. Select **Enable** and commit your changes. @@ -49,7 +49,7 @@ You need to configure the Incoming Relays section to tell IronPort to ignore ups ## 3. Disable SPF checks -Make sure you disable Sender Policy Framework (SPF) checks in IronPort. Because Email Security is acting as the MX record, if you do not disable SPF checks, IronPort will block emails due to an SPF failure. +Make sure you disable Sender Policy Framework (SPF) checks in IronPort. Because Email security is acting as the MX record, if you do not disable SPF checks, IronPort will block emails due to an SPF failure. Refer to [Cisco's documentation](https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/117973-faq-esa-00.html) for more information on how to disable SPF checks. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index 80eb92553dc09a1..793b1f62d0aa361 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -7,11 +7,11 @@ sidebar: import { GlossaryTooltip, Render } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Cisco_to_Cisco_MX_Inline.png) +![A schematic showing where Email security is in the life cycle of an email received](src/assets/email-security/Cisco_to_Cisco_MX_Inline.png) -In this tutorial, you will learn how to configure Email Security with Cisco as MX record. +In this tutorial, you will learn how to configure Email security with Cisco as MX record. -## 1. Add a Sender Group for Email Security Email Protection IPs +## 1. Add a Sender Group for Email security Email Protection IPs To add a new Sender Group: @@ -20,9 +20,9 @@ To add a new Sender Group: 2. Select the **Add Sender Group** button. 3. Configure the new Sender Group as follows: - - **Name**: `Email Security`. + - **Name**: `Email security`. - **Order**: Order above the existing **WHITELIST** sender group. - - **Comment**: `Email Security Email Protection egress IP Addresses`. + - **Comment**: `Email security Email Protection egress IP Addresses`. - **Policy**: `TRUSTED` (by default, spam detection is disabled for this mail flow policy). - **SBRS**: Leave blank. - **DNS Lists**: Leave blank. @@ -30,7 +30,7 @@ To add a new Sender Group: 4. Select **Submit and Add Senders**, and add the IP addresses mentioned in Egress IPs. If you need to process emails in the EU or India regions for compliance purposes, add those IP addresses as well. -## 2. Add SMTP route for the Email Security Email Protection Hosts +## 2. Add SMTP route for the Email security Email Protection Hosts To add a new SMTP Route: @@ -40,16 +40,16 @@ To add a new SMTP Route: 3. Configure the new SMTP Route as follows: - **Receiving Domain**: `a1s.mailstream` - - In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on which MX hosts to use. + - In **Destination Hosts**, select **Add Row**, and add the Email security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on which MX hosts to use. ## 3. Create Incoming Content Filters -To manage the mail flow between Email Security and Cisco ESA, you need two filters: +To manage the mail flow between Email security and Cisco ESA, you need two filters: -- One to direct all incoming messages to Email Security. -- One to recognize messages coming back from Email Security to route for normal delivery. +- One to direct all incoming messages to Email security. +- One to recognize messages coming back from Email security to route for normal delivery. -### Incoming Content Filter - To Email Security +### Incoming Content Filter - To Email security To create a new Content Filter: @@ -59,14 +59,14 @@ To create a new Content Filter: 3. Configure the new Incoming Content Filter as follows: - **Name**: `ESA_to_A1S` - - **Description**: `Redirect messages to Email Security for anti-phishing inspection` + - **Description**: `Redirect messages to Email security for anti-phishing inspection` - **Order**: This will depend on your other filters. - **Condition**: No conditions. - **Actions**: - For **Action** select **Send to Alternate Destination Host**. - For **Mail Host** input `a1s.mailstream` (the SMTP route configured in step 2). -### Incoming Content Filter - From Email Security +### Incoming Content Filter - From Email security To create a new Content Filter: @@ -76,7 +76,7 @@ To create a new Content Filter: 3. Configure the new Incoming Content Filter as follows: - **Name**: `A1S_to_ESA` - - **Description**: `Email Security inspected messages for final delivery` + - **Description**: `Email security inspected messages for final delivery` - **Order**: This filter must come before the previously created filter. - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in Egress IPs. For example: @@ -101,7 +101,10 @@ Assign the Incoming Content Filters created in [step 3](#3-create-incoming-conte ## 5. Geographic locations - + ## 6. Set up MX/Inline diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index 7380a02e5c37552..57d32e2b27e4bc3 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -7,9 +7,9 @@ sidebar: import { Render, GlossaryTooltip } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_Gmail_MX_Inline.png) +![A schematic showing where Email security is in the life cycle of an email received](src/assets/email-security/Email_Security_Gmail_MX_Inline.png) -In this tutorial, you will learn how to configure Google Workspace with Email Security as MX record. +In this tutorial, you will learn how to configure Google Workspace with Email security as MX record. **Apps** > **Google Workspace** > **Gmail**). -- Access to the domain nameserver hosting the MX records for the domains that will be processed by Email Security. +- Access to the domain nameserver hosting the MX records for the domains that will be processed by Email security. ## 1. Set up Inbound Email Configuration @@ -36,8 +36,8 @@ Set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?h [Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#add-new-quarantine) with the following details: -- **Name**: Email Security Malicious. -- **Description**: Email Security Malicious. +- **Name**: Email security Malicious. +- **Description**: Email security Malicious. - For the **Inbound denial consequence**, select **Drop message**. - For the **Outbound denial consequence**, select **Drop message**. - Select **SAVE**. @@ -48,7 +48,7 @@ To access the newly created quarantine, select **GO TO ADMIN QUARANTINE** or acc Go to **Compliance**, and create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine. Enter the following details: -- **Content compliance**: Add `Quarantine Email Security Malicious`. +- **Content compliance**: Add `Quarantine Email security Malicious`. - **Email messages to affect**: Select **Inbound**. - **Add expressions that describe the content you want to search for in each message**: - Select **Add** to add the condition. @@ -57,7 +57,7 @@ Go to **Compliance**, and create a [content compliance filter](https://support.g - In **Match type**, select **Contains text**. - In **Content**, enter `X-CFEmailSecurity-Disposition: MALICIOUS`. - Select **SAVE** to save the condition. -- If the above expression match, do the following, select **Quarantine message** and the **Email Security Malicious** quarantine that was created in the previous step. +- If the above expression match, do the following, select **Quarantine message** and the **Email security Malicious** quarantine that was created in the previous step. - Select **SAVE**. If you would like to quarantine the other dispositions, repeat the above steps and use the following strings for the other dispositions: @@ -77,13 +77,13 @@ If desired, you can create a separate quarantine for each of the dispositions. ## 5. (Recommended) Secure Google Workspace from MX records bypass -One method of a DNS attack is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Google Workspace only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended. +One method of a DNS attack is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Google Workspace only when they originate from Email security. This can be done by adding a connector to only allow email from Email security with TLS encryption. This step is optional but recommended. :::caution[Important] -This step should not be performed until 72 hours after all domains in your Google Workspace have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. +This step should not be performed until 72 hours after all domains in your Google Workspace have been onboarded to Email security, and Email security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. ::: -After 72 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google Workspace only accepts messages that are first received by Email Security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email Security by injecting messages directly into Google Workspace. +After 72 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google Workspace only accepts messages that are first received by Email security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email security by injecting messages directly into Google Workspace. 1. Access the [Google Administrative Console](https://admin.google.com/), then select **Apps** > **Google Workspace** > **Gmail**. @@ -93,4 +93,4 @@ After 72 hours, the MX record DNS update will have sufficiently propagated acros 4. Enable **Reject all mail not from gateway IPs** and select **Save**. -5. Select **Save** once more to commit and activate the configuration change in the Gmail advanced configuration console. \ No newline at end of file +5. Select **Save** once more to commit and activate the configuration change in the Gmail advanced configuration console. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx index 698298bc18b828c..3f60364f3b25b59 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/index.mdx @@ -7,16 +7,16 @@ sidebar: import { Render, Markdown, GlossaryTooltip } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_O365_MXInline.png) +![A schematic showing where Email security is in the life cycle of an email received](src/assets/email-security/Email_Security_O365_MXInline.png) -In this tutorial, you will learn how to configure Microsoft 365 with Email Security as its MX record. +In this tutorial, you will learn how to configure Microsoft 365 with Email security as its MX record. -## 1. Add Email Security IP addresses to Allow List +## 1. Add Email security IP addresses to Allow List 1. Go to the [Anti-spam policies page](https://security.microsoft.com/antispam) > Select **Edit connection filter policy**. 2. In **Always allow messages from the following IP addresses or address range**, add IP addresses and CIDR blocks mentioned in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. @@ -34,7 +34,7 @@ In this tutorial, you will learn how to configure Microsoft 365 with Email Secur 1. [Set up a connector](https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail#1-set-up-a-connector-from-your-email-server-to-microsoft-365-or-office-365). 2. Select **Partner organization** under **Connection from**. - Provide a name for the connector: - - **Name**: `Email Security Inbound Connector` + - **Name**: `Email security Inbound Connector` - **Description**: `Inbound connector for Enhanced Filtering` 3. In **Authenticating sent email**, select **By verifying that the IP address of the sending server matches one of the following IP addresses, which belongs to your partner organization.** 4. Enter all of the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. @@ -67,14 +67,14 @@ To configure anti-spam policies: - **Select quarantine policy**: _AdminOnlyAccessPolicy_. - **High confidence phishing**: _Quarantine message_. - **Select quarantine policy**: _AdminOnlyAccessPolicy_. -- **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. +- **Retain spam in quarantine for this many days**: Default is 15 days. Email security recommends 15-30 days. - Select the spam actions in the above step: 8. Select **Save**. ## 4. Create transport rules -To create the transport rules that will send emails with certain [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions) to Email Security: +To create the transport rules that will send emails with certain [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions) to Email security: 1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage). 2. Go to **Mail flow** > **Rules**. @@ -91,10 +91,10 @@ To create the transport rules that will send emails with certain [dispositions]( 5. Select **Next**. 6. You can use the default values on this screen. Select **Next**. 7. Review your settings and select **Finish** > **Done**. -8. Select the rule **Email Security Deliver to Junk Email folder** you have just created, and **Enable**. +8. Select the rule **Email security Deliver to Junk Email folder** you have just created, and **Enable**. 9. Select **Add a Rule** > **Create a new rule**. 10. Set the following rule conditions: - - **Name**: `Email Security Deliver to Junk Email folder`. + - **Name**: `Email security Deliver to Junk Email folder`. - **Apply this rule if**: _The message headers_ > _includes any of these words_. - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. - **Enter words**: `MALICIOUS`, `UCE`, `SPOOF` > **Add** > **Save**. @@ -116,10 +116,10 @@ To create the transport rules that will send emails with certain [dispositions]( ## 6. (Recommended) Secure Microsoft 365 from MX records bypass -One method of a DNS attack is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Microsoft 365 only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended. +One method of a DNS attack is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you should enforce an email flow where inbound messages are accepted by Microsoft 365 only when they originate from Email security. This can be done by adding a connector to only allow email from Email security with TLS encryption. This step is optional but recommended. :::caution[Important] -This step should not be performed until 72 hours after all domains in your Microsoft 365 organization have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. +This step should not be performed until 72 hours after all domains in your Microsoft 365 organization have been onboarded to Email security, and Email security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. ::: #### Create Connector @@ -136,7 +136,7 @@ This step should not be performed until 72 hours after all domains in your Micro 6. Set the following options: - **Name** - `Secure M365 Inbound` - - **Description** - `Only accept inbound email from Email Security` + - **Description** - `Only accept inbound email from Email security` 7. Select **Next**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/five-junk-admin-quarantine.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/five-junk-admin-quarantine.mdx index 973441862a97121..269ac72ec4633e5 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/five-junk-admin-quarantine.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/five-junk-admin-quarantine.mdx @@ -31,12 +31,12 @@ In this tutorial, you will learn to deliver `BULK` messages to the user's junk e file="email-security/deployment/m365-use-case-transport-rules" product="cloudflare-one" params={{ - one: "Email Security Deliver to Junk Email folder`", + one: "Email security Deliver to Junk Email folder`", two: "BULK", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", four: "step4-rules.png", - five: "`Email Security Admin Managed Host Quarantine`", + five: "`Email security Admin Managed Host Quarantine`", six: " `MALICIOUS`, `UCE`, `SPOOF`", seven: "_Redirect the message to_ > _hosted quarantine_", eight: "step10-hosted-quarantine-case5.png", diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/four-user-quarantine-admin-quarantine.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/four-user-quarantine-admin-quarantine.mdx index e3a4e7a8163ac44..b56d4ca49e87563 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/four-user-quarantine-admin-quarantine.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/four-user-quarantine-admin-quarantine.mdx @@ -51,7 +51,7 @@ To configure anti-spam policies: - **Select quarantine policy**: _UserNotifyAdminRelease_. - **High confidence phishing**: _Quarantine message_. - **Select quarantine policy**: _UserNotifyAdminRelease_. - - **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. + - **Retain spam in quarantine for this many days**: Default is 15 days. Email security recommends 15-30 days. 8. Select **Save**. @@ -61,12 +61,12 @@ To configure anti-spam policies: file="email-security/deployment/m365-use-case-transport-rules" product="cloudflare-one" params={{ - one: "`Email Security User Quarantine Message`", + one: "`Email security User Quarantine Message`", two: "`UCE`, `SPOOF`", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", four: "step4-rules-case4.png", - five: "`Email Security User Quarantine Message Admin Release`", + five: "`Email security User Quarantine Message Admin Release`", six: "`MALICIOUS`", seven: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _9_", diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/one-junk-admin-quarantine.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/one-junk-admin-quarantine.mdx index 8cd0b100ce8553b..dcc21d418c5af4b 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/one-junk-admin-quarantine.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/one-junk-admin-quarantine.mdx @@ -1,17 +1,17 @@ --- -title: 1 - Junk email and Email Security Admin Quarantine +title: 1 - Junk email and Email security Admin Quarantine pcx_content_type: integration-guide sidebar: order: 1 head: - tag: title - content: Junk email and Email Security Admin Quarantine - + content: Junk email and Email security Admin Quarantine - Microsoft 365 --- import { Render } from "~/components"; -In this tutorial, you will learn how to deliver emails to the Microsoft 365 junk email folder and the Admin Quarantine in Email Security. +In this tutorial, you will learn how to deliver emails to the Microsoft 365 junk email folder and the Admin Quarantine in Email security. ## Create quarantine policies @@ -41,7 +41,7 @@ In this tutorial, you will learn how to deliver emails to the Microsoft 365 junk ## Create transport rules -To create the transport rules that will send emails with certain dispositions to Email Security: +To create the transport rules that will send emails with certain dispositions to Email security: 1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage). @@ -50,7 +50,7 @@ To create the transport rules that will send emails with certain dispositions to 3. Select **Add a Rule** > **Create a new rule**. 4. Set the following rule conditions: - - **Name**: `Email Security Deliver to Junk Email folder`. + - **Name**: `Email security Deliver to Junk Email folder`. - **Apply this rule if**: _The message headers_ > _includes any of these words_. - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. - **Enter words**: `BULK` > **Add** > **Save**. @@ -64,4 +64,4 @@ To create the transport rules that will send emails with certain dispositions to 7. Review your settings and select **Finish** > **Done**. -8. Select the rule `Email Security Deliver to Junk Email folder` you have just created, and select **Enable**. +8. Select the rule `Email security Deliver to Junk Email folder` you have just created, and select **Enable**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/three-junk-admin-quarantine.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/three-junk-admin-quarantine.mdx index 2e5b36c52d3772a..832a6ab195c64ca 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/three-junk-admin-quarantine.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/three-junk-admin-quarantine.mdx @@ -44,12 +44,12 @@ In this tutorial, you will learn how to deliver `BULK` messages to the users's j file="email-security/deployment/m365-use-case-transport-rules" product="cloudflare-one" params={{ - one: "`Email Security Deliver to Junk Email folder`", + one: "`Email security Deliver to Junk Email folder`", two: "BULK", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", four: "step4-rules.png", - five: "`Email Security User Quarantine Message`", + five: "`Email security User Quarantine Message`", six: "`MALICIOUS`, `UCE`, `SPOOF`", seven: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _9_", diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/two-junk-user-quarantine.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/two-junk-user-quarantine.mdx index 7809bca1108ba6a..bea2121fa667ac8 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/two-junk-user-quarantine.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/m365-email-security-mx/use-cases/two-junk-user-quarantine.mdx @@ -44,12 +44,12 @@ In this tutorial, you will learn how to deliver `BULK` messages to the user's ju file="email-security/deployment/m365-use-case-transport-rules" product="cloudflare-one" params={{ - one: "`Email Security Deliver to Junk Email folder`", + one: "`Email security Deliver to Junk Email folder`", two: "BULK", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", four: "step4-rules.png", - five: "`Email Security User Quarantine Message`", + five: "`Email security User Quarantine Message`", six: "`UCE`, `SPOOF`", seven: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _9_", diff --git a/src/content/docs/cloudflare-one/implementation-guides/index.mdx b/src/content/docs/cloudflare-one/implementation-guides/index.mdx index ce9748eb08392f9..d7d5d26d158577f 100644 --- a/src/content/docs/cloudflare-one/implementation-guides/index.mdx +++ b/src/content/docs/cloudflare-one/implementation-guides/index.mdx @@ -39,11 +39,11 @@ Implementation guides cover deployment steps and best practices for specific Clo - Use Cloudflare's Email Security to protect your Microsoft 365 email inbox from + Use Cloudflare's Email security to protect your Microsoft 365 email inbox from phishing and malware attacks. diff --git a/src/content/docs/cloudflare-one/implementation-guides/secure-o365-email.mdx b/src/content/docs/cloudflare-one/implementation-guides/secure-o365-email.mdx index d873e2f2a0eb366..9cdaf0fef4d2fb8 100644 --- a/src/content/docs/cloudflare-one/implementation-guides/secure-o365-email.mdx +++ b/src/content/docs/cloudflare-one/implementation-guides/secure-o365-email.mdx @@ -1,7 +1,7 @@ --- pcx_content_type: navigation -title: Secure Microsoft 365 email with Email Security +title: Secure Microsoft 365 email with Email security external_link: /learning-paths/secure-o365-email/concepts/ sidebar: order: 4 ---- \ No newline at end of file +--- diff --git a/src/content/docs/cloudflare-one/index.mdx b/src/content/docs/cloudflare-one/index.mdx index faae1903f25ccbf..18979a123c59945 100644 --- a/src/content/docs/cloudflare-one/index.mdx +++ b/src/content/docs/cloudflare-one/index.mdx @@ -33,7 +33,7 @@ Secure your organization with Cloudflare Zero Trust — a cloud security model t Cloudflare Zero Trust is part of Cloudflare One, our name for the Secure Access Service Edge (SASE) platform that protects enterprise applications, users, devices, and networks. -By progressively adopting Cloudflare One, organizations can move away from a patchwork of hardware appliances and point solutions, and instead consolidate security and networking through a unified control plane that includes products like [Cloudflare Access](/cloudflare-one/access-controls/policies/), [Secure Web Gateway (SWG)](/cloudflare-one/traffic-policies/), [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/), [Data Loss Prevention (DLP)](/cloudflare-one/data-loss-prevention/), [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/), [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/), and [Email Security](/cloudflare-one/email-security/). +By progressively adopting Cloudflare One, organizations can move away from a patchwork of hardware appliances and point solutions, and instead consolidate security and networking through a unified control plane that includes products like [Cloudflare Access](/cloudflare-one/access-controls/policies/), [Secure Web Gateway (SWG)](/cloudflare-one/traffic-policies/), [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/), [Data Loss Prevention (DLP)](/cloudflare-one/data-loss-prevention/), [Remote Browser Isolation (RBI)](/cloudflare-one/remote-browser-isolation/), [Cloud Access Security Broker (CASB)](/cloudflare-one/integrations/cloud-and-saas/), and [Email security](/cloudflare-one/email-security/). Refer to our [SASE reference architecture](/reference-architecture/architectures/sase/) to learn how to plan, deploy, and manage SASE architecture with Cloudflare. @@ -97,7 +97,7 @@ Scan your web traffic and SaaS applications for the presence of sensitive data s - + Configure policies to manage your inbox, automatically move emails based on disposition, and use screen criteria to investigate messages. diff --git a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx index e8a18bdf972994b..3c10bcbb29e84f0 100644 --- a/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx +++ b/src/content/docs/cloudflare-one/insights/logs/enable-logs.mdx @@ -1,17 +1,17 @@ --- -title: Enable Email Security logs +title: Enable Email security logs pcx_content_type: how-to sidebar: order: 9 --- -import { DashButton} from "~/components" +import { DashButton } from "~/components"; -Email Security allows you to configure Logpush to send detection data to an endpoint of your choice. +Email security allows you to configure Logpush to send detection data to an endpoint of your choice. ## Enable detection logs -Detection logs generate logs made by Email Security and some of the metadata associated with the detection. +Detection logs generate logs made by Email security and some of the metadata associated with the detection. To enable detection logs, refer to [Enable destinations](/logs/logpush/logpush-job/enable-destinations/). @@ -21,21 +21,24 @@ If you enable detection logs using [R2](/r2/), choose **Email security alerts** User action logs allow you to view logs regarding all actions taken via the [API](/api/resources/email_security/) or the dashboard. -Before you can enable audit logs for Email Security, you will have to enable logpush jobs to your storage destination. Refer to [Enable destinations](/logs/logpush/logpush-job/enable-destinations/) to enable logs on destinations such as Cloudflare R2, HTTP, Amazon S3, and more. +Before you can enable audit logs for Email security, you will have to enable logpush jobs to your storage destination. Refer to [Enable destinations](/logs/logpush/logpush-job/enable-destinations/) to enable logs on destinations such as Cloudflare R2, HTTP, Amazon S3, and more. Once you have configured your destination, you can set up audit logs for user action: 1. In the Cloudflare dashboard, go to the **Logpush** page. - - + + + 2. Select your storage destination. 3. Select the three dots > **Edit**. 4. Under **Configure logpush job**: - - **Job name**: Enter the job name, if it is not already prepopulated. - - **If logs match** > Select **Filtered logs**: - - **Field**: Choose `ResourceType`. - - **Operator**: Choose `starts with`. - - **Value**: Enter `email_security`. + +- **Job name**: Enter the job name, if it is not already prepopulated. +- **If logs match** > Select **Filtered logs**: + - **Field**: Choose `ResourceType`. + - **Operator**: Choose `starts with`. + - **Value**: Enter `email_security`. + 5. Select **Submit**. -You can now view logs via the Cloudflare dashboard. \ No newline at end of file +You can now view logs via the Cloudflare dashboard. diff --git a/src/content/docs/cloudflare-one/roles-permissions.mdx b/src/content/docs/cloudflare-one/roles-permissions.mdx index 08dd536e6e6246f..5f320f7650862cd 100644 --- a/src/content/docs/cloudflare-one/roles-permissions.mdx +++ b/src/content/docs/cloudflare-one/roles-permissions.mdx @@ -26,7 +26,7 @@ Only Super Administrators will be able to assign or remove the following roles f | Cloudflare Zero Trust DNS Locations Write[^2] | ❌ | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ | ❌ | ❌ | ❌ | ❌ | | Cloudflare DEX | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ❌ | ✅ | ✅ | -[^1]: The **Cloudflare Zero Trust** role grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email Security. +[^1]: The **Cloudflare Zero Trust** role grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email security. [^2]: Users with the **Cloudflare Zero Trust DNS Locations Write** role can view all DNS locations for an organization but can only create and edit [secure DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/#secure-dns-locations). @@ -40,16 +40,16 @@ The Cloudflare Zero Trust PII role should be considered an add-on role, to be co The Cloudflare Zero Trust PII role does not apply to Access audit logs. PII is always visible in Access logs. ::: -## Email Security roles +## Email security roles -For more information on Email Security roles, refer to [Account-scoped roles](/fundamentals/manage-members/roles/#account-scoped-roles). +For more information on Email security roles, refer to [Account-scoped roles](/fundamentals/manage-members/roles/#account-scoped-roles). -- **Cloudflare Zero Trust**: Can edit Cloudflare [Zero Trust](/cloudflare-one/). Grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email Security. -- **Cloudflare Zero Trust PII**: Can read PII in Zero Trust. This includes Email Security. -- **Email Security Analyst** and **Email Security Configuration Admin**: Has full access to all admin features in Email Security. -- **Email Security Integration Admin**: Can read and set up integrations only. -- **Email Security Configuration Admin**: Has administrator access. Cannot take actions on emails, or read emails. -- **Email Security Analyst**: Has analyst access. Can take action on emails and read emails. -- **Email Security Reporting**: Can read metrics. -- **Email Security Read Only**: Can read all information, but cannot take action on anything. -- **Email Security Policy Admin**: Can read all settings, but only write [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/). +- **Cloudflare Zero Trust**: Can edit Cloudflare [Zero Trust](/cloudflare-one/). Grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email security. +- **Cloudflare Zero Trust PII**: Can read PII in Zero Trust. This includes Email security. +- **Email security Analyst** and **Email security Configuration Admin**: Has full access to all admin features in Email security. +- **Email security Integration Admin**: Can read and set up integrations only. +- **Email security Configuration Admin**: Has administrator access. Cannot take actions on emails, or read emails. +- **Email security Analyst**: Has analyst access. Can take action on emails and read emails. +- **Email security Reporting**: Can read metrics. +- **Email security Read Only**: Can read all information, but cannot take action on anything. +- **Email security Policy Admin**: Can read all settings, but only write [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/). diff --git a/src/content/docs/data-localization/metadata-boundary/logpush-datasets.mdx b/src/content/docs/data-localization/metadata-boundary/logpush-datasets.mdx index daab65860d0f9d9..b95bf0262471035 100644 --- a/src/content/docs/data-localization/metadata-boundary/logpush-datasets.mdx +++ b/src/content/docs/data-localization/metadata-boundary/logpush-datasets.mdx @@ -26,7 +26,7 @@ Be aware that if you enable CMB for a dataset that does not support your region, | Sinkhole Events | Account | ✅ | ✅ | ✅ | | AI Gateway Events | Account | ✅ | ✅ | ✅ | | DLP Forensic Copies | Account | N/A[^1] | ✘ | ✘ | -| Email Security Alerts | Account | ✅ | ✅ | ✅ | +| Email security Alerts | Account | ✅ | ✅ | ✅ | | Zaraz Events | Zone | ✅ | ✅ | ✅ | | Browser Isolation User Actions | Account | ✅ | ✅ | ✅ | | NEL reports | Zone | ✘ | ✅ | ✘ | @@ -34,7 +34,7 @@ Be aware that if you enable CMB for a dataset that does not support your region, | Network Analytics Logs | Account | ✅ | ✅ | ✅ | | Device Posture Results | Account | ✘ | ✅ | ✘ | | Audit Logs | Account | ✘ | ✅ | ✘ | -| Access Requests | Account | ✅ | ✅ | ✅ | -| IPSec Logs | Account | ✅ | ✅ | ✅ +| Access Requests | Account | ✅ | ✅ | ✅ | +| IPSec Logs | Account | ✅ | ✅ | ✅ | [^1]: Customer Metadata Boundary does not apply in this case, as these logs are sent directly from the processing location to your configured destination. diff --git a/src/content/docs/dmarc-management/index.mdx b/src/content/docs/dmarc-management/index.mdx index 03c912c4af54bcd..12cb040a5988270 100644 --- a/src/content/docs/dmarc-management/index.mdx +++ b/src/content/docs/dmarc-management/index.mdx @@ -11,11 +11,12 @@ head: description: Stop brand impersonation. --- -import { Description, Plan, RelatedProduct } from "~/components" +import { Description, Plan, RelatedProduct } from "~/components"; Stop brand impersonation. + @@ -30,10 +31,14 @@ DMARC Management is available to all Cloudflare customers with [Cloudflare DNS]( ## Related products - -Protect your email inbox with Email Security. + + Protect your email inbox with Email security. -Fast, resilient and easy-to-manage DNS service. + Fast, resilient and easy-to-manage DNS service. diff --git a/src/content/docs/dns/manage-dns-records/reference/dns-record-types.mdx b/src/content/docs/dns/manage-dns-records/reference/dns-record-types.mdx index 7ac61e1a978861c..245ac2513dc17d0 100644 --- a/src/content/docs/dns/manage-dns-records/reference/dns-record-types.mdx +++ b/src/content/docs/dns/manage-dns-records/reference/dns-record-types.mdx @@ -250,7 +250,7 @@ As the content of TXT records consist of one or more text strings delimited by d At Cloudflare, TXT records are most commonly used to demonstrate domain ownership prior to issuing SSL/TLS certificates for [your domain](/ssl/edge-certificates/changing-dcv-method/) or a [Cloudflare for SaaS domain](/cloudflare-for-platforms/cloudflare-for-saas/security/certificate-management/issue-and-validate/). -You could also use TXT to create email authentication records, but we recommend that you use our [Email Security Wizard](/dns/manage-dns-records/how-to/email-records/#prevent-domain-spoofing) instead. +You could also use TXT to create email authentication records, but we recommend that you use our [Email security Wizard](/dns/manage-dns-records/how-to/email-records/#prevent-domain-spoofing) instead. diff --git a/src/content/docs/email-routing/index.mdx b/src/content/docs/email-routing/index.mdx index cdf44322cee5952..61c2a655bf0dffe 100644 --- a/src/content/docs/email-routing/index.mdx +++ b/src/content/docs/email-routing/index.mdx @@ -58,11 +58,11 @@ It is available to all Cloudflare customers [using Cloudflare as an authoritativ ## Related products - Cloudflare Email Security is a cloud based service that stops phishing + Cloudflare Email security is a cloud based service that stops phishing attacks, the biggest cybersecurity threat, across all traffic vectors - email, web and network. diff --git a/src/content/docs/email-security/account-setup/escalation-contacts.mdx b/src/content/docs/email-security/account-setup/escalation-contacts.mdx index 9f7ffb5a66bd5df..6eae3fabf1a2202 100644 --- a/src/content/docs/email-security/account-setup/escalation-contacts.mdx +++ b/src/content/docs/email-security/account-setup/escalation-contacts.mdx @@ -1,7 +1,7 @@ --- title: Escalation contacts pcx_content_type: how-to -description: Configure escalation contacts in Cloudflare Email Security to prioritize alerts for phishing threats and email irregularities. Set up SOC, Triage, Analyst, and Executive contacts. +description: Configure escalation contacts in Cloudflare Email security to prioritize alerts for phishing threats and email irregularities. Set up SOC, Triage, Analyst, and Executive contacts. sidebar: order: 2 --- @@ -12,7 +12,7 @@ import { GlossaryTooltip, Render } from "~/components"; -Whenever Email Security (formerly Area 1) finds an exceptional phishing threat or Email Service irregularity behavior (compromised email servers at a partner or vendor, wire fraud tactics, and more), we try to reach out to our customers. +Whenever Email security (formerly Area 1) finds an exceptional phishing threat or Email Service irregularity behavior (compromised email servers at a partner or vendor, wire fraud tactics, and more), we try to reach out to our customers. There are four types of contacts available to configure, each with a priority type: @@ -21,11 +21,11 @@ There are four types of contacts available to configure, each with a priority ty - **In-Depth Analyst**: P3 priority. - **Executive Contact**: P4 priority. -Email Security will start by reaching out to P1-level contacts. If they do not respond, we will then try reaching out to the other contacts down the list until we receive a reply from one of these groups. +Email security will start by reaching out to P1-level contacts. If they do not respond, we will then try reaching out to the other contacts down the list until we receive a reply from one of these groups. You can enable these special notifications through an opt-in process: -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Subscriptions** > **Escalation Contacts**. 4. Select **Add Contact**. diff --git a/src/content/docs/email-security/account-setup/manage-account-members.mdx b/src/content/docs/email-security/account-setup/manage-account-members.mdx index e50e43a774e236c..55329f79eba403e 100644 --- a/src/content/docs/email-security/account-setup/manage-account-members.mdx +++ b/src/content/docs/email-security/account-setup/manage-account-members.mdx @@ -23,7 +23,7 @@ To add a user: To edit a user's settings: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Users and Actions**. 4. On a specific user, select **...** > **Edit**. @@ -34,7 +34,7 @@ To edit a user's settings: To delete a user: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Users and Actions**. 4. On a specific user, select **...** > **Delete**. @@ -43,7 +43,7 @@ To delete a user: To reset a user's two-factor authentication (2FA): -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Users and Actions**. 4. On a specific user, select **...** > **Reset 2FA**. diff --git a/src/content/docs/email-security/account-setup/manage-parent-permissions.mdx b/src/content/docs/email-security/account-setup/manage-parent-permissions.mdx index d0d71cd1a43363d..9c7aa118621def5 100644 --- a/src/content/docs/email-security/account-setup/manage-parent-permissions.mdx +++ b/src/content/docs/email-security/account-setup/manage-parent-permissions.mdx @@ -11,20 +11,20 @@ import { Render } from "~/components"; -When you set up Email Security through a [partner](/email-security/partners/), that partner's account is the **parent** account to your **child** account. +When you set up Email security through a [partner](/email-security/partners/), that partner's account is the **parent** account to your **child** account. Each child account can set the level of access allowed to their account from the parent. You may want to update this setting if you are receiving troubleshooting support from your parent account. To update parent permissions: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Delegated Accounts**. 4. Select a permission level: - - **No external account access**: Shuts off all access from the parent account (including Email Security). + - **No external account access**: Shuts off all access from the parent account (including Email security). - **Allow external account view-only access** (default): Allows a parent user to view the customer's portal, including settings. - **Allow external account Super Admin access**: Allows a parent user to administer the customer account on their behalf. By selecting this option the customer is acknowledging consent for outside administration of their account. diff --git a/src/content/docs/email-security/account-setup/permissions.mdx b/src/content/docs/email-security/account-setup/permissions.mdx index 2f7bad6a2036ddd..dd300825c9ab963 100644 --- a/src/content/docs/email-security/account-setup/permissions.mdx +++ b/src/content/docs/email-security/account-setup/permissions.mdx @@ -28,7 +28,7 @@ If your account has [parent permissions](/email-security/account-setup/manage-pa ## Child accounts -Child accounts control settings and services associated with an Email Security instance. +Child accounts control settings and services associated with an Email security instance. ### Child users diff --git a/src/content/docs/email-security/account-setup/sso/azure.mdx b/src/content/docs/email-security/account-setup/sso/azure.mdx index 64dbaca1b6df60d..2f5647fba7a2cc7 100644 --- a/src/content/docs/email-security/account-setup/sso/azure.mdx +++ b/src/content/docs/email-security/account-setup/sso/azure.mdx @@ -10,7 +10,7 @@ head: import { GlossaryTooltip, Render } from "~/components"; -This tutorial will walk you through the steps for configuring a non-gallery enterprise application within Azure Active Directory to establish a SAML SSO connection with Email Security (formerly Area 1). +This tutorial will walk you through the steps for configuring a non-gallery enterprise application within Azure Active Directory to establish a SAML SSO connection with Email security (formerly Area 1). ## 1. Azure Active Directory configuration @@ -60,7 +60,7 @@ This tutorial will walk you through the steps for configuring a non-gallery ente 11. Select **Save** and the cross button to exit **SAML Certificates**. -12. Still in the **SAML Certificates** section, find **Federation Metadata XML** and select **Download**. You will need this information for the SSO Configuration in the Email Security dashboard. +12. Still in the **SAML Certificates** section, find **Federation Metadata XML** and select **Download**. You will need this information for the SSO Configuration in the Email security dashboard. ![Download the Metadata XML information](~/assets/images/email-security/sso/azure/step12-download.png) @@ -73,9 +73,9 @@ Your Azure configuration is now complete. It should look similar to this: Now that the application configuration is complete, update **User Assignments** and **Application Properties** as needed to ensure that authorized personnel are able to access the new application from their Apps Catalog. Additionally, you may choose to update the application logo image file or the privacy policy URL. ::: -## 2. Configure Email Security to connect to Azure +## 2. Configure Email security to connect to Azure -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -101,8 +101,8 @@ Now that the application configuration is complete, update **User Assignments** ## 3. Test SSO configuration -After completing both the Azure and Email Security setups, you can test your SSO access. -In this example, the logo for Email Security has been updated. +After completing both the Azure and Email security setups, you can test your SSO access. +In this example, the logo for Email security has been updated. :::note Verify that the User Assignments and Application Properties of your new Azure AD application have been updated accordingly to ensure that authorized personnel are able to access the new application from their Office 365/Azure Apps Catalog page. Application logos and privacy policy URL can also be updated as needed. @@ -114,18 +114,18 @@ Verify that the User Assignments and Application Properties of your new Azure AD 3. Go to **Settings** > **SSO**. -4. Locate the Email Security Horizon application (or whichever name you gave your application), and select it to initiate your SSO login with Email Security. +4. Locate the Email security Horizon application (or whichever name you gave your application), and select it to initiate your SSO login with Email security. -5. If you configured everything correctly, you should be signed in to the Email Security Portal and redirected to the dashboard. +5. If you configured everything correctly, you should be signed in to the Email security Portal and redirected to the dashboard. ## Troubleshooting -If you have trouble connecting your Azure account to Email Security, make sure that: +If you have trouble connecting your Azure account to Email security, make sure that: -- The user exists in the Email Security dashboard. +- The user exists in the Email security dashboard. - The **Identifier** and **Reply URLs** in Azure AD are correct (refer to **Basic SAML Configuration** in step 7 of [Azure Active Directory configuration](#1-azure-active-directory-configuration)). - **Sign SAML response** and **SHA-1** are selected in Azure AD (refer to **SAML Certificates** in step 9 of [Azure Active Directory configuration](#1-azure-active-directory-configuration)). -- The SAML SSO Domain is set correctly in the Email Security dashboard (refer to step 6 in [Configure Email Security to connect to Azure](#2-configure-email-security-to-connect-to-azure)). +- The SAML SSO Domain is set correctly in the Email security dashboard (refer to step 6 in [Configure Email security to connect to Azure](#2-configure-email-security-to-connect-to-azure)). - The name ID identifier is set to **Email Address**. If all else fails, enable Chrome browser debug logs. Then, log your activity when SSO is initiated, and contact [Cloudflare support](/support/contacting-cloudflare-support/). diff --git a/src/content/docs/email-security/account-setup/sso/generic-sso.mdx b/src/content/docs/email-security/account-setup/sso/generic-sso.mdx index 9a729521bf35dba..44ab4d14cc0a2c4 100644 --- a/src/content/docs/email-security/account-setup/sso/generic-sso.mdx +++ b/src/content/docs/email-security/account-setup/sso/generic-sso.mdx @@ -28,15 +28,15 @@ Below is a generic guide to successfully set up an identity provider based -For added security and convenience, Email Security (formerly Area 1) offers support for Security Assertion Markup Language based (SAML-based) single sign-on (SSO) logins. Organizations are able to choose between having users access Email Security (formerly Area 1) with a username and password plus a two-factor authentication (2FA) code, or using an SSO provider, such as OneLogin or Okta. +For added security and convenience, Email security (formerly Area 1) offers support for Security Assertion Markup Language based (SAML-based) single sign-on (SSO) logins. Organizations are able to choose between having users access Email security (formerly Area 1) with a username and password plus a two-factor authentication (2FA) code, or using an SSO provider, such as OneLogin or Okta. ## SAML configuration options -- **Identity Provider initiated (IDP-initiated) SAML**: IDP-initiated configurations (like Okta or OneLogin) require the IDP to be accessible to the Email Security infrastructure in order to successfully authenticate users. At the most basic level, the user selects an application from their IDP. Then, the IDP communicates with Email Security using a SAML assertion to provide identity information for the user requesting to login to the Email Security dashboard. -- **Service Provider Initiated (SP-initiated) SAML**: SP-initiated configurations are the most common SAML authentication mechanisms. The main difference compared to IDP is that the service provider (like Email Security) does not require any direct connection to the IDP in order to authenticate a user. The user's browser provides the ability for the SAML exchange to occur but the service provider and the IDP do not directly communicate with each other. +- **Identity Provider initiated (IDP-initiated) SAML**: IDP-initiated configurations (like Okta or OneLogin) require the IDP to be accessible to the Email security infrastructure in order to successfully authenticate users. At the most basic level, the user selects an application from their IDP. Then, the IDP communicates with Email security using a SAML assertion to provide identity information for the user requesting to login to the Email security dashboard. +- **Service Provider Initiated (SP-initiated) SAML**: SP-initiated configurations are the most common SAML authentication mechanisms. The main difference compared to IDP is that the service provider (like Email security) does not require any direct connection to the IDP in order to authenticate a user. The user's browser provides the ability for the SAML exchange to occur but the service provider and the IDP do not directly communicate with each other. -Email Security (formerly Area 1) only supports IDP-initiated SAML setup at this point. +Email security (formerly Area 1) only supports IDP-initiated SAML setup at this point. ## Setup diff --git a/src/content/docs/email-security/account-setup/sso/okta.mdx b/src/content/docs/email-security/account-setup/sso/okta.mdx index b8852d8e159189d..06178cdf30ab7fb 100644 --- a/src/content/docs/email-security/account-setup/sso/okta.mdx +++ b/src/content/docs/email-security/account-setup/sso/okta.mdx @@ -10,11 +10,11 @@ head: import { Render } from "~/components"; -In this tutorial you will learn how to connect your Email Security (formerly Area 1) account to Okta. When single sign-on (SSO) is correctly configured, your authorized employees can connect to the Email Security dashboard using a familiar user name and password. +In this tutorial you will learn how to connect your Email security (formerly Area 1) account to Okta. When single sign-on (SSO) is correctly configured, your authorized employees can connect to the Email security dashboard using a familiar user name and password. -## 1. Create an Email Security app in Okta +## 1. Create an Email security app in Okta -You will need to manually create an app for Email Security in Okta. +You will need to manually create an app for Email security in Okta. 1. Log in to Okta as an administrator. @@ -26,7 +26,7 @@ You will need to manually create an app for Email Security in Okta. ![Choose SAML 2.0 as the new app integration type](~/assets/images/email-security/sso/okta/step3-saml.png) -4. Enter a descriptive name for your app, such as `Email Security`, and select **Next**. +4. Enter a descriptive name for your app, such as `Email security`, and select **Next**. 5. Enter the following settings for **SAML Settings**: @@ -41,7 +41,7 @@ You will need to manually create an app for Email Security in Okta. | **Signature Algorithm** | _RSA-SHA1_ | | **Digest Algorithm** | _SHA1_ | | **Attribute statements (optional)** | | - | **Name** | Enter email addresses for your users. Should match users already added to Email Security (formerly Area 1) dashboard. | + | **Name** | Enter email addresses for your users. Should match users already added to Email security (formerly Area 1) dashboard. | | **Name format** | Select _Unspecified_ from the drop-down menu. | | **Value** | Select `user.email` from the drop-down menu. | @@ -61,21 +61,21 @@ You will need to manually create an app for Email Security in Okta. ![Find the View SAML setup instructions button](~/assets/images/email-security/sso/okta/step11-saml-instructions.png) -12. Copy and save the link in **Identity Provider Single Sign-On URL**. You will need it later to use in the Email Security dashboard. +12. Copy and save the link in **Identity Provider Single Sign-On URL**. You will need it later to use in the Email security dashboard. - ![Copy and save the SSO URL to use later in the Email Security dashboard](~/assets/images/email-security/sso/okta/step12-sso-url.png) + ![Copy and save the SSO URL to use later in the Email security dashboard](~/assets/images/email-security/sso/okta/step12-sso-url.png) -13. Scroll down to **Optional**. You might need to enlarge the text box to copy and save all the XML data. You will need this information to finish configuration in the Email Security dashboard. The start of the metadata should be similar to the following: +13. Scroll down to **Optional**. You might need to enlarge the text box to copy and save all the XML data. You will need this information to finish configuration in the Email security dashboard. The start of the metadata should be similar to the following: ```txt ... ``` - ![Copy and save the XML metadata to use later in the Email Security dashboard](~/assets/images/email-security/sso/okta/step13-optional.png) + ![Copy and save the XML metadata to use later in the Email security dashboard](~/assets/images/email-security/sso/okta/step13-optional.png) -## 2. Configure Email Security to connect to Okta +## 2. Configure Email security to connect to Okta -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -95,4 +95,4 @@ You will need to manually create an app for Email Security in Okta. 8. Select **Update Settings** to save your configuration. -Log out of any customer portal sessions. Your Okta account should now show a tile for Email Security (formerly Area 1). +Log out of any customer portal sessions. Your Okta account should now show a tile for Email security (formerly Area 1). diff --git a/src/content/docs/email-security/api/index.mdx b/src/content/docs/email-security/api/index.mdx index 082a9f49e0d8679..80cf86c55283b66 100644 --- a/src/content/docs/email-security/api/index.mdx +++ b/src/content/docs/email-security/api/index.mdx @@ -11,7 +11,7 @@ import { GlossaryTooltip, Render } from "~/components"; -Email Security offers Application Programming Interfaces (APIs) to expose our phishing campaign rulesets. These APIs both aid research and provide a set of indicators to block using network security edge devices. +Email security offers Application Programming Interfaces (APIs) to expose our phishing campaign rulesets. These APIs both aid research and provide a set of indicators to block using network security edge devices. All API requests are initiated using normal HTTP requests (`GET`/`POST`/`DELETE`) and responses are returned in JSON. Authentication to the APIs uses HTTP Basic Authentication over HTTPS. diff --git a/src/content/docs/email-security/api/service-accounts.mdx b/src/content/docs/email-security/api/service-accounts.mdx index 68021127c3345fa..87ed747400edd84 100644 --- a/src/content/docs/email-security/api/service-accounts.mdx +++ b/src/content/docs/email-security/api/service-accounts.mdx @@ -3,16 +3,15 @@ title: Service accounts pcx_content_type: how-to sidebar: order: 1 - --- A **service account** allows admins to create and maintain API credentials separate from a single username and password combination. It also allows you to create and control additional API access for different use cases. -When you connect to the [Email Security (formerly Area 1) API](/email-security/api/), the **Public Key** is used for the *username* and the **Private Key** for the *password*. +When you connect to the [Email security (formerly Area 1) API](/email-security/api/), the **Public Key** is used for the _username_ and the **Private Key** for the _password_. ## Create service account -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Service Accounts**. 4. Select **Add Service Account**. @@ -20,13 +19,13 @@ When you connect to the [Email Security (formerly Area 1) API](/email-security/a 6. Select **Create Service Account**. 7. You will see your account's **Private Key** in a pop-up message (which will never be displayed again) and **Public Key** in the list of service accounts. Make sure to copy both values and store in a secure location. -*** +--- ## Rotate private key If you lose your private key or need to rotate it for security reasons, you can generate a new private key: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Service Accounts**. 4. On a specific account, select **...** > **Refresh key**. diff --git a/src/content/docs/email-security/deployment/api/setup/email-retro-scan.mdx b/src/content/docs/email-security/deployment/api/setup/email-retro-scan.mdx index 76821f1c7a58506..2ef4809858a0a0c 100644 --- a/src/content/docs/email-security/deployment/api/setup/email-retro-scan.mdx +++ b/src/content/docs/email-security/deployment/api/setup/email-retro-scan.mdx @@ -16,7 +16,7 @@ Email Retro Scan allows you to scan up to 14 days of old messages in your Office To scan for threats in your Office 365 inbox: 1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain. -2. Go to **Email Security** > **Retro Scan**. +2. Go to **Email security** > **Retro Scan**. 3. Select **Generate report**. 4. Cloudflare needs authorization to access your O365 messages. Select **Authenticate with Microsoft**, and give Cloudflare the required permissions. 5. Back to Cloudflare dashboard, select **Grant mail access**. Then, select your account and give Cloudflare the required permissions. @@ -32,7 +32,7 @@ To scan for threats in your Office 365 inbox: ## Analyze results 1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/login), and select your account and domain. -2. Go to **Email Security** > **Retro Scan**. +2. Go to **Email security** > **Retro Scan**. 3. Select **Scan report**. This tab shows the total number of emails scanned, a breakdown of the [threat types](/email-security/reference/dispositions-and-attributes/) found within the domains selected, the [top targeted employees](/email-security/email-configuration/enhanced-detections/business-email-compromise/), and the most common places where threats originate from. 4. To create an offline copy of the threat report, select **Download Report**. 5. Select **View detections** to inspect emails found by Retro Scan. You can filter emails by threat type (for example, malicious). diff --git a/src/content/docs/email-security/deployment/api/setup/exchange-bcc-setup.mdx b/src/content/docs/email-security/deployment/api/setup/exchange-bcc-setup.mdx index b5b76da496d1102..53aa66704ce9a75 100644 --- a/src/content/docs/email-security/deployment/api/setup/exchange-bcc-setup.mdx +++ b/src/content/docs/email-security/deployment/api/setup/exchange-bcc-setup.mdx @@ -14,9 +14,9 @@ import { GlossaryTooltip, Render } from "~/components"; -For customers using Microsoft Exchange, setting up Email Security via BCC is quick and easy. You need to configure an inbound rule to send emails to Email Security via BCC for processing and detection of potential phishing attacks. The following email flow shows how this works: +For customers using Microsoft Exchange, setting up Email security via BCC is quick and easy. You need to configure an inbound rule to send emails to Email security via BCC for processing and detection of potential phishing attacks. The following email flow shows how this works: -![Email flow when setting up a phishing assessment risk for Microsoft Exchange with Email Security.](~/assets/images/email-security/deployment/api-setup/exchange/bcc-exchange-flow.png) +![Email flow when setting up a phishing assessment risk for Microsoft Exchange with Email security.](~/assets/images/email-security/deployment/api-setup/exchange/bcc-exchange-flow.png) ## Configure Inbound Rule @@ -70,9 +70,9 @@ For customers using Microsoft Exchange, setting up Email Security via BCC is qui :::note -If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email Security (formerly Area 1). Usually, the Email Security BCC rule will be at the top of the ruleset. The configured conditions of the Email Security BCC rule will only trigger for inbound messages. +If you have multiple rules, you may need to change the order of the BCC rule and move it to the right location in your rule sequence. This is needed so you can send BCC messages to Email security (formerly Area 1). Usually, the Email security BCC rule will be at the top of the ruleset. The configured conditions of the Email security BCC rule will only trigger for inbound messages. ::: ## Email processing and reports -In BCC mode, all emails are put through automated phishing detections by Email Security. Emails that trigger phishing detections are logged for reporting via product portal, email and Slack. Emails that do not trigger any detections are deleted. +In BCC mode, all emails are put through automated phishing detections by Email security. Emails that trigger phishing detections are logged for reporting via product portal, email and Slack. Emails that do not trigger any detections are deleted. diff --git a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-domain.mdx b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-domain.mdx index a8f8e08b7001699..2a3dd8c503c80e8 100644 --- a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-domain.mdx +++ b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-domain.mdx @@ -7,12 +7,11 @@ sidebar: import { Render } from "~/components"; - -To set up Email Security (formerly Area 1) for Gmail: +To set up Email security (formerly Area 1) for Gmail: -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Select the question mark, where you will be able to find your BCC address. 3. Once you found your address, select **Settings** (the gear icon), then select **New Domain**. 4. Fill in the information needed to add your domain: @@ -27,4 +26,4 @@ To set up Email Security (formerly Area 1) for Gmail: ## Next steps -Now that you have found your BCC address and added your domain, continue with [Add BCC rules](/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1/) to add BCC rules to Email Security. +Now that you have found your BCC address and added your domain, continue with [Add BCC rules](/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1/) to add BCC rules to Email security. diff --git a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction.mdx b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction.mdx index 916938572b7d7d0..0b3ae21ebdf49b9 100644 --- a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction.mdx +++ b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction.mdx @@ -5,12 +5,12 @@ sidebar: order: 5 --- -import { Render } from "~/components" +import { Render } from "~/components"; -1. On the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/), select **Domains** under **DOMAINS & ROUTING**, then select **NEW DOMAIN**. Fill in the information to add a new domain: - - On **FORWARDING TO**: Enter `Google.com`. - - Adjust **Hops** to 2. - - On **Outbound TLS**: Ensure you select **Forward all messages over TLS**. +1. On the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/), select **Domains** under **DOMAINS & ROUTING**, then select **NEW DOMAIN**. Fill in the information to add a new domain: + - On **FORWARDING TO**: Enter `Google.com`. + - Adjust **Hops** to 2. + - On **Outbound TLS**: Ensure you select **Forward all messages over TLS**. 2. Select **Publish Domain**. 3. Select **RETRACT SETTINGS** > **Authorize Gmail**. 4. Upload the JSON file [previously generated](/email-security/deployment/api/setup/gsuite-bcc-setup/create-service-account/). @@ -18,9 +18,9 @@ import { Render } from "~/components" ## Post delivery retractions for new threats -Email Security (formerly Area 1) is continuously gathering new information about phishing campaigns. Users might have email messages in their inboxes that were scanned by Email Security but not retracted initially because, at the time of scan, these email messages had not been identified as a threat. To mitigate risk, Email Security offers you tools to re-evaluate email messages at a fixed time interval based on knowledge Cloudflare may have acquired since initial delivery. Any email messages that fit this new threat knowledge will be retracted. +Email security (formerly Area 1) is continuously gathering new information about phishing campaigns. Users might have email messages in their inboxes that were scanned by Email security but not retracted initially because, at the time of scan, these email messages had not been identified as a threat. To mitigate risk, Email security offers you tools to re-evaluate email messages at a fixed time interval based on knowledge Cloudflare may have acquired since initial delivery. Any email messages that fit this new threat knowledge will be retracted. You can enable two options: -- **Post Delivery Response**: Email Security will continue to re-evaluate emails already delivered to your users' inboxes at a fixed time interval in search for phishing sites or campaigns not previously known to Cloudflare. If any email messages fitting these new criteria are found, Email Security retracts them. -- **Phish Submission Response**: Email Security will retract emails already delivered that are reported by your users as phishing, and are found to be malicious by Email Security. Retraction will occur according to your configuration. \ No newline at end of file +- **Post Delivery Response**: Email security will continue to re-evaluate emails already delivered to your users' inboxes at a fixed time interval in search for phishing sites or campaigns not previously known to Cloudflare. If any email messages fitting these new criteria are found, Email security retracts them. +- **Phish Submission Response**: Email security will retract emails already delivered that are reported by your users as phishing, and are found to be malicious by Email security. Retraction will occur according to your configuration. diff --git a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1.mdx b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1.mdx index 1224d6056a58dc8..60d6cd735b88b07 100644 --- a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1.mdx +++ b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1.mdx @@ -5,31 +5,31 @@ sidebar: order: 3 --- -import { Render } from "~/components" +import { Render } from "~/components"; 1. In the [Google Admin console](https://admin.google.com/), go to **Menu** > **Apps** > **Google Workspace** > **Gmail** > **Compliance**. 2. Go to **Content Compliance** > Select **Edit**. -3. Add a **Content Compliance** filter, and name it `Email Security (Area 1) - BCC`. +3. Add a **Content Compliance** filter, and name it `Email security (Area 1) - BCC`. 4. In **Email messages to affect**, select **Inbound**. -5. Select the recipients you want to send emails to Email Security (formerly Area 1) via BCC. Under **Add expressions that describe the content you want to search for in each message**: - - Select **If ANY of the following match the message**. - - Select **Add** to configure the expression. - - Select **Advanced content match**. - - In **Location**, select **Headers + Body**. - - In **Match type**, select **Matches regex**. - - In **Regexp** input `.*`. You can customize the regex as needed and test within the admin page or on sites like [Regexr](https://regexr.com/). - - Select **SAVE**. +5. Select the recipients you want to send emails to Email security (formerly Area 1) via BCC. Under **Add expressions that describe the content you want to search for in each message**: + - Select **If ANY of the following match the message**. + - Select **Add** to configure the expression. + - Select **Advanced content match**. + - In **Location**, select **Headers + Body**. + - In **Match type**, select **Matches regex**. + - In **Regexp** input `.*`. You can customize the regex as needed and test within the admin page or on sites like [Regexr](https://regexr.com/). + - Select **SAVE**. 6. In **If the above expressions match, do the following**: - - Select **Modify message**. - - Ensure that **Envelope recipient** > **Change envelope recipient** is unselected, to ensure that emails will not be dropped as an unintended consequence. You will select this option at a later stage. - - Go to **Also deliver to**, select **Add more recipients** > **ADD** > Choose **Advanced**. - - Under **Envelope recipient**, select **Change envelope recipient** > **Replace recipient** > Enter the email of the recipient. - - Under **Spam and delivery options**, select **Suppress bounces from this recipient**. - - Under **Headers**, select **Add X-Gm-Spam and X-Gm-Phishy headers**. - - Select **SAVE**. + - Select **Modify message**. + - Ensure that **Envelope recipient** > **Change envelope recipient** is unselected, to ensure that emails will not be dropped as an unintended consequence. You will select this option at a later stage. + - Go to **Also deliver to**, select **Add more recipients** > **ADD** > Choose **Advanced**. + - Under **Envelope recipient**, select **Change envelope recipient** > **Replace recipient** > Enter the email of the recipient. + - Under **Spam and delivery options**, select **Suppress bounces from this recipient**. + - Under **Headers**, select **Add X-Gm-Spam and X-Gm-Phishy headers**. + - Select **SAVE**. 7. In **Account types to affect**, select **Users** and **Groups**. 8. Select **SAVE**. ## Next steps -Now that you have added BCC rules on the Area 1 portal, you need to [create a project on Google Cloud Console](/email-security/deployment/api/setup/gsuite-bcc-setup/create-project-gcp/). \ No newline at end of file +Now that you have added BCC rules on the Area 1 portal, you need to [create a project on Google Cloud Console](/email-security/deployment/api/setup/gsuite-bcc-setup/create-project-gcp/). diff --git a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/create-service-account.mdx b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/create-service-account.mdx index 9cad42abef70c48..9757a95a306392d 100644 --- a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/create-service-account.mdx +++ b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/create-service-account.mdx @@ -5,31 +5,32 @@ sidebar: order: 4 --- -import { Render } from "~/components" +import { Render } from "~/components"; 1. On the [Google Cloud Console](https://console.cloud.google.com/welcome/new), select **Credentials**. 2. Select **CREATE CREDENTIALS** > **Service account**. 3. Fill in the details to create a service account: - - **Service account name**: Enter `Message Retraction Service Account`. - - **Service account ID**: Enter `message-retraction-service-acc`. - - **Service account description**: Enter `Email Security Message Retraction`. - - Select **CREATE AND CONTINUE**. + - **Service account name**: Enter `Message Retraction Service Account`. + - **Service account ID**: Enter `message-retraction-service-acc`. + - **Service account description**: Enter `Email security Message Retraction`. + - Select **CREATE AND CONTINUE**. 4. In **Grant this service account access to project**, select **Select a role** > Choose **Owner**. Select **CONTINUE**, then **DONE**. 5. Go back to **Credentials**, and select your service account under **Service Accounts**. In **Details**, take note of the **Unique ID**. 6. Select **Advanced settings** > **VIEW GOOGLE WORKSPACE ADMIN CONSOLE**, then enter your password. 7. On the sidebar, select **Security** > **Access and data control** > **API controls** > Select **MANAGE DOMAIN WIDE DELEGATION**. 8. Select **Add new** > Add a new client ID: - - **Client ID**: Enter the **Unique ID** you took note of. - - **OAuth scopes**: Enter the following URLs: + - **Client ID**: Enter the **Unique ID** you took note of. + - **OAuth scopes**: Enter the following URLs: - ```txt - https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ - ``` - - Select **AUTHORIZE**. + ```txt + https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.directory.user.alias.readonly, https://www.googleapis.com/auth/gmail.labels, https://mail.google.com/ + ``` + + - Select **AUTHORIZE**. 9. Go back to the sidebar > **Service Accounts**. 10. Select the three dots > **Manage keys** > **ADD KEY** > **Create new key** > Select **JSON** > Select **CREATE**. This downloads a `.json` file which you will use at a later stage. ## Next steps -Now that you have created a service account, proceed to [adding retractions](/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction/) to your email. \ No newline at end of file +Now that you have created a service account, proceed to [adding retractions](/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction/) to your email. diff --git a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/index.mdx b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/index.mdx index 2f7b411ff23075a..40a61d9c463f9d1 100644 --- a/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/index.mdx +++ b/src/content/docs/email-security/deployment/api/setup/gsuite-bcc-setup/index.mdx @@ -5,7 +5,7 @@ sidebar: order: 1 head: - tag: title - content: Setup Gmail with Email Security (formerly + content: Setup Gmail with Email security (formerly Area 1) --- @@ -13,11 +13,11 @@ import { Render, Details } from "~/components"; -For customers using Gmail, setting up Email Security via BCC is quick and easy. All you need to do is create a content compliance filter to send emails to Email Security through BCC. The following email flow shows how this works: +For customers using Gmail, setting up Email security via BCC is quick and easy. All you need to do is create a content compliance filter to send emails to Email security through BCC. The following email flow shows how this works: -![Email flow when setting up a phishing assessment risk for Gmail with Email Security.](~/assets/images/email-security/deployment/api-setup/gmail/gmail-bcc-flow.png) +![Email flow when setting up a phishing assessment risk for Gmail with Email security.](~/assets/images/email-security/deployment/api-setup/gmail/gmail-bcc-flow.png) -To set up Gmail with Email Security: +To set up Gmail with Email security: 1. [Find your BCC address and add a domain](/email-security/deployment/api/setup/gsuite-bcc-setup/add-domain/). 2. [Add BCC rules](/email-security/deployment/api/setup/gsuite-bcc-setup/bcc-rules-to-area1/). diff --git a/src/content/docs/email-security/deployment/api/setup/index.mdx b/src/content/docs/email-security/deployment/api/setup/index.mdx index 399630436c70497..56d698e89b0a30e 100644 --- a/src/content/docs/email-security/deployment/api/setup/index.mdx +++ b/src/content/docs/email-security/deployment/api/setup/index.mdx @@ -12,24 +12,24 @@ import { Render } from "~/components"; -When you first get started with Email Security (formerly Area 1), you will need to set up a way to connect your current mail environment with Email Security. +When you first get started with Email security (formerly Area 1), you will need to set up a way to connect your current mail environment with Email security. ## BCC setup -Send messages to Email Security via BCC configurations within your email provider: +Send messages to Email security via BCC configurations within your email provider: - [Google Workspace BCC setup](/email-security/deployment/api/setup/gsuite-bcc-setup/) - [Microsoft Exchange BCC setup](/email-security/deployment/api/setup/exchange-bcc-setup/) ## Journaling setup -Send messages to Email Security via a Journaling configuration within your email provider: +Send messages to Email security via a Journaling configuration within your email provider: - [Office 365 journaling setup](/email-security/deployment/api/setup/office365-journaling/) ## Microsoft Graph API -Send messages to Email Security via a Microsoft Graph API configuration within your email provider: +Send messages to Email security via a Microsoft Graph API configuration within your email provider: - [Office 365 Microsoft Graph API setup](/email-security/deployment/api/setup/office365-graph-api/) diff --git a/src/content/docs/email-security/deployment/api/setup/office365-graph-api.mdx b/src/content/docs/email-security/deployment/api/setup/office365-graph-api.mdx index fd768898c44fe3f..979dc7bc234c385 100644 --- a/src/content/docs/email-security/deployment/api/setup/office365-graph-api.mdx +++ b/src/content/docs/email-security/deployment/api/setup/office365-graph-api.mdx @@ -4,33 +4,33 @@ pcx_content_type: integration-guide reviewed: 2023-07-31 sidebar: order: 4 -description: Learn how to scan and protect Office 365 emails with Email Security (formerly Area 1) via a Microsoft Graph API setup. +description: Learn how to scan and protect Office 365 emails with Email security (formerly Area 1) via a Microsoft Graph API setup. --- import { Render } from "~/components"; -For customers using Microsoft Office 365, setting up Email Security via Microsoft Graph API is quick and easy. The following email flow shows how this works: +For customers using Microsoft Office 365, setting up Email security via Microsoft Graph API is quick and easy. The following email flow shows how this works: -![Email flow when setting up Email Security with the Microsoft Graph API](~/assets/images/email-security/deployment/api-setup/ms-graph/ms-graph.png) +![Email flow when setting up Email security with the Microsoft Graph API](~/assets/images/email-security/deployment/api-setup/ms-graph/ms-graph.png) ## User roles -Email Security uses two roles for retraction and directory integration purposes: +Email security uses two roles for retraction and directory integration purposes: - **Privileged authentication administrator**: Users with this role can view the current authentication method information and set or reset non-password credentials for all users, including global administrators. Privileged authentication administrators can force users to re-register against existing non-password credentials (like MFA or FIDO) and revoke the `remember MFA on the device` message prompting for MFA on the next login of all users. - **Privileged role administrator**: Users with this role can manage role assignments in Azure Active Directory, as well as within Privileged Identity Management. In addition, this role allows management of all aspects of Privileged Identity Management. -Directory Integration requires the use of both roles mentioned above. Email retraction only requires the **Privileged role administrator**. Any Azure administrator with a membership in the required role can perform these authorizations. The authorization process grants the Email Security dashboard access to the Azure environment. This access is performed with the least applicable privileges required to function, as shown in the [table below](#azure-applications). +Directory Integration requires the use of both roles mentioned above. Email retraction only requires the **Privileged role administrator**. Any Azure administrator with a membership in the required role can perform these authorizations. The authorization process grants the Email security dashboard access to the Azure environment. This access is performed with the least applicable privileges required to function, as shown in the [table below](#azure-applications). -The Enterprise Applications that Email Security registers are not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to each application in the Enterprise Application section. Refer to [Application management documentation](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/) for more information. +The Enterprise Applications that Email security registers are not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to each application in the Enterprise Application section. Refer to [Application management documentation](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/) for more information. ## Set up Microsoft Graph API -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -42,27 +42,27 @@ The Enterprise Applications that Email Security registers are not tied to any ad
- ![Select Authorize access to give the correct permissions to Email Security](~/assets/images/email-security/deployment/api-setup/ms-graph/step5.png) + ![Select Authorize access to give the correct permissions to Email security](~/assets/images/email-security/deployment/api-setup/ms-graph/step5.png)
6. In the new tab that opens, choose an Office 365 account you want to authorize, or enter your credentials. -7. Read the permissions, and select **Accept** to continue. You will be directed back to the Email Security dashboard. +7. Read the permissions, and select **Accept** to continue. You will be directed back to the Email security dashboard. 8. In **Directory Scanning**, select **Authorize Access**. 9. In the new tab that opens, choose an Office 365 account you want to authorize, or enter your credentials. -10. Read the permissions, and select **Accept** to continue. You will be directed back to the Email Security dashboard. +10. Read the permissions, and select **Accept** to continue. You will be directed back to the Email security dashboard. -11. In **Protection Scope**, choose if Email Security should scan only the inbox or all folders. Scanning all folders is useful for situations where the email is automatically routed to other folders that users still have access to: - 1. **Protect Inbox only**: Email Security will only scan the user's inbox. - 2. **Protect all folders**: Email Security will scan all non-hidden email folders. +11. In **Protection Scope**, choose if Email security should scan only the inbox or all folders. Scanning all folders is useful for situations where the email is automatically routed to other folders that users still have access to: + 1. **Protect Inbox only**: Email security will only scan the user's inbox. + 2. **Protect all folders**: Email security will scan all non-hidden email folders. 12. Now that both types of authorizations have been complete, select **Publish Domain**. -Your authorized domain will show up in **Email Configuration** > **Domains & Routing** > **Domains**, with messages about the progress of directory syncing between Office 365 and Email Security. +Your authorized domain will show up in **Email Configuration** > **Domains & Routing** > **Domains**, with messages about the progress of directory syncing between Office 365 and Email security. ![Now that both authorizations are complete, select Publish domain](~/assets/images/email-security/deployment/api-setup/ms-graph/domain-sync-state.png) diff --git a/src/content/docs/email-security/deployment/api/setup/office365-journaling.mdx b/src/content/docs/email-security/deployment/api/setup/office365-journaling.mdx index f244d8c1b496cba..8c0a892b084f6eb 100644 --- a/src/content/docs/email-security/deployment/api/setup/office365-journaling.mdx +++ b/src/content/docs/email-security/deployment/api/setup/office365-journaling.mdx @@ -6,7 +6,7 @@ sidebar: order: 3 head: - tag: title - content: Setup phishing risk assessment for Office 365 with Email Security + content: Setup phishing risk assessment for Office 365 with Email security (formerly Area 1) --- @@ -14,9 +14,9 @@ import { Render } from "~/components"; -For customers using Microsoft Office 365, setting up Email Security via journaling is quick and easy. The following email flow shows how this works: +For customers using Microsoft Office 365, setting up Email security via journaling is quick and easy. The following email flow shows how this works: -![Email flow when setting up a phishing assessment risk for Office 365 with Email Security.](~/assets/images/email-security/deployment/api-setup/journaling/office365-journaling-flow.png) +![Email flow when setting up a phishing assessment risk for Office 365 with Email security.](~/assets/images/email-security/deployment/api-setup/journaling/office365-journaling-flow.png) diff --git a/src/content/docs/email-security/deployment/inline/reference/egress-ips.mdx b/src/content/docs/email-security/deployment/inline/reference/egress-ips.mdx index 8fb936c2affef1a..b4daaa5fc744d7f 100644 --- a/src/content/docs/email-security/deployment/inline/reference/egress-ips.mdx +++ b/src/content/docs/email-security/deployment/inline/reference/egress-ips.mdx @@ -5,7 +5,7 @@ sidebar: order: 1 --- -When you set up Email Security (formerly Area 1) using an [inline deployment](/email-security/deployment/inline/), you need to tell your existing email providers to accept messages coming from Email Security's egress IP addresses. +When you set up Email security (formerly Area 1) using an [inline deployment](/email-security/deployment/inline/), you need to tell your existing email providers to accept messages coming from Email security's egress IP addresses. Refer to this page for reference on what IP subnet mask ranges to use. @@ -13,12 +13,11 @@ Refer to this page for reference on what IP subnet mask ranges to use. Office 365 does not support IPv6 addresses nor the following IPv4 subnet mask ranges: -* `104.30.32.0/19` -* `134.195.26.0/23` +- `104.30.32.0/19` +- `134.195.26.0/23` If you use Office 365, you will have to use the broken down `/24` subnet mask IP addresses. Refer to [Office 365 `/24` addresses](#office-365-24-addresses) for a list of supported IPv4 addresses. - ::: ## United States diff --git a/src/content/docs/email-security/deployment/inline/setup/cisco-area1-mx.mdx b/src/content/docs/email-security/deployment/inline/setup/cisco-area1-mx.mdx index 80e49ae5d99fbc8..4f659835989aa09 100644 --- a/src/content/docs/email-security/deployment/inline/setup/cisco-area1-mx.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/cisco-area1-mx.mdx @@ -1,5 +1,5 @@ --- -title: Cisco - Email Security (formerly Area 1) as MX Record +title: Cisco - Email security (formerly Area 1) as MX Record pcx_content_type: integration-guide reviewed: 2022-09-30 sidebar: @@ -7,7 +7,7 @@ sidebar: head: - tag: title content: - Deploy and configure Cisco IronPort with Email Security (formerly Area + Deploy and configure Cisco IronPort with Email security (formerly Area 1) as MX Record --- @@ -15,16 +15,16 @@ import { Render } from "~/components"; -![A schematic showing where Email Security security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/cisco-area1-mx/cisco-area1-mx.png) +![A schematic showing where Email security security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/cisco-area1-mx/cisco-area1-mx.png) -In this tutorial, you will learn how to configure Cisco IronPort with Email Security as MX record. This tutorial is broken down into several steps. +In this tutorial, you will learn how to configure Cisco IronPort with Email security as MX record. This tutorial is broken down into several steps. -## 1. Add a Sender Group for Email Security Email Protection IPs +## 1. Add a Sender Group for Email security Email Protection IPs To add a new Sender Group: @@ -47,7 +47,7 @@ To add a new Sender Group: ## 2. Configure Incoming Relays -You need to configure the Incoming Relays section to tell IronPort to ignore upstream hops, since all the connections are now coming from Email Security. This step is needed so the IronPort can retrieve the original IPs to calculate IP reputation. IronPort also uses this information in the Anti-Spam (IPAS) scoring of messages. +You need to configure the Incoming Relays section to tell IronPort to ignore upstream hops, since all the connections are now coming from Email security. This step is needed so the IronPort can retrieve the original IPs to calculate IP reputation. IronPort also uses this information in the Anti-Spam (IPAS) scoring of messages. 1. To enable the Incoming Relays Feature, select **Network** > **Incoming Relays**. 2. Select **Enable** and commit your changes. @@ -59,13 +59,13 @@ You need to configure the Incoming Relays section to tell IronPort to ignore ups ## 3. Disable SPF checks -Make sure you disable Sender Policy Framework (SPF) checks in IronPort. Because Email Security is acting as the MX record, if you do not disable SPF checks, IronPort will block emails due to an SPF failure. +Make sure you disable Sender Policy Framework (SPF) checks in IronPort. Because Email security is acting as the MX record, if you do not disable SPF checks, IronPort will block emails due to an SPF failure. Refer to [Cisco's documentation](https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/117973-faq-esa-00.html) for more information on how to disable SPF checks. ## 4. Update your domain MX records -Instructions to update your MX records will depend on the DNS provider you are using. In your domain DNS zone, you need to replace your current MX records with the Email Security hosts. This will have to be done for every domain where Email Security will be the primary MX. For example: +Instructions to update your MX records will depend on the DNS provider you are using. In your domain DNS zone, you need to replace your current MX records with the Email security hosts. This will have to be done for every domain where Email security will be the primary MX. For example: diff --git a/src/content/docs/email-security/deployment/inline/setup/cisco-cisco-mx.mdx b/src/content/docs/email-security/deployment/inline/setup/cisco-cisco-mx.mdx index bd02dbff23a790e..68e94d86e03d409 100644 --- a/src/content/docs/email-security/deployment/inline/setup/cisco-cisco-mx.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/cisco-cisco-mx.mdx @@ -7,7 +7,7 @@ sidebar: head: - tag: title content: - Deploy and configure Email Security (formerly Area 1) with with Cisco + Deploy and configure Email security (formerly Area 1) with with Cisco as MX record --- @@ -15,11 +15,11 @@ import { GlossaryTooltip, Render } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/cisco-cisco-mx/cisco-mx.png) +![A schematic showing where Email security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/cisco-cisco-mx/cisco-mx.png) -In this tutorial, you will learn how to configure Email Security with Cisco as MX record. This tutorial is broken down into several steps. +In this tutorial, you will learn how to configure Email security with Cisco as MX record. This tutorial is broken down into several steps. -## 1. Add a Sender Group for Email Security Email Protection IPs +## 1. Add a Sender Group for Email security Email Protection IPs To add a new Sender Group: @@ -30,7 +30,7 @@ To add a new Sender Group: 3. Configure the new Sender Group as follows: - **Name**: `Area1`. - **Order**: Order above the existing **WHITELIST** sender group. - - **Comment**: `Email Security Email Protection egress IP Addresses`. + - **Comment**: `Email security Email Protection egress IP Addresses`. - **Policy**: `TRUSTED` (by default, spam detection is disabled for this mail flow policy). - **SBRS**: Leave blank. - **DNS Lists**: Leave blank. @@ -40,7 +40,7 @@ To add a new Sender Group: ![Sender group](~/assets/images/email-security/deployment/inline-setup/cisco-cisco-mx/step1.png) -## 2. Add SMTP route for the Email Security Email Protection Hosts +## 2. Add SMTP route for the Email security Email Protection Hosts To add a new SMTP Route: @@ -50,18 +50,18 @@ To add a new SMTP Route: 3. Configure the new SMTP Route as follows: - **Receiving Domain**: `a1s.mailstream` - - In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on what MX hosts to use. + - In **Destination Hosts**, select **Add Row**, and add the Email security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on what MX hosts to use. ![Edit SMTP route](~/assets/images/email-security/deployment/inline-setup/cisco-cisco-mx/step2.png) ## 3. Create Incoming Content Filters -To manage the mail flow between Email Security and Cisco ESA, you need two filters: +To manage the mail flow between Email security and Cisco ESA, you need two filters: -- One to direct all incoming messages to Email Security. -- One to recognize messages coming back from Email Security to route for normal delivery. +- One to direct all incoming messages to Email security. +- One to recognize messages coming back from Email security to route for normal delivery. -### Incoming Content Filter - To Email Security +### Incoming Content Filter - To Email security To create a new Content Filter: @@ -71,7 +71,7 @@ To create a new Content Filter: 3. Configure the new Incoming Content Filter as follows: - **Name**: `ESA_to_A1S` - - **Description**: `Redirect messages to Email Security for anti-phishing inspection` + - **Description**: `Redirect messages to Email security for anti-phishing inspection` - **Order**: This will depend on your other filters. - **Condition**: No conditions. - **Actions**: @@ -80,7 +80,7 @@ To create a new Content Filter: ![Content filter](~/assets/images/email-security/deployment/inline-setup/cisco-cisco-mx/step3-to-area1.png) -### Incoming Content Filter - From Email Security +### Incoming Content Filter - From Email security To create a new Content Filter: @@ -90,7 +90,7 @@ To create a new Content Filter: 3. Configure the new Incoming Content Filter as follows: - **Name**: `A1S_to_ESA` - - **Description**: `Email Security inspected messages for final delivery` + - **Description**: `Email security inspected messages for final delivery` - **Order**: This filter must come before the previously created filter. - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in [Egress IPs](/email-security/deployment/inline/reference/egress-ips/). For example: diff --git a/src/content/docs/email-security/deployment/inline/setup/gsuite-area1-mx.mdx b/src/content/docs/email-security/deployment/inline/setup/gsuite-area1-mx.mdx index d16bf2efb558153..15a40cb54283721 100644 --- a/src/content/docs/email-security/deployment/inline/setup/gsuite-area1-mx.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/gsuite-area1-mx.mdx @@ -1,12 +1,12 @@ --- -title: Google Workspace - Email Security (formerly Area 1) as MX Record +title: Google Workspace - Email security (formerly Area 1) as MX Record pcx_content_type: integration-guide reviewed: 2022-09-30 sidebar: order: 2 head: - tag: title - content: Deploy and configure Google Workspace with Email Security (formerly + content: Deploy and configure Google Workspace with Email security (formerly Area 1) as MX Record --- @@ -14,26 +14,26 @@ import { GlossaryTooltip, Render } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/gsuite-area1-mx.png) +![A schematic showing where Email security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/gsuite-area1-mx.png) -In this tutorial, you will learn how to configure Google Workspace with Email Security as MX record. This tutorial is broken down into several steps. +In this tutorial, you will learn how to configure Google Workspace with Email security as MX record. This tutorial is broken down into several steps. ## Requirements -- Provisioned Email Security account. +- Provisioned Email security account. - Access to the Google administrator console ([**Google administrator console**](https://admin.google.com) > **Apps** > **Google Workspace** > **Gmail**). -- Access to the domain nameserver hosting the MX records for the domains that will be processed by Email Security. +- Access to the domain nameserver hosting the MX records for the domains that will be processed by Email security. -## 1. Add Email Security IP addresses to the Inbound gateway configuration +## 1. Add Email security IP addresses to the Inbound gateway configuration -When Email Security is deployed as the MX record for Google Workspace, the Inbound gateway needs to be configured such that Google Workspace is aware that it is no longer the MX record for the domain. This is a critical step as it will allow Google Workspace to accept messages from Email Security. +When Email security is deployed as the MX record for Google Workspace, the Inbound gateway needs to be configured such that Google Workspace is aware that it is no longer the MX record for the domain. This is a critical step as it will allow Google Workspace to accept messages from Email security. 1. Go to the [Google Administrative Console](https://admin.google.com/). @@ -70,14 +70,14 @@ Do not select **Reject all mail not from gateway IPs** until the MX records have This optional step is highly recommended to prevent users from being exposed to malicious messages. -When messages are identified as malicious, Email Security will insert the X-header `X-Area1Security-Disposition` into the message with the corresponding disposition. Based on the value of the `X-Area1Security-Disposition`, a content compliance filter can be configured to send malicious detections to an administrative quarantine. This section will outline the steps required to: +When messages are identified as malicious, Email security will insert the X-header `X-Area1Security-Disposition` into the message with the corresponding disposition. Based on the value of the `X-Area1Security-Disposition`, a content compliance filter can be configured to send malicious detections to an administrative quarantine. This section will outline the steps required to: -- Create an Email Security Malicious quarantine. +- Create an Email security Malicious quarantine. - Create the content compliance filter to send malicious messages to quarantine. -### Create Email Security Malicious Quarantine +### Create Email security Malicious Quarantine -If you would like to send Email Security malicious detection to a separate quarantine other than the default quarantine, you will need to create a new quarantine. +If you would like to send Email security malicious detection to a separate quarantine other than the default quarantine, you will need to create a new quarantine. 1. In [Google's administrative console](https://admin.google.com), select the **Manage quarantines** panel. @@ -88,8 +88,8 @@ If you would like to send Email Security malicious detection to a separate quara ![Select the add quarantine button](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/step2-add-quarantine.png) 3. In the quarantine configuration pop-up, enter the following: - - **Name**: `Email Security Malicious`. - - **Description**: `Email Security Malicious`. + - **Name**: `Email security Malicious`. + - **Description**: `Email security Malicious`. - For the **Inbound denial consequence**, select **Drop Message**. - For the **Outbound denial consequence**, select **Drop Message**. @@ -105,9 +105,9 @@ When you are finished entering these details, select **SAVE**. ![Access the quarantine created](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/step4-access-quarantine.png) - Once in the Admin quarantine console, you can access the **Email Security Malicious** quarantine by selecting **Quarantine:ALL** > **Email Security Malicious** in the filter section. Quarantined messages can be released as needed by an administrator. + Once in the Admin quarantine console, you can access the **Email security Malicious** quarantine by selecting **Quarantine:ALL** > **Email security Malicious** in the filter section. Quarantined messages can be released as needed by an administrator. - ![Access Email Security](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/step4-area1.png) + ![Access Email security](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/step4-area1.png) ### Create a content compliance filter to send malicious messages to quarantine @@ -120,7 +120,7 @@ When you are finished entering these details, select **SAVE**. ![Select the configure button](~/assets/images/email-security/deployment/inline-setup/gsuite-area1-mx/step2-configure.png) 3. In the **Content compliance filter** configuration, enter the following: - - **Name**: `Quarantine Email Security Malicious`. + - **Name**: `Quarantine Email security Malicious`. - In **1. Email message to affect**, select **Inbound**. - In **2. Add expression that describe the content you want to search for in each message**: - Select **Add** to add the condition. @@ -129,7 +129,7 @@ When you are finished entering these details, select **SAVE**. - In **Match type**, select **Contains text**. - In **Content**, enter `X-Area1Security-Disposition: MALICIOUS`. - Select **SAVE** to save the condition. - - In **3. If the above expression match, do the following**, select the _Action_ dropdown. Then choose **Quarantine message** and the **Email Security Malicious** quarantine that was created in the previous step. + - In **3. If the above expression match, do the following**, select the _Action_ dropdown. Then choose **Quarantine message** and the **Email security Malicious** quarantine that was created in the previous step.
@@ -153,18 +153,18 @@ When you are finished entering these details, select **SAVE**. :::note -Google handles Groups (that is, distributions lists) differently from user mail accounts. The compliance filters actions are limited to the **Users** account type. If you heavily use Google Groups (that is, distribution lists), quarantining malicious messages using the Email Security quarantine is the recommended method to ensure full protection. +Google handles Groups (that is, distributions lists) differently from user mail accounts. The compliance filters actions are limited to the **Users** account type. If you heavily use Google Groups (that is, distribution lists), quarantining malicious messages using the Email security quarantine is the recommended method to ensure full protection. ::: -## 3. Add your domain to Email Security +## 3. Add your domain to Email security -To avoid email loop errors, add your domain to your Email Security dashboard. +To avoid email loop errors, add your domain to your Email security dashboard. -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/home). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/home). 2. Go to **Settings** (the gear icon). 3. In **Email Configuration** > **Domains**, select **New Domain**. 4. Enter the following settings: - 1. **Domain**: Enter the domain you want Email Security to protect. + 1. **Domain**: Enter the domain you want Email security to protect. 2. **Configured as**: Select **MX Records**. 3. **Forwarding to**: Add `google.com`. 4. **Quarantine policy**: Select **Malicious** and **Spam**. @@ -172,7 +172,7 @@ To avoid email loop errors, add your domain to your Email Security dashboard. ## 4. Update your domain MX records -Instructions to update your MX records will depend on the DNS provider you are using. You need to replace the existing Google MX records with the Email Security hosts. For example: +Instructions to update your MX records will depend on the DNS provider you are using. You need to replace the existing Google MX records with the Email security hosts. For example: @@ -181,7 +181,7 @@ DNS changes will reach the major DNS servers in about an hour or follow the TTL ## 5. Secure your email flow -After 36 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google only accepts messages that are first received by Email Security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email Security by injecting messages directly into Gmail. +After 36 hours, the MX record DNS update will have sufficiently propagated across the Internet. It is now safe to secure your email flow. This will ensure that Google only accepts messages that are first received by Email security. This step is highly recommended to prevent threat actors from using cached MX entries to bypass Email security by injecting messages directly into Gmail. 1. Access the [Google Administrative Console](https://admin.google.com/), then select **Apps** > **Google Workspace** > **Gmail**. @@ -193,9 +193,9 @@ After 36 hours, the MX record DNS update will have sufficiently propagated acros 5. Select **Save** once more to commit and activate the configuration change in the Gmail advanced configuration console. -## 6. Send Email Security spam to user spam folder (optional) +## 6. Send Email security spam to user spam folder (optional) -Unlike the configuration in [step 2](#2-quarantine-malicious-detections) where the message can be sent to an administrative quarantine, this optional step can be configured to send messages that are identified as spam by Email Security to the user’s spam folder. +Unlike the configuration in [step 2](#2-quarantine-malicious-detections) where the message can be sent to an administrative quarantine, this optional step can be configured to send messages that are identified as spam by Email security to the user’s spam folder. 1. Access [Google's Administrative Console](https://admin.google.com/), then select **Apps** > **Google Workspace** > **Gmail**. diff --git a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/index.mdx b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/index.mdx index 1a8c55229f2b8f5..b8d6268d0d92325 100644 --- a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/index.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/index.mdx @@ -1,5 +1,5 @@ --- -title: Office 365 - Email Security (formerly Area 1) as MX Record +title: Office 365 - Email security (formerly Area 1) as MX Record pcx_content_type: integration-guide reviewed: 2023-01-12 sidebar: @@ -7,7 +7,7 @@ sidebar: head: - tag: title content: - Deploy and configure Microsoft Office 365 with Email Security (formerly + Deploy and configure Microsoft Office 365 with Email security (formerly Area 1) as the MX Record --- @@ -15,9 +15,9 @@ import { GlossaryTooltip, Render } from "~/components"; -![A schematic showing where Email Security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/o365-area1-mx/office365-mx.png) +![A schematic showing where Email security is in the life cycle of an email received](~/assets/images/email-security/deployment/inline-setup/o365-area1-mx/office365-mx.png) -In this tutorial, you will learn how to configure Microsoft Office 365 with Email Security as its MX record. This tutorial is broken down into several steps. If at any steps during this tutorial you receive a message saying that you need to run the `Enable-OrganizationCustomization` cmdlet, [refer to section 6](#6-execute-enable-organizationcustomization-if-required). +In this tutorial, you will learn how to configure Microsoft Office 365 with Email security as its MX record. This tutorial is broken down into several steps. If at any steps during this tutorial you receive a message saying that you need to run the `Enable-OrganizationCustomization` cmdlet, [refer to section 6](#6-execute-enable-organizationcustomization-if-required). @@ -30,7 +30,7 @@ For the purposes of this guide, Office 365 and Microsoft 365 are equivalent. product="email-security" /> -## 1. Add Email Security IP addresses to Allow List +## 1. Add Email security IP addresses to Allow List 1. Go to the [Microsoft Security admin center](https://security.microsoft.com/homepage). @@ -86,7 +86,7 @@ For the purposes of this guide, Office 365 and Microsoft 365 are equivalent. ## 2. Enhanced Filtering configuration -This option will allow Office 365 to properly identify the original connecting IP before the message was received by Email Security (formerly Area 1). This helps with SPF analysis. This has two steps: +This option will allow Office 365 to properly identify the original connecting IP before the message was received by Email security (formerly Area 1). This helps with SPF analysis. This has two steps: - Creating an inbound connector. - Enabling the enhanced filtering configuration of the connector. @@ -110,7 +110,7 @@ This option will allow Office 365 to properly identify the original connecting I 5. Select **Next**. 6. Set the following options: - - **Name** - `Email Security Inbound Connector` + - **Name** - `Email security Inbound Connector` - **Description** - `Inbound connector for Enhanced Filtering`
@@ -127,7 +127,7 @@ This option will allow Office 365 to properly identify the original connecting I
- ![Enter all of Email Security's Egress IPs](~/assets/images/email-security/deployment/inline-setup/o365-area1-mx/step9-egress-ips.png) + ![Enter all of Email security's Egress IPs](~/assets/images/email-security/deployment/inline-setup/o365-area1-mx/step9-egress-ips.png)
@@ -153,7 +153,7 @@ Now that the inbound connector has been configured, you will need to enable the
-3. Select the `Email Security Inbound Connector` that you configured previously to edit its configuration parameters. +3. Select the `Email security Inbound Connector` that you configured previously to edit its configuration parameters. 4. Select **Automatically detect and skip the last IP address** and **Apply to entire organization**. @@ -161,13 +161,13 @@ Now that the inbound connector has been configured, you will need to enable the 5. Select **Save**. -## 3. Configure Email Security quarantine policies +## 3. Configure Email security quarantine policies ### Select the disposition you want to quarantine Quarantining messages is a per domain configuration. To modify which domains will have their messages quarantined, access the domain configuration: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon) > **Domains**. @@ -184,12 +184,12 @@ Quarantining messages is a per domain configuration. To modify which domains wil
:::note -When Email Security is deployed as the MX record and protecting Office 365, `MALICIOUS` and `SPAM` detections will automatically be quarantined. This behavior cannot be modified. +When Email security is deployed as the MX record and protecting Office 365, `MALICIOUS` and `SPAM` detections will automatically be quarantined. This behavior cannot be modified. ::: ### Manage the Admin Quarantine -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Email** > **Admin Quarantine**. @@ -203,7 +203,7 @@ When Email Security is deployed as the MX record and protecting Office 365, `MAL ## 4. Message handling -There may be scenarios where use of the Office 365 (O365) email quarantine or a combination with Email Security is preferred. The following are the best practices for using the O365 quarantine [by disposition](/email-security/reference/dispositions-and-attributes/): +There may be scenarios where use of the Office 365 (O365) email quarantine or a combination with Email security is preferred. The following are the best practices for using the O365 quarantine [by disposition](/email-security/reference/dispositions-and-attributes/): | Disposition | Action | | ------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -215,17 +215,17 @@ There may be scenarios where use of the Office 365 (O365) email quarantine or a Office 365 (O365) has various options, as well as limitations, as to how quarantine email messages. Refer to [Office 365 use cases](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/) for more information. -The Email Security dashboard has an [Admin quarantine](/email-security/email-configuration/admin-quarantine/), and you can also use the Office 365 quarantine for when a user quarantine is needed. While there are many quarantine options, the following are the primary use cases the Office 365 [example tutorials](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/) will cover: +The Email security dashboard has an [Admin quarantine](/email-security/email-configuration/admin-quarantine/), and you can also use the Office 365 quarantine for when a user quarantine is needed. While there are many quarantine options, the following are the primary use cases the Office 365 [example tutorials](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/) will cover: -- **Use case 1**: Deliver emails to Office 365 junk email folder and Admin Quarantine in Email Security (Recommended) -- **Use case 2**: Deliver emails to junk email folder and user managed quarantine (this use case requires that `MALICIOUS` emails be quarantined within the Email Security dashboard) +- **Use case 1**: Deliver emails to Office 365 junk email folder and Admin Quarantine in Email security (Recommended) +- **Use case 2**: Deliver emails to junk email folder and user managed quarantine (this use case requires that `MALICIOUS` emails be quarantined within the Email security dashboard) - **Use case 3**: Deliver emails to junk email and administrative quarantine - **Use case 4**: Deliver emails to the user managed quarantine and administrative quarantine - **Use case 5**: Deliver emails to the user junk email folder and administrative quarantine ## 5. Update your domain MX records -Instructions to update your MX records will depend on the DNS provider you are using. You will need to update and replace your existing MX record with the Email Security hosts. For example: +Instructions to update your MX records will depend on the DNS provider you are using. You will need to update and replace your existing MX record with the Email security hosts. For example: @@ -234,15 +234,15 @@ DNS changes will reach the major DNS servers in about an hour or follow the TTL ### Secure Office 365 from MX records bypass (recommended) -One method of DNS attacks is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you will want to enforce an email flow where inbound messages are accepted by Office 365 only when they originate from Email Security. This can be done by adding a connector to only allow email from Email Security with TLS encryption. This step is optional but recommended. +One method of DNS attacks is to search for old MX records and send phishing emails directly to the mail server. To secure the email flow, you will want to enforce an email flow where inbound messages are accepted by Office 365 only when they originate from Email security. This can be done by adding a connector to only allow email from Email security with TLS encryption. This step is optional but recommended. :::caution[Important] -This step should not be performed until 24 hours after all domains (excluding your `` domain) in your Office 365 organization have been onboarded to Email Security, and Email Security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. +This step should not be performed until 24 hours after all domains (excluding your `` domain) in your Office 365 organization have been onboarded to Email security, and Email security is their MX record. If a domain has not been onboarded or DNS is still propagating, you will impact production email flow for that domain. ::: #### Configure domains -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -270,7 +270,7 @@ This step should not be performed until 24 hours after all domains (excluding yo 6. Set the following options: - **Name** - `Secure O365 Inbound` - - **Description** - `Only accept inbound email from Email Security (formerly Area 1)` + - **Description** - `Only accept inbound email from Email security (formerly Area 1)` 7. Select **Next**. diff --git a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/five-junk-admin-quarantine.mdx b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/five-junk-admin-quarantine.mdx index 7465124f23799c8..24102b4f83013df 100644 --- a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/five-junk-admin-quarantine.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/five-junk-admin-quarantine.mdx @@ -40,7 +40,7 @@ In this tutorial, you will learn to deliver `SUSPICIOUS` and `BULK` messages to file="deployment/o365-use-case-transport-rules" product="email-security" params={{ - one: "Email Security Deliver to Junk Email folder`", + one: "Email security Deliver to Junk Email folder`", two: "`SUSPICIOUS`, `BULK`", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", diff --git a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine.mdx b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine.mdx index 80094e9ae5276dc..5d477cb4b690708 100644 --- a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine.mdx @@ -66,7 +66,7 @@ To configure anti-spam policies: - **Select quarantine policy**: _UserNotifyAdminRelease_. - **High confidence phishing**: _Quarantine message_. - **Select quarantine policy**: _UserNotifyAdminRelease_. - - **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. + - **Retain spam in quarantine for this many days**: Default is 15 days. Email security recommends 15-30 days.
@@ -82,12 +82,12 @@ To configure anti-spam policies: file="deployment/o365-use-case-transport-rules" product="email-security" params={{ - one: "`Email Security User Quarantine Message`", + one: "`Email security User Quarantine Message`", two: "`UCE`, `SPOOF`", three: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_", four: "step4-rules-case4.png", - five: "`Email Security User Quarantine Message Admin Release`", + five: "`Email security User Quarantine Message Admin Release`", six: "`MALICIOUS`", seven: "_Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _9_", diff --git a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/index.mdx b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/index.mdx index c2c55525da16cbc..1b0a863a86915fe 100644 --- a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/index.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/index.mdx @@ -6,14 +6,13 @@ sidebar: head: - tag: title content: Office 365 use cases - --- -import { DirectoryListing } from "~/components" +import { DirectoryListing } from "~/components"; -Before following our use case tutorials, read through this how-to guide related to best practices. This will show you how to prepare your Email Security dashboard and enable options such as tagging and [defanging emails](/email-security/email-configuration/email-policies/link-actions/), as well as [Email Link Isolation](/email-security/email-configuration/email-policies/link-actions/#email-link-isolation), before setting up Office 365. +Before following our use case tutorials, read through this how-to guide related to best practices. This will show you how to prepare your Email security dashboard and enable options such as tagging and [defanging emails](/email-security/email-configuration/email-policies/link-actions/), as well as [Email Link Isolation](/email-security/email-configuration/email-policies/link-actions/#email-link-isolation), before setting up Office 365. -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -21,7 +20,6 @@ Before following our use case tutorials, read through this how-to guide related 4. What you do next depends on if you are an Advantage or Enterprise customer: 1. If you are an **Advantage** customer: - 1. In **Disposition Actions**, select **Edit**. 2. In the `SUSPICIOUS` disposition drop-down menu, change the action to `URL Defang`. @@ -30,11 +28,9 @@ Before following our use case tutorials, read through this how-to guide related ![Defang suspicious emails](~/assets/email-security/static/flexible-partial-images/o365-area1-mx/defang-suspicious.png)
- 3. Select **Save Disposition Actions**. 2. If you are an **Enterprise** customer: - 1. Enable **Email Link Isolation**.
@@ -48,15 +44,14 @@ Before following our use case tutorials, read through this how-to guide related 6. Select **Edit**. 7. Enable the following options under **Add Prefix To Subject**: - - * **Malicious** - Enabled. - * **Suspicious** - Enabled. - * **Spam** - Enabled. - * **Bulk** - Enabled. - * **Spoof** - Enabled. - * **Originated Outside of Company** - Optional. - * **Contains Encrypted Content** - Optional. - * **Subject Prefix** - Format as desired. + - **Malicious** - Enabled. + - **Suspicious** - Enabled. + - **Spam** - Enabled. + - **Bulk** - Enabled. + - **Spoof** - Enabled. + - **Originated Outside of Company** - Optional. + - **Contains Encrypted Content** - Optional. + - **Subject Prefix** - Format as desired.
@@ -65,14 +60,13 @@ Before following our use case tutorials, read through this how-to guide related
8. In the same window, scroll down and enable the following options under **Add Prefix To Body**: - - * **Malicious** - Enabled. - * **Suspicious** - Enabled. - * **Spam** - Disabled. - * **Bulk** - Disabled. - * **Spoof** - Enabled. - * **Originated Outside of Company** - Optional. - * **Body Prefix** - Format as desired. You can use the default settings. The body prefix supports HTML tags for formatting. + - **Malicious** - Enabled. + - **Suspicious** - Enabled. + - **Spam** - Disabled. + - **Bulk** - Disabled. + - **Spoof** - Enabled. + - **Originated Outside of Company** - Optional. + - **Body Prefix** - Format as desired. You can use the default settings. The body prefix supports HTML tags for formatting.
diff --git a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine.mdx b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine.mdx index b1af28ae9baa202..9b9560502e5dd64 100644 --- a/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine.mdx +++ b/src/content/docs/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine.mdx @@ -1,18 +1,18 @@ --- -title: 1 - Junk email and Email Security (formerly Area 1) Admin Quarantine +title: 1 - Junk email and Email security (formerly Area 1) Admin Quarantine pcx_content_type: integration-guide reviewed: 2023-01-12 sidebar: order: 1 head: - tag: title - content: Junk email and Email Security (formerly Area 1) Admin Quarantine - + content: Junk email and Email security (formerly Area 1) Admin Quarantine - Office 365 --- import { Render } from "~/components"; -In this tutorial, you will learn how to deliver emails to the Office 365 junk email folder and the Admin Quarantine in Email Security. +In this tutorial, you will learn how to deliver emails to the Office 365 junk email folder and the Admin Quarantine in Email security. ## Configure domains @@ -50,7 +50,7 @@ In this tutorial, you will learn how to deliver emails to the Office 365 junk em ## Create transport rules -To create the transport rules that will send emails with certain dispositions to Email Security: +To create the transport rules that will send emails with certain dispositions to Email security: 1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage). @@ -59,7 +59,7 @@ To create the transport rules that will send emails with certain dispositions to 3. Select **Add a Rule** > **Create a new rule**. 4. Set the following rule conditions: - - **Name**: `Email Security Deliver to Junk Email folder`. + - **Name**: `Email security Deliver to Junk Email folder`. - **Apply this rule if**: _The message headers_ > _includes any of these words_. - **Enter text**: `X-Area1Security-Disposition` > **Save**. - **Enter words**: `SUSPICIOUS`, `BULK` > **Add** > **Save**. @@ -75,4 +75,4 @@ To create the transport rules that will send emails with certain dispositions to 7. Review your settings and select **Finish** > **Done**. -8. Select the rule `Email Security Deliver to Junk Email folder` you have just created, and select **Enable**. +8. Select the rule `Email security Deliver to Junk Email folder` you have just created, and select **Enable**. diff --git a/src/content/docs/email-security/email-configuration/admin-quarantine.mdx b/src/content/docs/email-security/email-configuration/admin-quarantine.mdx index 0018ddeebdbe8c8..6fea400f8dad0c1 100644 --- a/src/content/docs/email-security/email-configuration/admin-quarantine.mdx +++ b/src/content/docs/email-security/email-configuration/admin-quarantine.mdx @@ -3,18 +3,17 @@ title: Admin Quarantine pcx_content_type: how-to sidebar: order: 7 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -Admin Quarantine allows you to automatically prevent incoming messages from reaching a recipient's inbox based on the disposition assigned by Email Security. +Admin Quarantine allows you to automatically prevent incoming messages from reaching a recipient's inbox based on the disposition assigned by Email security. The messages sent to Admin Quarantine are determined by your [domain settings](/email-security/email-configuration/domains-and-routing/domains/). ## Quarantine emails by disposition -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -35,7 +34,7 @@ Quarantine by disposition needs to be configured manually per domain. You can view and potentially release emails that were sent to **Admin Quarantine**: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Email** > **Admin Quarantine**. @@ -47,7 +46,7 @@ You can view and potentially release emails that were sent to **Admin Quarantine From **Admin Quarantine**, you can also release quarantined emails by selecting one or more messages: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Email** > **Admin Quarantine**. @@ -62,5 +61,5 @@ From **Admin Quarantine**, you can also release quarantined emails by selecting 6. (Optional) You can also release multiple messages, by selecting the box next to each message you want to release. :::note -After being released from quarantine, Email Security forwards the original email messages to their destination. These emails will arrive at email inboxes from the original sender, not Email Security. +After being released from quarantine, Email security forwards the original email messages to their destination. These emails will arrive at email inboxes from the original sender, not Email security. ::: diff --git a/src/content/docs/email-security/email-configuration/domains-and-routing/alert-webhooks.mdx b/src/content/docs/email-security/email-configuration/domains-and-routing/alert-webhooks.mdx index 2e5352418cde6ef..d6e42295caac6d9 100644 --- a/src/content/docs/email-security/email-configuration/domains-and-routing/alert-webhooks.mdx +++ b/src/content/docs/email-security/email-configuration/domains-and-routing/alert-webhooks.mdx @@ -3,23 +3,27 @@ title: Alert Webhooks pcx_content_type: concept sidebar: order: 2 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -Alert Webhooks allow you to connect external services to Email Security, including: +Alert Webhooks allow you to connect external services to Email security, including: -* Slack -* Email addresses -* SIEM -* Microsoft Teams +- Slack +- Email addresses +- + SIEM + +- Microsoft Teams ## Create an alert webhook -To create an alert webhook in Email Security: +To create an alert webhook in Email security: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Email Configuration** > **Domains & Routing** > **Alert Webhooks**. 4. Select **New Webhook**. diff --git a/src/content/docs/email-security/email-configuration/domains-and-routing/domains.mdx b/src/content/docs/email-security/email-configuration/domains-and-routing/domains.mdx index 155417770f4bcf0..25b71cfe43f1eca 100644 --- a/src/content/docs/email-security/email-configuration/domains-and-routing/domains.mdx +++ b/src/content/docs/email-security/email-configuration/domains-and-routing/domains.mdx @@ -3,18 +3,17 @@ title: Domains pcx_content_type: how-to sidebar: order: 1 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -Email Security works through a system of domain-based routing, where Cloudflare receives and evaluates incoming email from a domain. +Email security works through a system of domain-based routing, where Cloudflare receives and evaluates incoming email from a domain. ## Create a domain -To create a new domain in Email Security: +To create a new domain in Email security: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -23,37 +22,36 @@ To create a new domain in Email Security: 4. Select **New Domain**. 5. Enter the following information: - - * **Domain**: The domain name receiving email traffic. - * **Configured As**: Choose **MX Records** or specify a number of **Hops** (depending on your email architecture). - * **Forwarding To**: Enter the hostname of your email provider. - * **IP Restrictions** (optional): Restrict incoming traffic to the IP addresses of your mail servers. - * **Inbound TLS** (only available for non-MX domains): Applies TLS to incoming traffic. - * **Outbound TLS**: Choose between **Forward all messages over TLS** (recommended) or **Forward all messages using opportunistic TLS**. - * **Quarantine Policy**: Choose the dispositions you want to send to [Admin quarantine](/email-security/email-configuration/admin-quarantine/). + - **Domain**: The domain name receiving email traffic. + - **Configured As**: Choose **MX Records** or specify a number of **Hops** (depending on your email architecture). + - **Forwarding To**: Enter the hostname of your email provider. + - **IP Restrictions** (optional): Restrict incoming traffic to the IP addresses of your mail servers. + - **Inbound TLS** (only available for non-MX domains): Applies TLS to incoming traffic. + - **Outbound TLS**: Choose between **Forward all messages over TLS** (recommended) or **Forward all messages using opportunistic TLS**. + - **Quarantine Policy**: Choose the dispositions you want to send to [Admin quarantine](/email-security/email-configuration/admin-quarantine/). 6. Select **Publish Domain**. -*** +--- ## Edit a domain To edit an existing domain: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Email Configuration** > **Domains & Routing** > **Domains**. 4. On a specific domain, select **...** > **Edit**. 5. Make changes as needed. 6. Select **Update Domain**. -*** +--- ## Delete a domain To delete a domain: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Email Configuration** > **Domains & Routing** > **Domains**. 4. On a specific domain, select **...** > **Delete**. diff --git a/src/content/docs/email-security/email-configuration/domains-and-routing/partner-domains-tls.mdx b/src/content/docs/email-security/email-configuration/domains-and-routing/partner-domains-tls.mdx index 5953341992d4442..5e601f5e08a2443 100644 --- a/src/content/docs/email-security/email-configuration/domains-and-routing/partner-domains-tls.mdx +++ b/src/content/docs/email-security/email-configuration/domains-and-routing/partner-domains-tls.mdx @@ -3,7 +3,6 @@ title: Partner Domains TLS pcx_content_type: how-to sidebar: order: 3 - --- To add additional TLS requirements for emails coming from certain domains, you can enforce higher levels of SSL/TLS inspection. If TLS is required, mail without TLS from the specified domain will be dropped. @@ -12,7 +11,7 @@ To add additional TLS requirements for emails coming from certain domains, you c To require that email from a specific domain passes SSL/TLS inspection: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. On **Email Configuration**, go to **Domains & Routing** > **Partner Domains TLS**. 4. Select **New Partner Domain**. diff --git a/src/content/docs/email-security/email-configuration/email-policies/link-actions.mdx b/src/content/docs/email-security/email-configuration/email-policies/link-actions.mdx index ad1d5b24a32975d..bee82cd0adfd4e3 100644 --- a/src/content/docs/email-security/email-configuration/email-policies/link-actions.mdx +++ b/src/content/docs/email-security/email-configuration/email-policies/link-actions.mdx @@ -3,10 +3,9 @@ title: Link actions pcx_content_type: concept sidebar: order: 2 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; ## Disposition actions @@ -14,7 +13,7 @@ Create actions for emails with specific **Link Actions**. 4. In **Disposition Actions** select **Edit**. @@ -40,13 +39,13 @@ Link rewriting applies to all email dispositions. If you have link actions set f If you use Microsoft Office 365, you need to allowlist the URL `https://linkdefender.cloudflare.com` before enabling Email Link Isolation. Refer to [Microsoft's documentation](https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/tenant-allow-block-list-urls-configure) to learn how to allowlist a URL. ::: -To enable Email Link Isolation you must have an [inline deployment](/email-security/deployment/inline/) for your Email Security setup. Email Link Isolation is not available if Email Security is deployed through [journaling or BCC](/email-security/deployment/api/setup/) setups. +To enable Email Link Isolation you must have an [inline deployment](/email-security/deployment/inline/) for your Email security setup. Email Link Isolation is not available if Email security is deployed through [journaling or BCC](/email-security/deployment/api/setup/) setups. Email Link Isolation can only be used when there are no other security applications doing URL rewrites. Double link rewrites are not supported. To enable Email Link Isolation: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. On **Email Configuration**, go to **Email Policies** > **Link Actions**. 4. Scroll to **Email Link Isolation** and enable it. @@ -62,7 +61,7 @@ Email Link Isolation does not have advanced configuration options. If you need m Use this option to ignore rewrites on URLs matching specific patterns. This feature allows you to ensure that internal corporate services never have links rewritten for them. -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. On **Email Configuration**, go to **Email Policies** > **Link Actions**. 4. Scroll to **URL Rewrite Ignore Patterns**. diff --git a/src/content/docs/email-security/email-configuration/email-policies/text-addons.mdx b/src/content/docs/email-security/email-configuration/email-policies/text-addons.mdx index 3a6b0c3fb93e08f..47bc5e71a83c50e 100644 --- a/src/content/docs/email-security/email-configuration/email-policies/text-addons.mdx +++ b/src/content/docs/email-security/email-configuration/email-policies/text-addons.mdx @@ -3,33 +3,30 @@ title: Text add-ons pcx_content_type: concept sidebar: order: 1 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When a message receives a specific disposition from Email Security (formerly Area 1), you can add additional information to the subject and body of each message. +When a message receives a specific disposition from Email security (formerly Area 1), you can add additional information to the subject and body of each message. This information provides additional context to your employees, which can help them make better decisions if you choose to have a more permissive email policy: -* **Subject prefixes**: Can tell recipients which category the message is in. Subject prefixes always state the final [disposition](/email-security/reference/dispositions-and-attributes/) of the message. -* **Body prefixes**: Provide more context about why the message was added to a specific category. Body prefixes include all the detections that were triggered. This information depends on the [prefixes you enable](#update-text-add-ons). +- **Subject prefixes**: Can tell recipients which category the message is in. Subject prefixes always state the final [disposition](/email-security/reference/dispositions-and-attributes/) of the message. +- **Body prefixes**: Provide more context about why the message was added to a specific category. Body prefixes include all the detections that were triggered. This information depends on the [prefixes you enable](#update-text-add-ons). For example, an email might have the dispositions `EXTERNAL MALICIOUS` in the subject, and `EXTERNAL MALICIOUS SUSPICIOUS UCE` in its body. :::note - Text add-ons are only applicable to customers using an [inline setup](/email-security/deployment/inline/). - ::: ## Update text add-ons To update or add a new add-on to the subject or body of a message: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -40,8 +37,7 @@ To update or add a new add-on to the subject or body of a message: 5. For each **Disposition**, choose whether prefixes are **Enabled** and whether you want to update the **Custom Label**. 6. If desired, you can also use **Subject Prefix** or **Body Prefix** to update the text added before or after the rendered disposition: - - * **Subject Prefix**: Includes a dynamic value for `%LABELS` that lists the disposition and can include additional text. - * **Body Prefix**: Includes a dynamic value for `%LABELS` that lists the disposition and `%REASONS` that lists the reasons behind an assigned disposition. Can include additional, HTML-formatted text. + - **Subject Prefix**: Includes a dynamic value for `%LABELS` that lists the disposition and can include additional text. + - **Body Prefix**: Includes a dynamic value for `%LABELS` that lists the disposition and `%REASONS` that lists the reasons behind an assigned disposition. Can include additional, HTML-formatted text. 7. Select **Update Text Add-Ons**. diff --git a/src/content/docs/email-security/email-configuration/enhanced-detections/added-detections.mdx b/src/content/docs/email-security/email-configuration/enhanced-detections/added-detections.mdx index d0082d1669cf67e..2fe773521a979a9 100644 --- a/src/content/docs/email-security/email-configuration/enhanced-detections/added-detections.mdx +++ b/src/content/docs/email-security/email-configuration/enhanced-detections/added-detections.mdx @@ -3,10 +3,9 @@ title: Added Detections pcx_content_type: concept sidebar: order: 2 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; With **Added Detections**, you can manage various configurations applied at the time of analyzing email traffic. @@ -29,7 +28,7 @@ These settings apply particularly to trusted business partners that your organiz To access **Added Detections** and potentially adjust your settings: -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. On **Email Configuration**, go to **Enhanced Detections** > **Added Detections**. diff --git a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide.mdx b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide.mdx index 8ba3bd17bb9a606..c165ef1e26b533c 100644 --- a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide.mdx +++ b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide.mdx @@ -7,11 +7,11 @@ sidebar: import { Render } from "~/components"; -Email Security can integrate with Google to retrieve user and group information. This can be used to enforce the Business Email Compromise configuration to prevent user impersonation. +Email security can integrate with Google to retrieve user and group information. This can be used to enforce the Business Email Compromise configuration to prevent user impersonation. -## 1. Create a service account in Google for Email Security Directory Integration +## 1. Create a service account in Google for Email security Directory Integration -You need to authorize Email Security to make connections into your Google tenant to retrieve your directory details. Cloudflare recommends that you create a service account for this purpose. This account will require the following following privileges: +You need to authorize Email security to make connections into your Google tenant to retrieve your directory details. Cloudflare recommends that you create a service account for this purpose. This account will require the following following privileges: - View group subscriptions on your domain. - View organization units on your domain. @@ -45,13 +45,13 @@ Start by creating a service account. If you already have one, you can skip this 6. Review your information and select **Create Role**. -## 2. Authorize Email Security for Directory Access with Google +## 2. Authorize Email security for Directory Access with Google -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). 2. Go to **Directories**, and select **Add Directory** to start the authorization process. - ![Go to Directories in the dashboard of Email Security, and then select Add Directory to start the authorization process](~/assets/images/email-security/bec/gmail/step2-directories.png) + ![Go to Directories in the dashboard of Email security, and then select Add Directory to start the authorization process](~/assets/images/email-security/bec/gmail/step2-directories.png) 3. In the Add Directory configuration panel, enter the following details: - **Directory Type**: Open the drop-down menu and select **Google**. @@ -60,7 +60,7 @@ Start by creating a service account. If you already have one, you can skip this Select **Authorize** when you are done. -4. The Email Security dashboard will redirect you to a Google login page. Select or enter the appropriate account to initiate the authentication process. +4. The Email security dashboard will redirect you to a Google login page. Select or enter the appropriate account to initiate the authentication process. 5. Once authenticated, the system will show a dialog box with a list of the required permissions. Check all the checkboxes, and select **Continue** to authorize the change. diff --git a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/index.mdx b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/index.mdx index 03950ccdfa2baee..881ddf71b27fe48 100644 --- a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/index.mdx +++ b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/index.mdx @@ -3,12 +3,11 @@ title: Business email compromise (BEC) pcx_content_type: concept sidebar: order: 1 - --- Attackers often try to impersonate executives within an organization when sending malicious emails (with requests about banking information, trade secrets, etc.). -The **Business email compromise (BEC)** feature protects against these attacks by adding [an attribute](/email-security/reference/dispositions-and-attributes/#attributes) to any spoofed email messages matching these sensitive email addresses. Information about key users you enter in the dashboard is used by Email Security to run enhanced scan techniques and find these spoofed emails. +The **Business email compromise (BEC)** feature protects against these attacks by adding [an attribute](/email-security/reference/dispositions-and-attributes/#attributes) to any spoofed email messages matching these sensitive email addresses. Information about key users you enter in the dashboard is used by Email security to run enhanced scan techniques and find these spoofed emails. ## Setup @@ -18,7 +17,7 @@ You have several options for adding email addresses to BEC protection. Using the dashboard, you can add email addresses individually or upload a CSV file: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. On **Email Configuration**, go to **Enhanced Detections**. 4. Select **New Display Name**. @@ -38,8 +37,8 @@ Phish Ee, phishee@nophish.com ### Integrating a directory -If you want your BEC contacts automatically synced, Email Security also supports directory integration for Microsoft and Gmail. Refer to [Office 365 directory guide](/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide/) and [Google Workspaces directory integration](/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide/) for more information. +If you want your BEC contacts automatically synced, Email security also supports directory integration for Microsoft and Gmail. Refer to [Office 365 directory guide](/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide/) and [Google Workspaces directory integration](/email-security/email-configuration/enhanced-detections/business-email-compromise/gworkspaces-directory-guide/) for more information. ### Review threats -Email Security's dashboard has at-a-glance insights regarding BEC attacks, such as top email addresses targeted. Refer to [Statistics overview](/email-security/reporting/statistics-overview/) and [Types of malicious detections](/email-security/reporting/types-malicious-detections/) for more information. +Email security's dashboard has at-a-glance insights regarding BEC attacks, such as top email addresses targeted. Refer to [Statistics overview](/email-security/reporting/statistics-overview/) and [Types of malicious detections](/email-security/reporting/types-malicious-detections/) for more information. diff --git a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide.mdx b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide.mdx index 4cdf18b56cc67ac..f05cc88dd3f00d8 100644 --- a/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide.mdx +++ b/src/content/docs/email-security/email-configuration/enhanced-detections/business-email-compromise/o365-directory-guide.mdx @@ -7,25 +7,25 @@ sidebar: import { Render } from "~/components"; -Email Security (formerly Area 1) can integrate with Office 365 to retrieve user and group information. This can be used to enforce the Business Email Compromise configuration to prevent user impersonation. +Email security (formerly Area 1) can integrate with Office 365 to retrieve user and group information. This can be used to enforce the Business Email Compromise configuration to prevent user impersonation. -## 1. Authorize Email Security with Office 365 for Directory Access +## 1. Authorize Email security with Office 365 for Directory Access -You need to authorize Email Security to make connections into your [Office 365 tenant](https://learn.microsoft.com/en-us/microsoft-365/solutions/tenant-management-overview) to retrieve your directory details. The account used to authorize will require the **Privileged authentication admin** and **Privileged role admin** roles. +You need to authorize Email security to make connections into your [Office 365 tenant](https://learn.microsoft.com/en-us/microsoft-365/solutions/tenant-management-overview) to retrieve your directory details. The account used to authorize will require the **Privileged authentication admin** and **Privileged role admin** roles. ### How does the authorization work? -The authorization process grants Email Security access to the Azure environment with the least applicable privileges required to function. The Enterprise Application that Email Security registers is not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to the application in the Enterprise Application section. +The authorization process grants Email security access to the Azure environment with the least applicable privileges required to function. The Enterprise Application that Email security registers is not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to the application in the Enterprise Application section. When assigning user roles in the Office 365 console, you will find these roles in **User permissions** > **Roles configuration** > **Identity admin roles**. -![A list of permissions for Email Security](~/assets/images/email-security/bec/o365/permissions.png) +![A list of permissions for Email security](~/assets/images/email-security/bec/o365/permissions.png) -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). 2. Go to **Directories**, and select **Add Directory** to start the authorization process. - ![Go to Directories in the dashboard of Email Security, and then select Add Directory to start the authorization process](~/assets/images/email-security/bec/o365/step2-directories.png) + ![Go to Directories in the dashboard of Email security, and then select Add Directory to start the authorization process](~/assets/images/email-security/bec/o365/step2-directories.png) 3. In the Add Directory configuration panel, enter the following details: - **Directory Type**: Open the drop-down menu and select **Office 365**. @@ -36,7 +36,7 @@ When assigning user roles in the Office 365 console, you will find these roles i ![Add the appropriate details to the configuration panel](~/assets/images/email-security/bec/o365/step3-directory-config-panel.png) -4. The Email Security dashboard will redirect you to a Microsoft login page. Select or enter the appropriate account to initiate the authentication process. +4. The Email security dashboard will redirect you to a Microsoft login page. Select or enter the appropriate account to initiate the authentication process.
diff --git a/src/content/docs/email-security/email-configuration/index.mdx b/src/content/docs/email-security/email-configuration/index.mdx index d0bc6344222f39b..bb403184286361f 100644 --- a/src/content/docs/email-security/email-configuration/index.mdx +++ b/src/content/docs/email-security/email-configuration/index.mdx @@ -11,6 +11,6 @@ import { DirectoryListing, Render } from "~/components"; -Once you have [set up Email Security](/email-security/deployment/), you have several options to customize and fine-tune email behavior. +Once you have [set up Email security](/email-security/deployment/), you have several options to customize and fine-tune email behavior. diff --git a/src/content/docs/email-security/email-configuration/lists/allowed-patterns.mdx b/src/content/docs/email-security/email-configuration/lists/allowed-patterns.mdx index d622b7c9272ac4d..bb9623fde18b9ff 100644 --- a/src/content/docs/email-security/email-configuration/lists/allowed-patterns.mdx +++ b/src/content/docs/email-security/email-configuration/lists/allowed-patterns.mdx @@ -3,18 +3,17 @@ title: Allowed patterns pcx_content_type: concept sidebar: order: 1 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When you set up **allowed patterns**, Email Security email security exempts messages that match certain patterns from normal detection scanning. +When you set up **allowed patterns**, Email security email security exempts messages that match certain patterns from normal detection scanning. ## Add an allowed pattern To create a new allowed pattern: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -23,22 +22,19 @@ To create a new allowed pattern: 4. Select **+ New Pattern**. 5. Enter the pattern information: + - **Allowed Pattern**: Enter one of the following types of pattern: + - **Email addresses**: Must be a valid email. + - **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. + - **Regular expressions**: Must be [valid Java expressions](https://www.freeformatter.com/java-regex-tester.html). - * **Allowed Pattern**: Enter one of the following types of pattern: - - * **Email addresses**: Must be a valid email. - * **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. - * **Regular expressions**: Must be [valid Java expressions](https://www.freeformatter.com/java-regex-tester.html). - - * **Allow Type**: Choose one or more of the following types: - - * **Trusted Sender**: Messages will bypass all [detections](/email-security/reference/dispositions-and-attributes/) and link following by Email Security. Typically, only applies to phishing simulations from vendors such as KnowBe4. - * **Exempt Recipient**: Will exempt messages from all Email Security [detections](/email-security/reference/dispositions-and-attributes/) intended for recipients matching this pattern (email address or regular expression only). Typically, this only applies to submission mailboxes for user reporting to security. - * **Acceptable Sender**: Will exempt messages from the `SPAM`, `SPOOF`, and `BULK` [dispositions](/email-security/reference/dispositions-and-attributes/#available-values) (but not `MALICIOUS` or `SUSPICIOUS`). Commonly used for external domains and sources that send mail on behalf of your organization, such as marketing emails or internal tools. + - **Allow Type**: Choose one or more of the following types: + - **Trusted Sender**: Messages will bypass all [detections](/email-security/reference/dispositions-and-attributes/) and link following by Email security. Typically, only applies to phishing simulations from vendors such as KnowBe4. + - **Exempt Recipient**: Will exempt messages from all Email security [detections](/email-security/reference/dispositions-and-attributes/) intended for recipients matching this pattern (email address or regular expression only). Typically, this only applies to submission mailboxes for user reporting to security. + - **Acceptable Sender**: Will exempt messages from the `SPAM`, `SPOOF`, and `BULK` [dispositions](/email-security/reference/dispositions-and-attributes/#available-values) (but not `MALICIOUS` or `SUSPICIOUS`). Commonly used for external domains and sources that send mail on behalf of your organization, such as marketing emails or internal tools. - * **Notes**: Provide additional notes about the allowed pattern. + - **Notes**: Provide additional notes about the allowed pattern. -6. If you chose *Trusted Sender* or *Acceptable Sender* in the previous step, you will be able to choose whether to verify the sender. When the **Verify Sender** option is selected, the allow list entry will only be honored if it aligns with a passing authentication by DMARC or SPF or DKIM. +6. If you chose _Trusted Sender_ or _Acceptable Sender_ in the previous step, you will be able to choose whether to verify the sender. When the **Verify Sender** option is selected, the allow list entry will only be honored if it aligns with a passing authentication by DMARC or SPF or DKIM. 7. Select **Save**. diff --git a/src/content/docs/email-security/email-configuration/lists/block-list.mdx b/src/content/docs/email-security/email-configuration/lists/block-list.mdx index dd5c3b3251ab2dd..27e165ceb4aa537 100644 --- a/src/content/docs/email-security/email-configuration/lists/block-list.mdx +++ b/src/content/docs/email-security/email-configuration/lists/block-list.mdx @@ -3,18 +3,17 @@ title: Block lists pcx_content_type: concept sidebar: order: 3 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When you add **blocked senders**, Email Security automatically marks all messages from these senders with a `MALICIOUS` disposition. +When you add **blocked senders**, Email security automatically marks all messages from these senders with a `MALICIOUS` disposition. ## Add a blocked sender To create a new blocked pattern: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -23,14 +22,12 @@ To create a new blocked pattern: 4. Select **+ New Sender**. 5. Enter the pattern information: + - **Sender**: Enter one of the following types of pattern: + - **Email addresses**: Must be a valid email. + - **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. + - **Regular expressions**: Must be [valid Java expressions](https://www.freeformatter.com/java-regex-tester.html). Regular expressions are matched with fields related to the sender email address (`envelope from`, `header from`, `reply-to`), the originating IP address, and the server name for the email. - * **Sender**: Enter one of the following types of pattern: - - * **Email addresses**: Must be a valid email. - * **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. - * **Regular expressions**: Must be [valid Java expressions](https://www.freeformatter.com/java-regex-tester.html). Regular expressions are matched with fields related to the sender email address (`envelope from`, `header from`, `reply-to`), the originating IP address, and the server name for the email. - - * **Notes**: Provide additional notes about the blocked sender pattern. + - **Notes**: Provide additional notes about the blocked sender pattern. 6. Select **Save**. diff --git a/src/content/docs/email-security/email-configuration/lists/trusted-domains.mdx b/src/content/docs/email-security/email-configuration/lists/trusted-domains.mdx index 1643c231f9059a8..b799936acf2de6f 100644 --- a/src/content/docs/email-security/email-configuration/lists/trusted-domains.mdx +++ b/src/content/docs/email-security/email-configuration/lists/trusted-domains.mdx @@ -3,17 +3,16 @@ title: Trusted domains pcx_content_type: concept sidebar: order: 2 - --- -**Trusted domains** allows you to identify domains that should be exempted from Email Security (formerly Area 1) detections. +**Trusted domains** allows you to identify domains that should be exempted from Email security (formerly Area 1) detections. ## Default behavior -When messages come to your recipients from certain domains, Email Security triggers certain [detections](/email-security/reference/dispositions-and-attributes/) by default: +When messages come to your recipients from certain domains, Email security triggers certain [detections](/email-security/reference/dispositions-and-attributes/) by default: -* **Proximity Domains**: Domains with similar spelling to your existing domain. Will trigger a `SPOOF` detection. -* **Recent Domains**: Domains created recently (exact definition set in [Added Detections](/email-security/email-configuration/enhanced-detections/added-detections/)). Will trigger a `MALICIOUS` or `SUSPICIOUS` detection. +- **Proximity Domains**: Domains with similar spelling to your existing domain. Will trigger a `SPOOF` detection. +- **Recent Domains**: Domains created recently (exact definition set in [Added Detections](/email-security/email-configuration/enhanced-detections/added-detections/)). Will trigger a `MALICIOUS` or `SUSPICIOUS` detection. However, sometimes those domains are legitimate. For example, your company may have registered several lookalike domains to combat domain squatters. @@ -23,7 +22,7 @@ To exempt specific domains from these detections, you can add trusted domains. To add a trusted domain: -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). @@ -32,9 +31,8 @@ To add a trusted domain: 4. Select **+ Add Domain**. 5. The exact flow varies based on what you select for your **Pattern Type**: - - * **Domain**: Allows you to specify a particular domain and then adjust triggers for *Proximity Domain* and *Recent Domain*. - * **Create Regex**: Allows you to create Regex rules for the domain name, top-level domain (TLDs), and subdomains and then adjust triggers for *Proximity Domain* and *Recent Domain*. + - **Domain**: Allows you to specify a particular domain and then adjust triggers for _Proximity Domain_ and _Recent Domain_. + - **Create Regex**: Allows you to create Regex rules for the domain name, top-level domain (TLDs), and subdomains and then adjust triggers for _Proximity Domain_ and _Recent Domain_. 6. Select **Save**. diff --git a/src/content/docs/email-security/email-configuration/phish-submissions/index.mdx b/src/content/docs/email-security/email-configuration/phish-submissions/index.mdx index 0577337fecab1c3..fb0dc8f0c63c472 100644 --- a/src/content/docs/email-security/email-configuration/phish-submissions/index.mdx +++ b/src/content/docs/email-security/email-configuration/phish-submissions/index.mdx @@ -3,16 +3,15 @@ title: Phish submissions pcx_content_type: concept sidebar: order: 6 - --- -import { DirectoryListing, GlossaryTooltip, Render } from "~/components" +import { DirectoryListing, GlossaryTooltip, Render } from "~/components"; -As part of your continuous email security posture, administrators and security analysts need to submit missed phish samples to [Email Security (formerly Area 1) Service Addresses](https://horizon.area1security.com/support/service-addresses/) so Cloudflare can process them and take necessary action. +As part of your continuous email security posture, administrators and security analysts need to submit missed phish samples to [Email security (formerly Area 1) Service Addresses](https://horizon.area1security.com/support/service-addresses/) so Cloudflare can process them and take necessary action. -Sometimes phish is missed as Email Security uses several techniques to make a detection. These include preemptively crawling the web to identify campaigns, machine learning, custom signatures, among others. In order for Email Security to identify why phish was missed, we need to run the original samples through our module and identify why some of our modules did not score the sample high enough to elevate it to malicious. +Sometimes phish is missed as Email security uses several techniques to make a detection. These include preemptively crawling the web to identify campaigns, machine learning, custom signatures, among others. In order for Email security to identify why phish was missed, we need to run the original samples through our module and identify why some of our modules did not score the sample high enough to elevate it to malicious. Submitting missed phish samples to Cloudflare is of paramount importance and necessary for continuous protection. Submitting missed phish samples helps Cloudflare improve our machine learning (ML) models, and alerts us of new attack vectors before they become prevalent. @@ -20,37 +19,37 @@ Submitting missed phish samples to Cloudflare is of paramount importance and nec There are two different ways to submit a phish sample: -* **User submission**: Submitted directly by the end users, and used with phish submission buttons.
+- **User submission**: Submitted directly by the end users, and used with phish submission buttons.
To learn more about user-submitted phish, refer to the following documentation: -* **Team submission**: To be used when IT administrators or security teams submit to Email Security. Submit original phish samples as an attachment in EML format to the appropriate [Team Submissions address](https://horizon.area1security.com/support/service-addresses/). For example, if you think an email should be marked as spoof, send it to the `SPOOF` address listed in Team Submissions.
+- **Team submission**: To be used when IT administrators or security teams submit to Email security. Submit original phish samples as an attachment in EML format to the appropriate [Team Submissions address](https://horizon.area1security.com/support/service-addresses/). For example, if you think an email should be marked as spoof, send it to the `SPOOF` address listed in Team Submissions.
Phish samples submitted to this address will be considered as submissions from the customer's email security team. This increases the chances of similar samples being detected as malicious in the future. After submitting a phish sample to the team address, you will receive an update from `status@submission.area1reports.com` regarding the investigation and the verdict. The feedback is directly provided to customers by our threat research team, bypassing the support channel, to expedite the process. ## What happens after a phish submission -After you or your users submit a phish sample, Email Security adds that sample directly into our machine learning (ML) queue for learning. Some samples will be directly converted to `MALICIOUS` upon going through machine learning and the rest will be further processed by our ML module. +After you or your users submit a phish sample, Email security adds that sample directly into our machine learning (ML) queue for learning. Some samples will be directly converted to `MALICIOUS` upon going through machine learning and the rest will be further processed by our ML module. ### Phish submission feedback -Use the following keywords to search for submitted phish samples on the Email Security dashboard: +Use the following keywords to search for submitted phish samples on the Email security dashboard: -* `phish_submission` -* `user_malicious_submission` -* `team_malicious_submission` +- `phish_submission` +- `user_malicious_submission` +- `team_malicious_submission` On the **Reasons** column you will see the feedback regarding the messages found. If the ML module learns and detects it as phish, the **Reasons** column shows the details regarding it. If not, the information on this column shows up as `phish submission`. -If there is a phishing email that is repeatedly sent to users despite being submitted to Email Security for processing, [contact support](/support/contacting-cloudflare-support/) with the details of the problematic phish submission sample (alert ID or message ID of the sample). +If there is a phishing email that is repeatedly sent to users despite being submitted to Email security for processing, [contact support](/support/contacting-cloudflare-support/) with the details of the problematic phish submission sample (alert ID or message ID of the sample). ### Phish Submission Response (beta) -Phish Submission Response (PSR) is an additional layer of protection. When you enable PSR, Email Security will automatically retract messages reported by users which are also deemed malicious by Email Security after analysis. This feature uses machine learning margin scores by adding the user as an additional neuron into Email Security's neural network. +Phish Submission Response (PSR) is an additional layer of protection. When you enable PSR, Email security will automatically retract messages reported by users which are also deemed malicious by Email security after analysis. This feature uses machine learning margin scores by adding the user as an additional neuron into Email security's neural network. To enable PSR: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. In **Email Configuration**, go to **Retract Settings** > **Auto-Retract**. 4. Enable **Phish Submission Response (Beta)**. @@ -62,21 +61,21 @@ PSR works only for the phish samples submitted to [user submission addresses](ht ## False positives -If you find emails in your Email Security account that are actually false positives, you can report them from the Email Security dashboard: +If you find emails in your Email security account that are actually false positives, you can report them from the Email security dashboard: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Select the **Search** bar. 3. Search for one or more messages that you want to report as a false positive, and select **Report as false positive**. -4. In the next screen, choose a disposition from the list to clarify the nature of the false positive. The options are *Bulk*, *Malicious*, *None*, *Spam*, *Spoof* and *Suspicious*. +4. In the next screen, choose a disposition from the list to clarify the nature of the false positive. The options are _Bulk_, _Malicious_, _None_, _Spam_, _Spoof_ and _Suspicious_. 5. Select **Report False Positive**. ## False negatives -[Email Security administrators](/email-security/account-setup/permissions/) can also submit false negatives directly from the dashboard: +[Email security administrators](/email-security/account-setup/permissions/) can also submit false negatives directly from the dashboard: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Select the **Search** bar. 3. Search for one or more messages that you want to report as a false negative, and select **Report as False Negative**. ![The link to submit false negatives, in the search results](~/assets/images/email-security/phish-submissions/false-negative.png) -4. In the next screen, choose a disposition from the list to clarify the nature of the false negative. The options are *Bulk*, *Malicious*, *Spam*, *Suspicious* and *Spoof*. +4. In the next screen, choose a disposition from the list to clarify the nature of the false negative. The options are _Bulk_, _Malicious_, _Spam_, _Suspicious_ and _Spoof_. 5. Select **Report False Negative**. diff --git a/src/content/docs/email-security/email-configuration/phish-submissions/knowbe4.mdx b/src/content/docs/email-security/email-configuration/phish-submissions/knowbe4.mdx index 84a58b08e5bf95a..8d350db3103a01b 100644 --- a/src/content/docs/email-security/email-configuration/phish-submissions/knowbe4.mdx +++ b/src/content/docs/email-security/email-configuration/phish-submissions/knowbe4.mdx @@ -8,7 +8,7 @@ head: import { Render } from "~/components"; -If you have KnowBe4 Phish Alert Button (PAB) for Microsoft Outlook, Microsoft Exchange, Microsoft 365, and Google Workspace follow the steps below to set it up with Email Security and report suspicious emails. +If you have KnowBe4 Phish Alert Button (PAB) for Microsoft Outlook, Microsoft Exchange, Microsoft 365, and Google Workspace follow the steps below to set it up with Email security and report suspicious emails. 1. Log in to your KnowBe4 console. 2. Select the **cog symbol** to go to your **Account Settings** screen. @@ -18,7 +18,7 @@ If you have KnowBe4 Phish Alert Button (PAB) for Microsoft Outlook, Microsoft Ex 6. If you do want to differentiate between spam and malicious emails, go to **Comments and Disposition Settings**. 7. Select **Allow users to leave comments and disposition**. 8. Select **Disable Unknown Email Disposition**. -9. In **Send Dispositioned Emails to**, you need to enter the email addresses to forward spam and malicious emails. You can find these addresses in your **Email Security dashboard** > **Support** > [**Service Addresses**](https://horizon.area1security.com/support/service-addresses): +9. In **Send Dispositioned Emails to**, you need to enter the email addresses to forward spam and malicious emails. You can find these addresses in your **Email security dashboard** > **Support** > [**Service Addresses**](https://horizon.area1security.com/support/service-addresses): 1. **Phishing/Suspicious**: Enter your malicious email address. For example, `+user+malicious@submission.area1reports.com`. 2. **Spam/Junk**: Enter your spam email address. For example, `+user+spam@submission.area1reports.com`. 10. Select **Save changes**. diff --git a/src/content/docs/email-security/email-configuration/phish-submissions/microsoft-report-message.mdx b/src/content/docs/email-security/email-configuration/phish-submissions/microsoft-report-message.mdx index 07d8610bd2e0884..861b3391476583a 100644 --- a/src/content/docs/email-security/email-configuration/phish-submissions/microsoft-report-message.mdx +++ b/src/content/docs/email-security/email-configuration/phish-submissions/microsoft-report-message.mdx @@ -1,11 +1,10 @@ --- title: Microsoft Report Message (not compatible) pcx_content_type: concept - --- -Due to changes in the flow of submission messages, Microsoft no longer honors mail flow rules for the Microsoft Report Message button. Therefore, Email Security is not compatible with this tool anymore. +Due to changes in the flow of submission messages, Microsoft no longer honors mail flow rules for the Microsoft Report Message button. Therefore, Email security is not compatible with this tool anymore. To learn more about what is happening, log in to your Microsoft account as an administrator, and [review the communication from Microsoft](https://admin.microsoft.com/AdminPortal/Home?ref=MessageCenter/:/messages/MC690173). -If you need to submit phish samples or missed phish to Email Security, we recommend using the [PhishNet for Office 365](/email-security/email-configuration/phish-submissions/phishnet-o365/) integrated app instead. +If you need to submit phish samples or missed phish to Email security, we recommend using the [PhishNet for Office 365](/email-security/email-configuration/phish-submissions/phishnet-o365/) integrated app instead. diff --git a/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-gworkspace.mdx b/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-gworkspace.mdx index 35beae0bb4e1cdc..f92c5c85d970187 100644 --- a/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-gworkspace.mdx +++ b/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-gworkspace.mdx @@ -1,12 +1,11 @@ --- title: PhishNet for Google Workspace pcx_content_type: how-to - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -PhishNet is an add-in button that helps users to submit directly to Email Security (formerly Area 1) phish samples missed by Area 1’s detection. PhishNet avoids the previous process, where users had to report phish to their email admins, which then had to manually download and forward the sample to Email Security. +PhishNet is an add-in button that helps users to submit directly to Email security (formerly Area 1) phish samples missed by Area 1’s detection. PhishNet avoids the previous process, where users had to report phish to their email admins, which then had to manually download and forward the sample to Email security. ## Prerequisites @@ -64,7 +63,7 @@ Cloudflare PhishNet is now installed.
-4. Under **Select Submission Type**, select the type of your submission — *Spam* or *Phish*. +4. Under **Select Submission Type**, select the type of your submission — _Spam_ or _Phish_.
@@ -74,4 +73,4 @@ Cloudflare PhishNet is now installed. 5. Select **Submit Report**. -PhishNet will show you a **Submission Complete** message once the email has been successfully submitted to Email Security (formerly Area 1) for review. +PhishNet will show you a **Submission Complete** message once the email has been successfully submitted to Email security (formerly Area 1) for review. diff --git a/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-o365.mdx b/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-o365.mdx index 067eb8e73b21fbe..ade4517a9d90c23 100644 --- a/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-o365.mdx +++ b/src/content/docs/email-security/email-configuration/phish-submissions/phishnet-o365.mdx @@ -1,19 +1,18 @@ --- title: PhishNet for Office 365 pcx_content_type: how-to - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -PhishNet is an add-in button that helps users to submit directly to Email Security (formerly Area 1) phish samples missed by Email Security detection. PhishNet avoids the previous process, where users had to report phish to their email admins, which then had to manually download and forward the sample to Email Security. +PhishNet is an add-in button that helps users to submit directly to Email security (formerly Area 1) phish samples missed by Email security detection. PhishNet avoids the previous process, where users had to report phish to their email admins, which then had to manually download and forward the sample to Email security. ## Prerequisites To set up PhishNet with Office 365, you will need: -* An Email Security account with admin access. -* Admin access to Microsoft.com. +- An Email security account with admin access. +- Admin access to Microsoft.com. :::note @@ -34,7 +33,7 @@ Only admin users can deploy PhishNet for all users in Office 365. Non-admin user ![Select upload custom apps](~/assets/images/email-security/phish-submissions/phishnet-o365/step4-custom-apps.png) -5. On a new browser tab, [log in to Email Security (formerly Area 1)](https://horizon.area1security.com) with an admin account. +5. On a new browser tab, [log in to Email security (formerly Area 1)](https://horizon.area1security.com) with an admin account. 6. Select **Settings** (gear icon). @@ -48,15 +47,15 @@ Only admin users can deploy PhishNet for all users in Office 365. Non-admin user 9. Go back to the Microsoft admin browser tab. -10. From **Upload Apps to deploy**, select **Provide link to manifest file**, and paste the URL you copied from your Email Security dashboard. +10. From **Upload Apps to deploy**, select **Provide link to manifest file**, and paste the URL you copied from your Email security dashboard. - ![Paste the URL you have copied from Email Security.](~/assets/images/email-security/phish-submissions/phishnet-o365/step10-upload-apps.png) + ![Paste the URL you have copied from Email security.](~/assets/images/email-security/phish-submissions/phishnet-o365/step10-upload-apps.png) 11. Select **Validate**. Wait for a success message to appear below the input. Then, select **Next**. 12. Under **Assign users**, select **Entire Organization**, and then select **Next**. - ![Paste the URL you have copied from Email Security.](~/assets/images/email-security/phish-submissions/phishnet-o365/step12.png) + ![Paste the URL you have copied from Email security.](~/assets/images/email-security/phish-submissions/phishnet-o365/step12.png) 13. In **App Permissions and Capabilities**, make sure PhishNet has the correct permissions: `Outlook: ReadWriteMailbox, SendReceiveData`. Then, select **Next**. @@ -89,4 +88,4 @@ If you cannot find the PhishNet icon, select the **More actions** menu (the thre 4. Select **Submit Report**. -Once the email has been successfully submitted to Email Security for review, PhishNet will show you a **Submission Complete** message. +Once the email has been successfully submitted to Email security for review, PhishNet will show you a **Submission Complete** message. diff --git a/src/content/docs/email-security/email-configuration/retract-settings/index.mdx b/src/content/docs/email-security/email-configuration/retract-settings/index.mdx index 1d089cdbaa8db78..75c5e5ccab3303c 100644 --- a/src/content/docs/email-security/email-configuration/retract-settings/index.mdx +++ b/src/content/docs/email-security/email-configuration/retract-settings/index.mdx @@ -3,32 +3,31 @@ title: Retract settings pcx_content_type: how-to sidebar: order: 5 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When you are using an [API setup](/email-security/deployment/api/) for Email Security, you cannot prevent mail from reaching a recipient's mailbox. +When you are using an [API setup](/email-security/deployment/api/) for Email security, you cannot prevent mail from reaching a recipient's mailbox. However — so long as you also have [journaling](/email-security/deployment/api/setup/#journaling-setup), [BCC](/email-security/deployment/api/setup/#bcc-setup) or [MS Graph](/email-security/deployment/api/setup/office365-graph-api/) configured — you can set up message retraction to take post-delivery actions against suspicious messages. These retractions happen through API integrations with Microsoft 365 and Google Workspaces (Gmail). ## Retraction options -Once you set up retraction, you can retract messages manually or set up automatic retractions to move messages matching certain dispositions to specific folders within a user’s mailbox. You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email Security. Scanned emails that were previously delivered and now match this new phishing information will be retracted. +Once you set up retraction, you can retract messages manually or set up automatic retractions to move messages matching certain dispositions to specific folders within a user’s mailbox. You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email security. Scanned emails that were previously delivered and now match this new phishing information will be retracted. Refer to [Gmail](/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction/) and [Office 365](/email-security/email-configuration/retract-settings/office365-retraction/) guides for detailed information regarding these options. ## Retraction metrics -Setting up retraction also gives you access to metrics for this feature. After logging in to your [Email Security dashboard](https://horizon.area1security.com), search for the **Retractions** card. Metrics for retractions include information such as: +Setting up retraction also gives you access to metrics for this feature. After logging in to your [Email security dashboard](https://horizon.area1security.com), search for the **Retractions** card. Metrics for retractions include information such as: -* **Total retractions**: Displays the total amount of retractions performed. -* **Success**: Shows the percentage of messages Email Security was able to find and retract successfully. -* **Fail**: Displays the percentage of messages Email Security was not successfully able to retract. Reasons for failure include: - * The user has already deleted or marked the message as junk, either manually or via a mailbox filter. - * The specific copy of the message being retracted was sent to a distribution list address that may not exist as a mailbox, and so the retraction will fail. Separate copies of the message that are sent to each member of that distribution list will be retracted. - * The retraction is not, or is no longer, authorized. -* **Unread/Read**: Refers to the state of the message at the time it was retracted. For automated retractions, Email Security tries to perform retraction as quickly as possible so the user has no time to see or open the message. Manual retraction might happen at a later time, and so the messages are more likely to have already been read. -* **Auto/Manual**: Refers to the percentage of messages retracted through the automatic/manual modes. +- **Total retractions**: Displays the total amount of retractions performed. +- **Success**: Shows the percentage of messages Email security was able to find and retract successfully. +- **Fail**: Displays the percentage of messages Email security was not successfully able to retract. Reasons for failure include: + - The user has already deleted or marked the message as junk, either manually or via a mailbox filter. + - The specific copy of the message being retracted was sent to a distribution list address that may not exist as a mailbox, and so the retraction will fail. Separate copies of the message that are sent to each member of that distribution list will be retracted. + - The retraction is not, or is no longer, authorized. +- **Unread/Read**: Refers to the state of the message at the time it was retracted. For automated retractions, Email security tries to perform retraction as quickly as possible so the user has no time to see or open the message. Manual retraction might happen at a later time, and so the messages are more likely to have already been read. +- **Auto/Manual**: Refers to the percentage of messages retracted through the automatic/manual modes. Selecting **View details** will perform a search for retracted emails for the selected time interval. diff --git a/src/content/docs/email-security/email-configuration/retract-settings/office365-retraction.mdx b/src/content/docs/email-security/email-configuration/retract-settings/office365-retraction.mdx index fa2e72392480f2c..b2644fd03f67e2b 100644 --- a/src/content/docs/email-security/email-configuration/retract-settings/office365-retraction.mdx +++ b/src/content/docs/email-security/email-configuration/retract-settings/office365-retraction.mdx @@ -14,41 +14,41 @@ import { Render } from "~/components"; In this tutorial you will learn how to set up email retraction for Microsoft Office 365. -## 1. Authorize Email Security with Office 365 for retraction +## 1. Authorize Email security with Office 365 for retraction -For message retraction to successfully execute, Email Security needs to be authorized to make API calls into the Office 365 Graph API architecture. The account used to authorize Email Security requires the **Privileged role admin** role. +For message retraction to successfully execute, Email security needs to be authorized to make API calls into the Office 365 Graph API architecture. The account used to authorize Email security requires the **Privileged role admin** role. When assigning user roles in the Office 365 console, you will find these roles in **User permissions** > **Roles configuration** > **Identity admin roles**. ### How does the authorization work? -The authorization process grants Email Security access to the Azure environment with the least applicable privileges required to function. The Enterprise Application that Email Security registers (the Email Security Synchronator) is not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to the application in the Enterprise Application section. +The authorization process grants Email security access to the Azure environment with the least applicable privileges required to function. The Enterprise Application that Email security registers (the Email security Synchronator) is not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to the application in the Enterprise Application section. -![Permissions required for Email Security to access Office 365](~/assets/images/email-security/email-retraction/o365/area1-synchronator.png) +![Permissions required for Email security to access Office 365](~/assets/images/email-security/email-retraction/o365/area1-synchronator.png) -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/), and select **Settings** (the gear icon). 2. Go to **Email Configuration** > **RETRACT SETTINGS**. - ![Access the retract settings in Email Security](~/assets/images/email-security/email-retraction/o365/step2-retract-settings.png) + ![Access the retract settings in Email security](~/assets/images/email-security/email-retraction/o365/step2-retract-settings.png) :::note If you do not see the Retract Settings option, [contact customer support](/support/contacting-cloudflare-support/) to enable the feature. ::: -1. You need to authorize Email Security to execute retractions through the Graph API of Office 365. Make sure that the account that you will be using to authenticate has the appropriate administrative roles assigned. Select **Authorize** to start the process. +1. You need to authorize Email security to execute retractions through the Graph API of Office 365. Make sure that the account that you will be using to authenticate has the appropriate administrative roles assigned. Select **Authorize** to start the process. - ![Select Authorize to start the process of authorizing Email Security to access Office 365](~/assets/images/email-security/email-retraction/o365/step3-authorize-o365.png) + ![Select Authorize to start the process of authorizing Email security to access Office 365](~/assets/images/email-security/email-retraction/o365/step3-authorize-o365.png) -2. The Email Security dashboard will redirect you to a Microsoft login page. Select or enter the appropriate account to initiate the authentication process. +2. The Email security dashboard will redirect you to a Microsoft login page. Select or enter the appropriate account to initiate the authentication process. - ![Select an account or enter a new account to authorize Email Security](~/assets/images/email-security/email-retraction/o365/step4-authorize-login.png) + ![Select an account or enter a new account to authorize Email security](~/assets/images/email-security/email-retraction/o365/step4-authorize-login.png) 3. Once authenticated, the system will show a dialog box with a list of the requested permissions. Select **Accept** to authorize the change. - ![Select Accept to authorize Email Security in Office 365](~/assets/images/email-security/email-retraction/o365/step5-authorize.png) + ![Select Accept to authorize Email security in Office 365](~/assets/images/email-security/email-retraction/o365/step5-authorize.png) -4. Upon authorization, you will be automatically redirected to the Email Security dashboard, with a notification that the authorization completed successfully. Select **Dismiss** to clear the notification. +4. Upon authorization, you will be automatically redirected to the Email security dashboard, with a notification that the authorization completed successfully. Select **Dismiss** to clear the notification. ![Select Dismiss to dismiss the success notification](~/assets/images/email-security/email-retraction/o365/step6-dismiss.png) diff --git a/src/content/docs/email-security/glossary.mdx b/src/content/docs/email-security/glossary.mdx index 98bffcec78b5866..f4366823adedfa0 100644 --- a/src/content/docs/email-security/glossary.mdx +++ b/src/content/docs/email-security/glossary.mdx @@ -1,11 +1,10 @@ --- title: Glossary pcx_content_type: glossary - --- -import { Glossary } from "~/components" +import { Glossary } from "~/components"; -Review the definitions for terms used across Email Security (formerly Area 1) documentation. +Review the definitions for terms used across Email security (formerly Area 1) documentation. diff --git a/src/content/docs/email-security/index.mdx b/src/content/docs/email-security/index.mdx index c223a5aa6d16b1e..024aefa1ad29e65 100644 --- a/src/content/docs/email-security/index.mdx +++ b/src/content/docs/email-security/index.mdx @@ -18,7 +18,7 @@ import { -Stop phishing attacks with Email Security (formerly Area 1) cloud-native email security service. +Stop phishing attacks with Email security (formerly Area 1) cloud-native email security service. @@ -26,7 +26,7 @@ Stop phishing attacks with Em :::note[Area 1 has been renamed] -Area 1 is now **Email Security (formerly Area 1)**. Customers who purchased the new Email Security can access the documentation by going to Cloudflare Zero Trust > [Email Security](/cloudflare-one/email-security/). +Area 1 is now **Email security (formerly Area 1)**. Customers who purchased the new Email security can access the documentation by going to Cloudflare Zero Trust > [Email security](/cloudflare-one/email-security/). ::: @@ -43,14 +43,14 @@ Area 1 is now **Email Security (formerly Area 1)**. Customers who purchased the href="/email-security/deployment/" cta="Evaluate deployment options" > - Email Security (formerly Area 1) provides two architectures to protect your + Email security (formerly Area 1) provides two architectures to protect your organization: inline or API setup. Inline architecture evaluates email messages before they reach a user's inbox. API architecture evaluates emails when they have already reached a user's inbox. - In addition to standard logins, Email Security (formerly Area 1) offers + In addition to standard logins, Email security (formerly Area 1) offers support for SAML based single sign-on (SSO) logins to your dashboard. @@ -84,7 +84,7 @@ Area 1 is now **Email Security (formerly Area 1)**. Customers who purchased the product="email-routing" > Email Routing simplifies the way you create and manage custom email addresses. - Email Security (formerly Area 1) helps secure your mail infrastructure from + Email security (formerly Area 1) helps secure your mail infrastructure from phishing attacks. @@ -105,7 +105,7 @@ Area 1 is now **Email Security (formerly Area 1)**. Customers who purchased the -Email Security (formerly Area 1) is available as a standalone product purchase. +Email security (formerly Area 1) is available as a standalone product purchase. diff --git a/src/content/docs/email-security/migrate-to-email-security.mdx b/src/content/docs/email-security/migrate-to-email-security.mdx index a822c6379cfa82c..797e8cc0d80736b 100644 --- a/src/content/docs/email-security/migrate-to-email-security.mdx +++ b/src/content/docs/email-security/migrate-to-email-security.mdx @@ -1,5 +1,5 @@ --- -title: Migrate to Email Security +title: Migrate to Email security pcx_content_type: how-to sidebar: order: 9 @@ -7,10 +7,10 @@ sidebar: import { Render } from "~/components"; -This page aims at showing you how to perform Area 1 actions in [Zero Trust Email Security](/cloudflare-one/email-security/), and new terminology introduced in Email Security. +This page aims at showing you how to perform Area 1 actions in [Zero Trust Email security](/cloudflare-one/email-security/), and new terminology introduced in Email security. :::note -Your Area 1 data and configuration settings are available in Email Security. +Your Area 1 data and configuration settings are available in Email security. ::: @@ -22,59 +22,59 @@ In Area 1, you can reach out to support via the following email addresses: - support@area1security.com - phishguard@area1security.com (for PhishGuard customers only) -In Email Security, you can raise a ticket by contacting [technical support](https://dash.cloudflare.com/?to=/:account/support) on the Cloudflare dashboard: +In Email security, you can raise a ticket by contacting [technical support](https://dash.cloudflare.com/?to=/:account/support) on the Cloudflare dashboard: 1. Select your account and choose **Technical support**. 2. In **Solve your issue**, answer the following questions: - What type of question do you have? Select **Technical - Other Products** - - In what area can we help you? Select **Email Security** + - In what area can we help you? Select **Email security** - What feature, service or problem is this related to? Choose among **Configuration**, **Detections** or **PhishGuard**. ## Invite users In Area 1, you [invite users](/email-security/account-setup/manage-account-members/#add-user) by logging in to the Area 1 portal and inviting members. -To invite users in Zero Trust Email Security: +To invite users in Zero Trust Email security: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Go to **Manage Account**. 3. Select **Members** > **Invite** > [Add account members](/fundamentals/manage-members/manage/#add-account-members). -Once you have added new account members, you will have to assign each member an [Email Security role](/cloudflare-one/roles-permissions/#email-security-roles). +Once you have added new account members, you will have to assign each member an [Email security role](/cloudflare-one/roles-permissions/#email-security-roles). -| Area 1 | Email Security | Description | +| Area 1 | Email security | Description | | ------------------- | ------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| N/A | Cloudflare Zero Trust | Can edit Cloudflare [Zero Trust](/cloudflare-one/). Has administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email Security. | -| Super Admin | Email Security Analyst + Email Security Configuration Admin = Super Admin | Has full access to all admin features in Email Security | -| Configuration Admin | Email Security Configuration Admin | Has administrator access. Cannot take actions on emails, or read emails | -| SOC Analyst | Email Security Analyst | Has analyst access. Can take action on emails and read emails. | -| Viewer | Email Security Reporting | Can read metrics | -| N/A | Cloudflare Zero Trust PII | Can read PII in Zero Trust (this includes Email Security) | -| N/A | Email Security Policy Admin | Can read all settings, but only write allow policies, trusted domains, and blocked senders | +| N/A | Cloudflare Zero Trust | Can edit Cloudflare [Zero Trust](/cloudflare-one/). Has administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email security. | +| Super Admin | Email security Analyst + Email security Configuration Admin = Super Admin | Has full access to all admin features in Email security | +| Configuration Admin | Email security Configuration Admin | Has administrator access. Cannot take actions on emails, or read emails | +| SOC Analyst | Email security Analyst | Has analyst access. Can take action on emails and read emails. | +| Viewer | Email security Reporting | Can read metrics | +| N/A | Cloudflare Zero Trust PII | Can read PII in Zero Trust (this includes Email security) | +| N/A | Email security Policy Admin | Can read all settings, but only write allow policies, trusted domains, and blocked senders | ## Create webhooks :::note -Starting from October 1, 2025, Area 1 webhooks will be visible in Zero Trust Email Security, but non-configurable. Use [Logpush](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs) to create new webhooks or configure webhooks. +Starting from October 1, 2025, Area 1 webhooks will be visible in Zero Trust Email security, but non-configurable. Use [Logpush](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs) to create new webhooks or configure webhooks. ::: In Area 1, you can [create alert webhooks](/email-security/email-configuration/domains-and-routing/alert-webhooks/#create-an-alert-webhook). -In Zero Trust Email Security, webhooks are instead referred to as logs. You can enable [detection logs](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs) and/or [user action logs](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs). Additionally, you can enable [Outbound Data Loss Prevention](/cloudflare-one/email-security/outbound-dlp/) to protect sensitive information in outbound emails. +In Zero Trust Email security, webhooks are instead referred to as logs. You can enable [detection logs](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs) and/or [user action logs](/cloudflare-one/insights/logs/enable-logs/#enable-user-action-logs). Additionally, you can enable [Outbound Data Loss Prevention](/cloudflare-one/email-security/outbound-dlp/) to protect sensitive information in outbound emails. ## Set up system alerts -You can check the Area 1 and Email Security status in the [Cloudflare System Status](https://www.cloudflarestatus.com/). +You can check the Area 1 and Email security status in the [Cloudflare System Status](https://www.cloudflarestatus.com/). To view Area 1 status: -- Search for **Email Security (Area1)** and check that the status is set to **Operational**. This means that emails are being processed. +- Search for **Email security (Area1)** and check that the status is set to **Operational**. This means that emails are being processed. - Search for **Area 1 - Dash** to check the status of the Area 1 dashboard. - Search for **Area 1 - API** to check the status of the API endpoints. -To view Email Security status: +To view Email security status: -- Search for **Email Security (Zero Trust)** and check that the status is set to **Operational**. This means that emails are being processed. +- Search for **Email security (Zero Trust)** and check that the status is set to **Operational**. This means that emails are being processed. - Search for **Zero Trust Dashboard** to check the status of the Zero Trust dashboard. - Search for **API** to check the status of the API endpoints. @@ -83,12 +83,12 @@ You can also check the status of APIs through the [Cloudflare Status API](https: ## Email reports :::note -Starting from October 1, 2025, weekly and daily email reports will no longer be available. Go to [Monitoring](/cloudflare-one/email-security/monitoring/) in Email Security to monitor your inbox. +Starting from October 1, 2025, weekly and daily email reports will no longer be available. Go to [Monitoring](/cloudflare-one/email-security/monitoring/) in Email security to monitor your inbox. ::: In Area 1, you receive daily or weekly updates of the number of emails dispositioned. -In Email Security, you can view [email monitoring](/cloudflare-one/email-security/monitoring/) over the last 90, 30, 7, 3, 1 day(s). +In Email security, you can view [email monitoring](/cloudflare-one/email-security/monitoring/) over the last 90, 30, 7, 3, 1 day(s). ## Email alerts for detections @@ -98,13 +98,13 @@ Starting from October 1, 2025, emails alerts for detections will no longer be av In Area 1, you receive an email when an email is assigned a disposition. -In Email Security, you enable [Logpush](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs) to enable detection logs. +In Email security, you enable [Logpush](/cloudflare-one/insights/logs/enable-logs/#enable-detection-logs) to enable detection logs. ## Search emails In Area 1, you can perform two types of search: [Fielded Search](/email-security/reporting/search/#fielded-search) and [Freeform Search](/email-security/reporting/search/#freeform-search). -In Email Security, the ability to search emails has been expanded. You can use three different [screen criteria](/cloudflare-one/email-security/monitoring/search-email/#screen-criteria) to search emails: +In Email security, the ability to search emails has been expanded. You can use three different [screen criteria](/cloudflare-one/email-security/monitoring/search-email/#screen-criteria) to search emails: - [Advanced screen](/cloudflare-one/email-security/monitoring/search-email/#advanced-screen) - [Regular screen](/cloudflare-one/email-security/monitoring/search-email/#regular-screen) @@ -114,19 +114,19 @@ In Email Security, the ability to search emails has been expanded. You can use t In Area 1, you can check [statistics](/email-security/reporting/statistics-overview/) in your Home section. -In Email Security, you can check your metrics in the [Monitoring](/cloudflare-one/email-security/monitoring/) section in the dashboard. +In Email security, you can check your metrics in the [Monitoring](/cloudflare-one/email-security/monitoring/) section in the dashboard. ## Move messages to a specific folder Area 1 allows you to set up [message retraction](/email-security/email-configuration/retract-settings/) to move messages to specific folders. This is known as **retraction**. -Moving messages to a specific folder is known as [auto-moves](/cloudflare-one/email-security/settings/auto-moves/) in Zero Trust Email Security. +Moving messages to a specific folder is known as [auto-moves](/cloudflare-one/email-security/settings/auto-moves/) in Zero Trust Email security. ## Create policies This table displays the difference in terminology used when creating policies: -| Area 1 | Email Security | +| Area 1 | Email security | | --------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | | [Allowed patterns](/email-security/email-configuration/lists/allowed-patterns/) | [Allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/) | | [Block lists](/email-security/email-configuration/lists/block-list/) | [Blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) | @@ -139,7 +139,7 @@ This table displays the difference in terminology used when creating policies: This table displays the difference in terminology used when finding emails whose disposition is incorrect: -| Area 1 | Email Security | +| Area 1 | Email security | | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------- | | Report [false negative](/email-security/email-configuration/phish-submissions/#false-negatives)/[false positive](/email-security/email-configuration/phish-submissions/#false-positives) | [ Reclassify messages ](/cloudflare-one/email-security/monitoring/search-email/#reclassify-messages) | | N/A | Escalate user submissions | @@ -150,20 +150,20 @@ This table displays the difference in terminology used when finding emails whose In Area 1, you can set up a [Business email compromise (BEC)](/email-security/email-configuration/enhanced-detections/business-email-compromise/) list to protect against attackers who try to impersonate executives. -In Email Security, this feature is known as [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). +In Email security, this feature is known as [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). ## Synchronize directories In Area 1, you can [integrate directories](/email-security/email-configuration/enhanced-detections/business-email-compromise/#integrating-a-directory) in your email provider. -In Email Security, you can add and sync [directories](/cloudflare-one/email-security/directories/). +In Email security, you can add and sync [directories](/cloudflare-one/email-security/directories/). ## API :::note -Area 1 API endpoints will deprecate on December 18, 2025. Use the [Email Security API](https://developers.cloudflare.com/api/resources/email_security/) endpoints to prevent interruption to your normal operations. +Area 1 API endpoints will deprecate on December 18, 2025. Use the [Email security API](https://developers.cloudflare.com/api/resources/email_security/) endpoints to prevent interruption to your normal operations. ::: To access Area 1 API, go to the [API Documentation](https://developers.cloudflare.com/email-security/static/api_documentation_1.38.1.pdf). You can set up a [service account](https://developers.cloudflare.com/email-security/api/service-accounts/) to configure API tokens. -To access Email Security API, go to [Email Security API](https://developers.cloudflare.com/api/resources/email_security/). You can set up an [API token](/fundamentals/api/get-started/create-token/) to use the Email Security API. +To access Email security API, go to [Email security API](https://developers.cloudflare.com/api/resources/email_security/). You can set up an [API token](/fundamentals/api/get-started/create-token/) to use the Email security API. diff --git a/src/content/docs/email-security/partners.mdx b/src/content/docs/email-security/partners.mdx index e4fc12bc20ff851..21b3c1d020edbc6 100644 --- a/src/content/docs/email-security/partners.mdx +++ b/src/content/docs/email-security/partners.mdx @@ -11,7 +11,7 @@ import { GlossaryTooltip, Render } from "~/components"; -Email Security Channel and Alliance partners have the option to set up accounts for themselves and their customers. +Email security Channel and Alliance partners have the option to set up accounts for themselves and their customers. ## Create accounts @@ -25,7 +25,7 @@ Parent accounts are treated as containers with no services provisioned. User acc This is only required for administrators that manage multiple accounts. For example, Managed Security Service Providers (MSSP) managing multiple customer accounts. ::: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. In **Delegated Accounts** > **Accounts**, select **Create new customer**. 4. Enter their information, and make sure you select _Parent_ in **Account Type**. @@ -35,12 +35,12 @@ Your newly created account should show up in the list. If not, refresh the page. ### Create a child account -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. In **Delegated Accounts** > **Accounts**, select the parent account where you want to create a child account. 4. Select **Create New customer**. 5. Enter their information, and make sure you select _Advantage_ in **Account Type**. -6. Scroll down to the **Email Traffic Related Information** section, and enter the information related to your email provider. The number to enter in **Loopback Hops** will depend on your email configuration and where Email Security is in the chain of events. Refer to [Inline deployment](/email-security/deployment/inline/) and [API deployment](/email-security/deployment/api/) for more information. +6. Scroll down to the **Email Traffic Related Information** section, and enter the information related to your email provider. The number to enter in **Loopback Hops** will depend on your email configuration and where Email security is in the chain of events. Refer to [Inline deployment](/email-security/deployment/inline/) and [API deployment](/email-security/deployment/api/) for more information. 7. For **Daily Email Volume** and **Number of Email Users** make sure you enter the appropriate values for your organization. 8. Select **Save**. @@ -64,26 +64,26 @@ To create an account at parent level or child level: ## Escalation contacts -You should add escalation contacts so Email Security can send notifications regarding detection events and critical service related issues. Email Security highly recommends that these contacts have both phone and email contacts. +You should add escalation contacts so Email security can send notifications regarding detection events and critical service related issues. Email security highly recommends that these contacts have both phone and email contacts. Refer to [Escalation contacts](/email-security/account-setup/escalation-contacts/) for more information. ## Status alerts -Subscribe to incident status alerts [from Email Security](https://status.area1security.com/). +Subscribe to incident status alerts [from Email security](https://status.area1security.com/). ## Domains setup (inline/API) -Refer to the [setup options](/email-security/deployment/) for Email Security to learn about the best way of deploying Email Security in your organization. You can choose between two main setup architectures: +Refer to the [setup options](/email-security/deployment/) for Email security to learn about the best way of deploying Email security in your organization. You can choose between two main setup architectures: - Inline deployment - API deployment -With an [inline deployment](/email-security/deployment/inline/), Email Security evaluates email messages before they reach a user’s inbox. When you choose an [API deployment](/email-security/deployment/api/), email messages only reach Email Security after they have already reached a user’s inbox. +With an [inline deployment](/email-security/deployment/inline/), Email security evaluates email messages before they reach a user’s inbox. When you choose an [API deployment](/email-security/deployment/api/), email messages only reach Email security after they have already reached a user’s inbox. ## Classification actions -Email Security recommends that you quarantine `MALICIOUS` and `SPAM` dispositions. You can configure this directly in [Office 365](/email-security/deployment/inline/setup/office-365-area1-mx/) and [Gsuite](/email-security/deployment/inline/setup/gsuite-area1-mx/), as well as [Email Security](/email-security/email-configuration/domains-and-routing/domains/). +Email security recommends that you quarantine `MALICIOUS` and `SPAM` dispositions. You can configure this directly in [Office 365](/email-security/deployment/inline/setup/office-365-area1-mx/) and [Gsuite](/email-security/deployment/inline/setup/gsuite-area1-mx/), as well as [Email security](/email-security/email-configuration/domains-and-routing/domains/). ## Message retraction @@ -95,7 +95,7 @@ To add additional TLS requirements for emails coming from certain domains, you c ## Reports -You can subscribe to [daily and weekly email reports](https://horizon.area1security.com/settings/subscriptions/email-subscriptions), as well as SIEM events. For SIEM events, you will need to [configure your SIEM tool](/email-security/reporting/siem-integration/) into Email Security first. +You can subscribe to [daily and weekly email reports](https://horizon.area1security.com/settings/subscriptions/email-subscriptions), as well as SIEM events. For SIEM events, you will need to [configure your SIEM tool](/email-security/reporting/siem-integration/) into Email security first. ## Whitelisting and blocklisting senders diff --git a/src/content/docs/email-security/reference/cloudflare-sso.mdx b/src/content/docs/email-security/reference/cloudflare-sso.mdx index 8b525a7f8f89b5b..1e17ffff09ae628 100644 --- a/src/content/docs/email-security/reference/cloudflare-sso.mdx +++ b/src/content/docs/email-security/reference/cloudflare-sso.mdx @@ -5,7 +5,7 @@ sidebar: order: 5 head: [] description: You can use your Cloudflare account as the single sign-on (SSO) - authentication scheme to log in to the Email Security dashboard. + authentication scheme to log in to the Email security dashboard. --- import { Render } from "~/components"; @@ -14,11 +14,11 @@ import { Render } from "~/components"; -You can use your Cloudflare account as the single sign-on (SSO) authentication scheme to log in to the Email Security dashboard: +You can use your Cloudflare account as the single sign-on (SSO) authentication scheme to log in to the Email security dashboard: -1. Log in to the [Email Security (formerly Area 1) dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security (formerly Area 1) dashboard](https://horizon.area1security.com/). 2. Select **Sign in with Cloudflare**. You will be redirected to your Cloudflare account to log in. -3. Select **Allow** to allow Email Security to make changes to your Cloudflare account. You will be redirected to the Email Security dashboard. -4. Enter your Email Security's email address to log in. +3. Select **Allow** to allow Email security to make changes to your Cloudflare account. You will be redirected to the Email security dashboard. +4. Enter your Email security's email address to log in. -You can now use your Cloudflare account as a single sign-on authentication scheme to log in to Email Security. The next time you access the Email Security dashboard, just select **Sign in with Cloudflare** to log in. +You can now use your Cloudflare account as a single sign-on authentication scheme to log in to Email security. The next time you access the Email security dashboard, just select **Sign in with Cloudflare** to log in. diff --git a/src/content/docs/email-security/reference/dispositions-and-attributes.mdx b/src/content/docs/email-security/reference/dispositions-and-attributes.mdx index b7330d547179cea..0eddcaaee643506 100644 --- a/src/content/docs/email-security/reference/dispositions-and-attributes.mdx +++ b/src/content/docs/email-security/reference/dispositions-and-attributes.mdx @@ -11,13 +11,13 @@ import { GlossaryTooltip, Render } from "~/components"; -Email Security uses a variety of factors to determine whether a given email message, domain, URL, or packet is part of a phishing campaign. These small pattern assessments are dynamic in nature and — in many cases — no single pattern will determine the final verdict. +Email security uses a variety of factors to determine whether a given email message, domain, URL, or packet is part of a phishing campaign. These small pattern assessments are dynamic in nature and — in many cases — no single pattern will determine the final verdict. -Based on these patterns, Email Security may add `X-Headers` to each email message that passes through our system. +Based on these patterns, Email security may add `X-Headers` to each email message that passes through our system. ## Dispositions -Any traffic that flows through Email Security is given a final disposition, which represents our evaluation of that specific message. Each message will only receive one disposition header so your organization can take clear and specific actions on different message types. +Any traffic that flows through Email security is given a final disposition, which represents our evaluation of that specific message. Each message will only receive one disposition header so your organization can take clear and specific actions on different message types. You can use disposition values when [creating your quarantine policy](/email-security/email-configuration/domains-and-routing/domains/) or [setting up auto-retract](/email-security/email-configuration/retract-settings/). @@ -33,7 +33,7 @@ You can use disposition values when [creating your quarantine policy](/email-sec ### Header structure -When Email Security adds a disposition header to an email message, that header matches the following format: +When Email security adds a disposition header to an email message, that header matches the following format: ```txt X-Area1Security-Disposition: [Value] @@ -47,7 +47,7 @@ X-Area1Security-Disposition: UCE ## Attributes -Traffic that flows through Email Security can also receive one or more **Attributes**, which indicate that a specific condition has been met. +Traffic that flows through Email security can also receive one or more **Attributes**, which indicate that a specific condition has been met. ### Available values @@ -62,7 +62,7 @@ Traffic that flows through Email Security can also receive one or more **Attribu ### Header structure -When Email Security adds a disposition header to an email message, that header matches the following format. +When Email security adds a disposition header to an email message, that header matches the following format. ```txt X-Area1Security-Attribute: [Value] diff --git a/src/content/docs/email-security/reference/language-support.mdx b/src/content/docs/email-security/reference/language-support.mdx index 79b9665bbeb0c9e..41179cbefc334f0 100644 --- a/src/content/docs/email-security/reference/language-support.mdx +++ b/src/content/docs/email-security/reference/language-support.mdx @@ -7,18 +7,17 @@ sidebar: import { Render } from "~/components"; - ## Email evaluation -The scanning service and verdict engines used by Email Security are language agnostic. We provide support for Double Byte Character sets (DBCS) and UTF-8, UTF-16, and UTF-32 encoding. +The scanning service and verdict engines used by Email security are language agnostic. We provide support for Double Byte Character sets (DBCS) and UTF-8, UTF-16, and UTF-32 encoding. ## Dashboard -The Email Security email dashboard is localized to several languages. To update your language settings: +The Email security email dashboard is localized to several languages. To update your language settings: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. At the bottom of the page, select the language icon. diff --git a/src/content/docs/email-security/reference/office365-gcc.mdx b/src/content/docs/email-security/reference/office365-gcc.mdx index 79ea0e7dcc68fdf..515666c2a4a0a0b 100644 --- a/src/content/docs/email-security/reference/office365-gcc.mdx +++ b/src/content/docs/email-security/reference/office365-gcc.mdx @@ -16,4 +16,4 @@ Microsoft 365 Government Community Cloud (GCC) is designed to meet the requireme GCC Low is intended for use by US government organizations that handle sensitive but unclassified data, and have less stringent compliance requirements. -Email Security supports GCC Low environments. +Email security supports GCC Low environments. diff --git a/src/content/docs/email-security/reference/timestamps.mdx b/src/content/docs/email-security/reference/timestamps.mdx index 809e3e6a8b5b3f0..8c39e5c655c504b 100644 --- a/src/content/docs/email-security/reference/timestamps.mdx +++ b/src/content/docs/email-security/reference/timestamps.mdx @@ -12,6 +12,6 @@ import { Render } from "~/components";
-The example below shows timestamps for [Audit logs](/email-security/reporting/audit-logs/). However, note that the same applies to all sections in the Email Security dashboard that show timestamps. +The example below shows timestamps for [Audit logs](/email-security/reporting/audit-logs/). However, note that the same applies to all sections in the Email security dashboard that show timestamps. ![How timestamps are localized to the user's current time zone.](~/assets/images/email-security/timestamps.png) diff --git a/src/content/docs/email-security/reporting/audit-logs.mdx b/src/content/docs/email-security/reporting/audit-logs.mdx index 8e0fb13210621d7..fefc51713d180b2 100644 --- a/src/content/docs/email-security/reporting/audit-logs.mdx +++ b/src/content/docs/email-security/reporting/audit-logs.mdx @@ -4,28 +4,28 @@ pcx_content_type: how-to sidebar: order: 4 head: [] -description: Use Email Security (formerly Area 1) logs to review actions +description: Use Email security (formerly Area 1) logs to review actions performed on your account. --- import { Render } from "~/components"; -You can use Email Security logs to review actions performed on your account: +You can use Email security logs to review actions performed on your account: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Users and Actions** > **Audit Log**. 4. Review the logs. You can also filter by type of log from the dropdown menu. ## Logs preview -You can use one of the Preview logs to preview how Email Security handles post delivery retractions. With Audit logs Preview, Email Security shows you the emails that would have been retracted with Post Delivery Response (PDR) or Phish Submissions Response (PSR) enabled. +You can use one of the Preview logs to preview how Email security handles post delivery retractions. With Audit logs Preview, Email security shows you the emails that would have been retracted with Post Delivery Response (PDR) or Phish Submissions Response (PSR) enabled. Refer to **Post delivery retractions for new threats** for [Gmail](/email-security/deployment/api/setup/gsuite-bcc-setup/add-retraction/#post-delivery-retractions-for-new-threats) or [Office 365](/email-security/email-configuration/retract-settings/office365-retraction/#post-delivery-retractions-for-new-threats) to learn more about this feature. To review preview logs: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Users and Actions** > **Audit Log**. 4. From the dropdown, select one of the **Preview** logs. This will show you what would have been retracted with Post Delivery Response or Phish Submission Response enabled. diff --git a/src/content/docs/email-security/reporting/index.mdx b/src/content/docs/email-security/reporting/index.mdx index 6b33ae0e3c7b2e2..6886155122a1962 100644 --- a/src/content/docs/email-security/reporting/index.mdx +++ b/src/content/docs/email-security/reporting/index.mdx @@ -11,11 +11,11 @@ import { DirectoryListing, Render } from "~/components"; -Email Security offers a variety of ways for you to better examine and understand your message traffic: +Email security offers a variety of ways for you to better examine and understand your message traffic: -- The [Email Security API](/email-security/api/) also allows you to download historical records as needed. +- The [Email security API](/email-security/api/) also allows you to download historical records as needed. :::note diff --git a/src/content/docs/email-security/reporting/phish-reports.mdx b/src/content/docs/email-security/reporting/phish-reports.mdx index 17d23985e0992e8..940acca62fe07fe 100644 --- a/src/content/docs/email-security/reporting/phish-reports.mdx +++ b/src/content/docs/email-security/reporting/phish-reports.mdx @@ -5,18 +5,17 @@ sidebar: order: 2 head: [] description: Access Phish reports through the dashboard or an email digest. - --- -import { GlossaryTooltip, Render } from "~/components" +import { GlossaryTooltip, Render } from "~/components"; -Email Security automatically generates phish reports to provide an overview of your email traffic. The report only includes malicious emails. Spam and bulk emails are not included. +Email security automatically generates phish reports to provide an overview of your email traffic. The report only includes malicious emails. Spam and bulk emails are not included. ## In the dashboard -To view phishing reports in the Email Security dashboard, [log in](https://horizon.area1security.com/) and explore the non-Settings areas of the Email Security dashboard (**Home**, **Email**, **Web**, and **Detection Details**). +To view phishing reports in the Email security dashboard, [log in](https://horizon.area1security.com/) and explore the non-Settings areas of the Email security dashboard (**Home**, **Email**, **Web**, and **Detection Details**). ## Through an email subscription @@ -24,7 +23,7 @@ The same reports that are visible through the dashboard can also be delivered th To subscribe an email address to daily or weekly reports: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Subscriptions** > **Email Subscriptions**. 4. Select **Add Subscriber**. diff --git a/src/content/docs/email-security/reporting/search/available-parameters.mdx b/src/content/docs/email-security/reporting/search/available-parameters.mdx index ca6f6b939009f6a..2b897742749607e 100644 --- a/src/content/docs/email-security/reporting/search/available-parameters.mdx +++ b/src/content/docs/email-security/reporting/search/available-parameters.mdx @@ -3,52 +3,51 @@ title: Available parameters pcx_content_type: reference sidebar: order: 2 - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; You can pull information for a message in [search detections](/email-security/reporting/search/) using the following parameters: -* From (`envelope_from`) -* From Name -* To (any) (`envelope_to`) -* To Name (any) -* Cc (any) -* ReplyTo -* Subject (any) -* Sent DateTime (formatted as `YYYY-MM-DDTHH:MM:SS`) -* Received DateTime (formatted as `YYYY-MM-DDTHH:MM:SS`) -* final\_disposition -* alert\_id -* sha256 (attachments) -* ssdeep (attachments) -* name (attachments) -* md5 (attachments) -* Message-ID -* smtp\_helo\_server\_ip -* smtp\_previous\_hop\_ip -* x\_originating\_ip -* Reason(s) for Detection +- From (`envelope_from`) +- From Name +- To (any) (`envelope_to`) +- To Name (any) +- Cc (any) +- ReplyTo +- Subject (any) +- Sent DateTime (formatted as `YYYY-MM-DDTHH:MM:SS`) +- Received DateTime (formatted as `YYYY-MM-DDTHH:MM:SS`) +- final_disposition +- alert_id +- sha256 (attachments) +- ssdeep (attachments) +- name (attachments) +- md5 (attachments) +- Message-ID +- smtp_helo_server_ip +- smtp_previous_hop_ip +- x_originating_ip +- Reason(s) for Detection ## Search terms In addition to the message parameters above, you can use these additional detection search strings: -* phish\_submission -* phish\_submission\_response -* user\_submission -* team\_submission -* auto-retraction -* browser\_isolation\_rewrite +- phish_submission +- phish_submission_response +- user_submission +- team_submission +- auto-retraction +- browser_isolation_rewrite -For disposition-specific submission searches, refer to [Service Addresses](https://horizon.area1security.com/support/service-addresses) in the Email Security dashboard. +For disposition-specific submission searches, refer to [Service Addresses](https://horizon.area1security.com/support/service-addresses) in the Email security dashboard. ## Data retention -For Email Security Horizon Enterprise customers, detections search would index for a period of 12 months and rotate over to a rolling 12-month period. +For Email security Horizon Enterprise customers, detections search would index for a period of 12 months and rotate over to a rolling 12-month period. -For Email Security Horizon Advantage customers, detections search would index for three months and rotate over to a rolling 3-month period. +For Email security Horizon Advantage customers, detections search would index for three months and rotate over to a rolling 3-month period. ## Scope of data retained diff --git a/src/content/docs/email-security/reporting/search/index.mdx b/src/content/docs/email-security/reporting/search/index.mdx index 6a4fe71ba69571d..8d69bf90dd8fe43 100644 --- a/src/content/docs/email-security/reporting/search/index.mdx +++ b/src/content/docs/email-security/reporting/search/index.mdx @@ -5,14 +5,14 @@ sidebar: order: 1 head: [] description: Search for messages with a detection disposition or that have been - processeded by Email Security (formerly Area 1). + processeded by Email security (formerly Area 1). --- import { GlossaryTooltip, Render } from "~/components"; -You can search for emails that have been processed by Email Security (formerly Area 1), whether they are marked with a detection disposition or not. +You can search for emails that have been processed by Email security (formerly Area 1), whether they are marked with a detection disposition or not. There are two ways for searching emails: @@ -33,7 +33,7 @@ For more exact matches, use the named fields in **Fielded Search** to denote whi ## Fielded Search -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Select the **Search** bar. 3. Fill out one or more of the following fields. Filling multiple fields is the equivalent of adding the `AND` operator between the following terms: - **Terms**: Searches for terms in any of the available fields. If you want to search for a message that matches multiple recipients, use this field. Only one value can be specified in the **From** and **To** fields. @@ -48,7 +48,7 @@ For more exact matches, use the named fields in **Fielded Search** to denote whi ## Freeform Search -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Select the **Search bar** > **Freeform Search**. 3. Build your search query — for example, `My great products`. The system will return all the emails that fit the query. diff --git a/src/content/docs/email-security/reporting/siem-integration/index.mdx b/src/content/docs/email-security/reporting/siem-integration/index.mdx index e4e5d9e736984ca..1c4f052e5c070b4 100644 --- a/src/content/docs/email-security/reporting/siem-integration/index.mdx +++ b/src/content/docs/email-security/reporting/siem-integration/index.mdx @@ -13,7 +13,7 @@ import { DirectoryListing, GlossaryTooltip, Render } from "~/components"; -With a bit of configuration, you can also bring Email Security (formerly Area 1) data into your Security Information and Event Management (SIEM) tools to view message-level information outside of the dashboard and create your own custom reports. +With a bit of configuration, you can also bring Email security (formerly Area 1) data into your Security Information and Event Management (SIEM) tools to view message-level information outside of the dashboard and create your own custom reports. ## Connect a SIEM tool diff --git a/src/content/docs/email-security/reporting/siem-integration/knowbe4-integration-guide.mdx b/src/content/docs/email-security/reporting/siem-integration/knowbe4-integration-guide.mdx index 0173da8199975d6..ec46b072d1f0824 100644 --- a/src/content/docs/email-security/reporting/siem-integration/knowbe4-integration-guide.mdx +++ b/src/content/docs/email-security/reporting/siem-integration/knowbe4-integration-guide.mdx @@ -4,28 +4,27 @@ pcx_content_type: integration-guide reviewed: 2023-08-04 head: [] description: KnowBe4 integration guide - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When Email Security detects a phishing email, the metadata of the detection can be sent directly to KnowBe4. For this tutorial, you will need a working KnowBe4 account with the SecurityCoach add-on. You will also need to create an organization key to use in Email Security. This organization key will let you integrate KnowBe4 with Email Security. Refer to [KnowBe4 documentation](https://support.knowbe4.com/hc/articles/13129840202643) for more information on this subject. +When Email security detects a phishing email, the metadata of the detection can be sent directly to KnowBe4. For this tutorial, you will need a working KnowBe4 account with the SecurityCoach add-on. You will also need to create an organization key to use in Email security. This organization key will let you integrate KnowBe4 with Email security. Refer to [KnowBe4 documentation](https://support.knowbe4.com/hc/articles/13129840202643) for more information on this subject. -After creating your organization key and authorizing Email Security: +After creating your organization key and authorizing Email security: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Email Configuration** > **Domains & Routing** > **Alert Webhooks**. 4. Select **New Webhook**. 5. In **App Type**, select **SIEM**. -6. Choose *KnowBe4* from the dropdown, and paste your organization key into the **Auth Code** section. +6. Choose _KnowBe4_ from the dropdown, and paste your organization key into the **Auth Code** section. 7. In **Target**, paste the URL that suits your organization. KnowBe4 has different URLs for different regions: - | KnowBe4 instance | URL | + | KnowBe4 instance | URL | | ---------------- | ---------------------------------------------- | - | United States | `https://area1.vendor.training.knowbe4.com/v1` | - | European Union | `https://area1.vendor.eu.knowbe4.com/v1` | - | Canada | `https://area1.vendor.ca.knowbe4.com/v1` | - | United Kingdom | `https://area1.vendor.uk.knowbe4.com/v1` | - | Germany | `https://area1.vendor.da.knowbe4.com/v1` | -8. Select *Expanded* from the drop-down menu for **Malicious Style**, **Suspicious Style**, and **Spoof Style**. + | United States | `https://area1.vendor.training.knowbe4.com/v1` | + | European Union | `https://area1.vendor.eu.knowbe4.com/v1` | + | Canada | `https://area1.vendor.ca.knowbe4.com/v1` | + | United Kingdom | `https://area1.vendor.uk.knowbe4.com/v1` | + | Germany | `https://area1.vendor.da.knowbe4.com/v1` | +8. Select _Expanded_ from the drop-down menu for **Malicious Style**, **Suspicious Style**, and **Spoof Style**. 9. Select **Publish Webhook**. diff --git a/src/content/docs/email-security/reporting/siem-integration/logscale-integration-guide.mdx b/src/content/docs/email-security/reporting/siem-integration/logscale-integration-guide.mdx index 3fea9b4a0add8fd..eb03f7b0bec2c07 100644 --- a/src/content/docs/email-security/reporting/siem-integration/logscale-integration-guide.mdx +++ b/src/content/docs/email-security/reporting/siem-integration/logscale-integration-guide.mdx @@ -4,20 +4,19 @@ pcx_content_type: integration-guide reviewed: 2023-08-04 head: [] description: Falcon LogScale integration guide - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When Email Security detects a phishing email, the metadata of the detection can be sent directly to Falcon LogScale. For this tutorial, you will need a working Falcon LogScale account. You will also need to create a new Ingest Token in your LogScale account. Ingest Tokens identify repositories and are used to configure data ingestion to your repository. Refer to [Falcon LogScale documentation](https://library.humio.com/falcon-logscale-cloud/ingesting-data-tokens.html) for more information. +When Email security detects a phishing email, the metadata of the detection can be sent directly to Falcon LogScale. For this tutorial, you will need a working Falcon LogScale account. You will also need to create a new Ingest Token in your LogScale account. Ingest Tokens identify repositories and are used to configure data ingestion to your repository. Refer to [Falcon LogScale documentation](https://library.humio.com/falcon-logscale-cloud/ingesting-data-tokens.html) for more information. After creating your Ingest Token: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Settings** (the gear icon). 3. Go to **Email Configuration** > **Domains & Routing** > **Alert Webhooks**. 4. Select **New Webhook**. 5. In **App Type**, select **SIEM**. -6. Choose *Crowdstrike* from the dropdown, and paste your Ingest Token into the **Auth Code** section. +6. Choose _Crowdstrike_ from the dropdown, and paste your Ingest Token into the **Auth Code** section. 7. In **Target**, paste the URL `https://cloud.community.humio.com/api/v1/ingest/hec/raw`. 8. Select **Publish Webhook**. diff --git a/src/content/docs/email-security/reporting/siem-integration/splunk-integration-guide.mdx b/src/content/docs/email-security/reporting/siem-integration/splunk-integration-guide.mdx index 5202457a7304ef9..302d91760fcae61 100644 --- a/src/content/docs/email-security/reporting/siem-integration/splunk-integration-guide.mdx +++ b/src/content/docs/email-security/reporting/siem-integration/splunk-integration-guide.mdx @@ -4,14 +4,13 @@ pcx_content_type: integration-guide reviewed: 2023-01-26 head: [] description: Splunk Cloud integration guide - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When Email Security detects a phishing email, the metadata of the detection can be sent directly to Splunk. This document outlines the steps required to integrate with Splunk Cloud. +When Email security detects a phishing email, the metadata of the detection can be sent directly to Splunk. This document outlines the steps required to integrate with Splunk Cloud. -![A diagram outlining what happens when Email Security detects a phishing email and sends it to Splunk.](~/assets/images/email-security/siem-integration/splunk/open-splunk.png) +![A diagram outlining what happens when Email security detects a phishing email and sends it to Splunk.](~/assets/images/email-security/siem-integration/splunk/open-splunk.png) ## 1. Configure Splunk HTTP Event Collector @@ -27,7 +26,7 @@ When Email Security detects a phishingphishingphishing **Submit** to review your settings and create the collector. -11. Take note of the token value in this next screen. This value is required for the Email Security configuration in the next step. You can also retrieve the token from the HTTP Event Collector configuration panel, in **Settings** > **Data inputs** > **HTTP Event Collector**. +11. Take note of the token value in this next screen. This value is required for the Email security configuration in the next step. You can also retrieve the token from the HTTP Event Collector configuration panel, in **Settings** > **Data inputs** > **HTTP Event Collector**. ![Example of a new index added to the configuration](~/assets/images/email-security/siem-integration/splunk/step11-token-value.png) @@ -68,15 +67,14 @@ curl https://{host}:8088/services/collector/event \ When creating requests to Splunk, the URL and port number change according to the type of Splunk setup: -* **Splunk Cloud Platform free trial**: `://http-inputs-.splunkcloud.com:8088/` -* **Splunk Cloud Platform**: `://http-inputs-.splunkcloud.com:443/` -* **Splunk Enterprise**: `://:8088/` +- **Splunk Cloud Platform free trial**: `://http-inputs-.splunkcloud.com:8088/` +- **Splunk Cloud Platform**: `://http-inputs-.splunkcloud.com:443/` +- **Splunk Enterprise**: `://:8088/` Refer to the [Splunk documentation](https://docs.splunk.com/Documentation/Splunk/8.2.2/Data/UsetheHTTPEventCollector) for more information. If your instance is on-premise, specify the appropriate hostname and ensure that your firewall allows the configured port through to your instance. The connections will be coming from this [Egress IP addresses](/email-security/deployment/inline/reference/egress-ips/), if you need them for your access control lists (ACLs) - :::note Ensure that you have a valid SSL certificate configured on your instance. The certificate cannot be expired and cannot be a self-signed certificate. ::: @@ -91,20 +89,20 @@ Additionally, you can search your instance of Splunk for the test event with `in ![Example of a new index added to the configuration](~/assets/images/email-security/siem-integration/splunk/search-instance.png) -## 3. Configure Email Security +## 3. Configure Email security -The next step is to configure Email Security to push the Email Detection Event to the Splunk HTTP Event Collector. +The next step is to configure Email security to push the Email Detection Event to the Splunk HTTP Event Collector. -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/). 2. Go to **Email Configuration** > **Alert Webhooks**, and select **New Webhook**. 3. In the Add Webhooks page, enter the following settings: - * **App type**: Select **SIEM** > **Splunk**, and enter the auth code you took note of the previous step. - * **Target**: Enter the target URI of your Splunk instance. It will typically have the `https://:8088/services/collector` format. Refer to [Request formats](#request-formats) to learn more about how your Splunk subscription affects the URI. - * For the dispositions (`MALICIOUS`, `SUSPICIOUS`, `SPOOF`, `SPAM`, `BULK`) choose which (if any) you want to send to the webhook. Sending `SPAM` and `BULK` dispositions will generate a high number of events. + - **App type**: Select **SIEM** > **Splunk**, and enter the auth code you took note of the previous step. + - **Target**: Enter the target URI of your Splunk instance. It will typically have the `https://:8088/services/collector` format. Refer to [Request formats](#request-formats) to learn more about how your Splunk subscription affects the URI. + - For the dispositions (`MALICIOUS`, `SUSPICIOUS`, `SPOOF`, `SPAM`, `BULK`) choose which (if any) you want to send to the webhook. Sending `SPAM` and `BULK` dispositions will generate a high number of events. 4. Select **Publish Webhook**. Your Splunk integration will now show up in the All Webhooks panel. ![The All Webhooks section will show your Splunk webhook](~/assets/images/email-security/siem-integration/splunk/splunk-webhook-integrations.png) -It will take about ten minutes or so for the configuration to fully propagate through the infrastructure of Email Security (formerly Area 1), and for events to start to appear in your searches. Once the configuration is propagated, events will start to appear in your instance of Splunk. +It will take about ten minutes or so for the configuration to fully propagate through the infrastructure of Email security (formerly Area 1), and for events to start to appear in your searches. Once the configuration is propagated, events will start to appear in your instance of Splunk. diff --git a/src/content/docs/email-security/reporting/siem-integration/sumo-logic-integration-guide.mdx b/src/content/docs/email-security/reporting/siem-integration/sumo-logic-integration-guide.mdx index d1d2be07886d0d7..f657e996ec5df3e 100644 --- a/src/content/docs/email-security/reporting/siem-integration/sumo-logic-integration-guide.mdx +++ b/src/content/docs/email-security/reporting/siem-integration/sumo-logic-integration-guide.mdx @@ -4,14 +4,13 @@ pcx_content_type: integration-guide reviewed: 2023-01-26 head: [] description: Sumo Logic integration guide - --- -import { GlossaryTooltip } from "~/components" +import { GlossaryTooltip } from "~/components"; -When Email Security detects a phishing email, the metadata of the detection can be sent directly into your instance of Sumo Logic. This document outlines the steps required to integrate Email Security with Sumo Logic. +When Email security detects a phishing email, the metadata of the detection can be sent directly into your instance of Sumo Logic. This document outlines the steps required to integrate Email security with Sumo Logic. -![A diagram outlining what happens when Email Security detects a phishing email and sends it to Sumo Logic.](~/assets/images/email-security/siem-integration/sumo-logic/opening-sumo-logic.png) +![A diagram outlining what happens when Email security detects a phishing email and sends it to Sumo Logic.](~/assets/images/email-security/siem-integration/sumo-logic/opening-sumo-logic.png) ## 1. Configure the Sumologic Collector @@ -28,10 +27,9 @@ When Email Security detects a phishingphishing **Alert Webhooks**, and select **New Webhook**. 3. In the Add Webhooks page, enter the following settings: - * **App type**: Select **SIEM** > **Splunk**. In **Auth code**, enter `Sumologic`. - * **Target**: Enter the HTTP endpoint you saved in the previous section. - * For the dispositions (`MALICIOUS`, `SUSPICIOUS`, `SPOOF`, `SPAM`, `BULK`) choose which (if any) you want to send to the webhook. Sending `SPAM` and `BULK` dispositions will generate a high number of events. + - **App type**: Select **SIEM** > **Splunk**. In **Auth code**, enter `Sumologic`. + - **Target**: Enter the HTTP endpoint you saved in the previous section. + - For the dispositions (`MALICIOUS`, `SUSPICIOUS`, `SPOOF`, `SPAM`, `BULK`) choose which (if any) you want to send to the webhook. Sending `SPAM` and `BULK` dispositions will generate a high number of events. 4. Select **Publish Webhook**. Your Sumo Logic integration will now show up in the All Webhooks panel. ![Your Sumo Logic webhook will display in the All Webhooks panel.](~/assets/images/email-security/siem-integration/sumo-logic/all-webhooks.png) -It will take about ten minutes for the configuration to fully propagate through the infrastructure of Email Security, and for events to start to appear in your searches. Once the configuration is propagated, events will start to appear in your instance of Sumo Logic. +It will take about ten minutes for the configuration to fully propagate through the infrastructure of Email security, and for events to start to appear in your searches. Once the configuration is propagated, events will start to appear in your instance of Sumo Logic. -To view logs, hover your mouse over the Email Security Collector, and select **Open in Log Search**. +To view logs, hover your mouse over the Email security Collector, and select **Open in Log Search**. ![View logs in Sumo Logic.](~/assets/images/email-security/siem-integration/sumo-logic/open-log.png) -Once events start to flow, select **New** > **Log search** to search for the detection events with your search criteria (for example, `_collector="Email Security Collector"`). +Once events start to flow, select **New** > **Log search** to search for the detection events with your search criteria (for example, `_collector="Email security Collector"`). ![Search for events.](~/assets/images/email-security/siem-integration/sumo-logic/search-events.png) diff --git a/src/content/docs/email-security/reporting/statistics-overview.mdx b/src/content/docs/email-security/reporting/statistics-overview.mdx index 373e13b1ac2b2d0..c6f1dc455bcd90f 100644 --- a/src/content/docs/email-security/reporting/statistics-overview.mdx +++ b/src/content/docs/email-security/reporting/statistics-overview.mdx @@ -4,23 +4,22 @@ pcx_content_type: how-to head: [] description: Statistics overview allows you to have an at-a-glance overview of emails processed and number of threats detected. - --- To access an overview of your account, total number of emails processed, a breakdown of types of threads detected, among other types of information: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/users/login). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/users/login). 2. Make sure you are in the Home section to review information regarding your account: -| Field | Description | -| ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -| **System stats** |
  • Status of Area 1’s services
  • Uptime of Area 1’s services as well as any downtime
  • Number of processed emails and attacks prevented
| -| **Detection stats** | Statistics regarding the total number of detections made, and emails processed. | -| **Retractions** | Shows the distribution of messages removed from your user's mailboxes. | -| **Phish Submissions Stats** | Statistics regarding the number of phish emails submitted by your users and security operations center (SOC) | -| **Threat Origins** | Top geographical threat origins to your organization. | -| **Org Spoofs** | Shows attacks where names in envelopes differ from the header, as well as spoofed domains. | -| **Domain Proximity** | List of domains similar to your own. | -| **Malicious Threat Type** | Breakdown of malicious threat types. | -| **Email Link Isolation** | How many email were processed by [Email Link Isolation](/email-security/email-configuration/email-policies/link-actions/#email-link-isolation). | -| **Top BEC Targets** | What email addresses are the top targets on the [Business Email Compromise feature](/email-security/email-configuration/enhanced-detections/business-email-compromise/). | +| Field | Description | +| --------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| **System stats** |
  • Status of Area 1’s services
  • Uptime of Area 1’s services as well as any downtime
  • Number of processed emails and attacks prevented
| +| **Detection stats** | Statistics regarding the total number of detections made, and emails processed. | +| **Retractions** | Shows the distribution of messages removed from your user's mailboxes. | +| **Phish Submissions Stats** | Statistics regarding the number of phish emails submitted by your users and security operations center (SOC) | +| **Threat Origins** | Top geographical threat origins to your organization. | +| **Org Spoofs** | Shows attacks where names in envelopes differ from the header, as well as spoofed domains. | +| **Domain Proximity** | List of domains similar to your own. | +| **Malicious Threat Type** | Breakdown of malicious threat types. | +| **Email Link Isolation** | How many email were processed by [Email Link Isolation](/email-security/email-configuration/email-policies/link-actions/#email-link-isolation). | +| **Top BEC Targets** | What email addresses are the top targets on the [Business Email Compromise feature](/email-security/email-configuration/enhanced-detections/business-email-compromise/). | diff --git a/src/content/docs/email-security/reporting/types-malicious-detections.mdx b/src/content/docs/email-security/reporting/types-malicious-detections.mdx index ebe4db46aace0e6..ee1a1ef7877ff99 100644 --- a/src/content/docs/email-security/reporting/types-malicious-detections.mdx +++ b/src/content/docs/email-security/reporting/types-malicious-detections.mdx @@ -4,22 +4,21 @@ pcx_content_type: how-to head: [] description: Types of malicious detections shows you information related to the number and types of malicious detections made on your account. - --- To review the number and type of malicious detections made on your account: -1. Log in to the [Email Security dashboard](https://horizon.area1security.com/users/login). +1. Log in to the [Email security dashboard](https://horizon.area1security.com/users/login). 2. Select the **Email** tab. 3. The **Overview** section will show you graphs with the total number of emails processed, as well as how many of those pertain to different threat categories - such as Malicious or Spam, among others. Refer to [Dispositions and attributes](/email-security/reference/dispositions-and-attributes/) for more information. Select **View Details**. 4. You will open the **Detections** page. This page breaks down the information regarding the various types of threats detected. You have access to: -| Field | Description | -| ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| **Attachments** |
  • How many of the malicious emails received have an attachment.
  • Of these, what are the top types of malicious files received (for example, PDF files).
| -| **Senders** |
  • Total number of malicious senders, as well as a graph showing how they are distributed throughout the month.
  • Top malicious domains.
| -| **Targets** | Top email targets on the [BEC feature](/email-security/email-configuration/enhanced-detections/business-email-compromise/). | -| **New domains** |
  • Total number of malicious domains registered in the past month.
  • Most common top level malicious domains.
| -| **Links** |
  • Total number of malicious links and their distribution throughout the month.
  • Top threat types (for example, credential harvester).
| -| **Threat types** | Top malicious threat types, and their percentage relatively to the total amount of threats received. | -| **Threat origins** | A graph representing where in the world are your top threat origins. | +| Field | Description | +| ------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| **Attachments** |
  • How many of the malicious emails received have an attachment.
  • Of these, what are the top types of malicious files received (for example, PDF files).
| +| **Senders** |
  • Total number of malicious senders, as well as a graph showing how they are distributed throughout the month.
  • Top malicious domains.
| +| **Targets** | Top email targets on the [BEC feature](/email-security/email-configuration/enhanced-detections/business-email-compromise/). | +| **New domains** |
  • Total number of malicious domains registered in the past month.
  • Most common top level malicious domains.
| +| **Links** |
  • Total number of malicious links and their distribution throughout the month.
  • Top threat types (for example, credential harvester).
| +| **Threat types** | Top malicious threat types, and their percentage relatively to the total amount of threats received. | +| **Threat origins** | A graph representing where in the world are your top threat origins. | diff --git a/src/content/docs/fundamentals/manage-members/roles.mdx b/src/content/docs/fundamentals/manage-members/roles.mdx index c110ee78207f7e1..55c2a895e33f550 100644 --- a/src/content/docs/fundamentals/manage-members/roles.mdx +++ b/src/content/docs/fundamentals/manage-members/roles.mdx @@ -28,23 +28,23 @@ Account-scoped roles apply across an entire Cloudflare account, and through all | Cloudflare Access | Can edit [Cloudflare Access](/cloudflare-one/access-controls/policies/) and [Cloudflare Tunnel](/cloudflare-one/networks/connectors/cloudflare-tunnel/). | | Cache Purge | Can purge the edge cache and allows the reading of zone settings. | | Cloudflare DEX | Can edit [Cloudflare DEX](/cloudflare-one/insights/dex/). | -| Cloudflare Gateway | Can edit [Cloudflare Gateway](/cloudflare-one/traffic-policies/) and read [Access](/cloudflare-one/integrations/identity-providers/). | +| Cloudflare Gateway | Can edit [Cloudflare Gateway](/cloudflare-one/traffic-policies/) and read [Access](/cloudflare-one/integrations/identity-providers/). | | Cloudflare Images | Can access [Cloudflare Images](/images/) data. | | Cloudflare R2 Admin | Can edit Cloudflare [R2](/r2/) buckets, objects, and associated configurations. | | Cloudflare R2 Read | Can read Cloudflare [R2](/r2/) buckets, objects, and associated configurations. | | Cloudflare Stream | Can edit [Cloudflare Stream](/stream/) media. | -| Cloudflare Zero Trust | Can edit [Cloudflare Zero Trust](/cloudflare-one/). Grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email Security. | +| Cloudflare Zero Trust | Can edit [Cloudflare Zero Trust](/cloudflare-one/). Grants administrator access to all Zero Trust products including Access, Gateway, WARP, Tunnel, Browser Isolation, CASB, DLP, DEX, and Email security. | | Cloudflare Zero Trust DNS Locations Write | Can view [Gateway DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/#secure-dns-locations) and create and edit [secure DNS locations](/cloudflare-one/team-and-resources/devices/agentless/dns/locations/#secure-dns-locations). | | Cloudflare Zero Trust PII | Can access [Cloudflare Zero Trust](/cloudflare-one/) PII. | | Cloudflare Zero Trust Read Only | Can access [Cloudflare Zero Trust](/cloudflare-one/) read only mode. | | Cloudflare Zero Trust Reporting | Can access [Cloudflare Zero Trust](/cloudflare-one/) reporting data. | | DNS | Can edit [DNS records](/dns/manage-dns-records/). | -| Email Configuration Admin | Grants administrator access to Email Security. Cannot take actions on emails, or read emails. | +| Email Configuration Admin | Grants administrator access to Email security. Cannot take actions on emails, or read emails. | | Email Integration Admin | Grants read and write access to integrations only. | -| Email Security Analyst | Grants analyst access. Can take action on emails and read emails. | -| Email Security Read Only | Grants read only access to all of Email Security. | -| Email Security Reporting | Grants read access to Email Security metrics. | -| Email Security Policy Admin | Grants read access to all settings, and write access to [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) | +| Email security Analyst | Grants analyst access. Can take action on emails and read emails. | +| Email security Read Only | Grants read only access to all of Email security. | +| Email security Reporting | Grants read access to Email security metrics. | +| Email security Policy Admin | Grants read access to all settings, and write access to [allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/), [trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/), and [blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) | | Firewall | Can edit [WAF](/waf/), [IP Access rules](/waf/tools/ip-access-rules/), [Zone Lockdown](/waf/tools/zone-lockdown/) settings, and [Cache Rules](/cache/how-to/cache-rules/). | | Load Balancer | Can edit [Load Balancers](/load-balancing/), Pools, Origins, and Health Checks. | | Log Share | Can edit [Log Share](/logs/) configuration. | diff --git a/src/content/docs/fundamentals/reference/policies-compliances/cybersafe.mdx b/src/content/docs/fundamentals/reference/policies-compliances/cybersafe.mdx index e2cb88347ce7d8e..e503c2613164fcb 100644 --- a/src/content/docs/fundamentals/reference/policies-compliances/cybersafe.mdx +++ b/src/content/docs/fundamentals/reference/policies-compliances/cybersafe.mdx @@ -5,7 +5,7 @@ title: Project Cybersafe Schools import { Render } from "~/components"; -Project Cybersafe Schools grants eligible schools with free access to Cloudflare's [Email Security](/email-security/) and [Gateway](/cloudflare-one/traffic-policies/) products. +Project Cybersafe Schools grants eligible schools with free access to Cloudflare's [Email security](/email-security/) and [Gateway](/cloudflare-one/traffic-policies/) products. ## School Eligibility diff --git a/src/content/docs/learning-paths/cybersafe/account-creation/create-cloudflare-account.mdx b/src/content/docs/learning-paths/cybersafe/account-creation/create-cloudflare-account.mdx index c8e31f9e60f666b..2e503ce4a7dc030 100644 --- a/src/content/docs/learning-paths/cybersafe/account-creation/create-cloudflare-account.mdx +++ b/src/content/docs/learning-paths/cybersafe/account-creation/create-cloudflare-account.mdx @@ -3,7 +3,6 @@ title: Create a Cloudflare account pcx_content_type: learning-unit sidebar: order: 1 - --- To create a new Cloudflare account: @@ -13,6 +12,6 @@ To create a new Cloudflare account: 2. To secure your account, enable [two-factor authentication](/fundamentals/user-profiles/2fa/). 3. After your account is accepted into the Cybersafe Schools program, you can to reach out to your Cloudflare contact and ask them to set up your account as a multi-user organization. This will allow you to define [role based access](/fundamentals/manage-members/roles/) controls. For this project, account members will need: - * [**Gateway** permissions](/cloudflare-one/roles-permissions/) to read or edit DNS policies. - * [**PII** permissions](/cloudflare-one/roles-permissions/#cloudflare-zero-trust-pii) to view user information in DNS logs. - * [**Configuration** permissions](/email-security/account-setup/permissions/) for Area 1 Email Security. + - [**Gateway** permissions](/cloudflare-one/roles-permissions/) to read or edit DNS policies. + - [**PII** permissions](/cloudflare-one/roles-permissions/#cloudflare-zero-trust-pii) to view user information in DNS logs. + - [**Configuration** permissions](/email-security/account-setup/permissions/) for Area 1 Email security. diff --git a/src/content/docs/learning-paths/cybersafe/account-creation/create-email-security-account.mdx b/src/content/docs/learning-paths/cybersafe/account-creation/create-email-security-account.mdx index 94379ae241fc16f..f01e95d2da0338a 100644 --- a/src/content/docs/learning-paths/cybersafe/account-creation/create-email-security-account.mdx +++ b/src/content/docs/learning-paths/cybersafe/account-creation/create-email-security-account.mdx @@ -1,18 +1,17 @@ --- -title: Create an Email Security account +title: Create an Email security account pcx_content_type: learning-unit sidebar: order: 3 - --- -To create your Email Security account, you will need the alphanumeric string on the URL when logged in to the Cloudflare dashboard. +To create your Email security account, you will need the alphanumeric string on the URL when logged in to the Cloudflare dashboard. -Once you have created your [Cloudflare account](/learning-paths/cybersafe/account-creation/create-cloudflare-account/), your account team will create an Email Security account for you. +Once you have created your [Cloudflare account](/learning-paths/cybersafe/account-creation/create-cloudflare-account/), your account team will create an Email security account for you. To establish your tenant, you will need the following information: - Average monthly inbound message volume - Number of active email users - At least one domain -- Admin email address \ No newline at end of file +- Admin email address diff --git a/src/content/docs/learning-paths/cybersafe/concepts/cipa-overview.mdx b/src/content/docs/learning-paths/cybersafe/concepts/cipa-overview.mdx index 3424077efa23016..310b5542f8cd1d7 100644 --- a/src/content/docs/learning-paths/cybersafe/concepts/cipa-overview.mdx +++ b/src/content/docs/learning-paths/cybersafe/concepts/cipa-overview.mdx @@ -3,12 +3,11 @@ title: Project Cybersafe Schools and CIPA pcx_content_type: learning-unit sidebar: order: 2 - --- -import { Render } from "~/components" +import { Render } from "~/components"; -Project Cybersafe Schools (PCS) grants eligible schools free access to Cloudflare’s Email Security and Gateway products. +Project Cybersafe Schools (PCS) grants eligible schools free access to Cloudflare’s Email security and Gateway products. Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact schools’ ability to safely perform a basic function – teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. diff --git a/src/content/docs/learning-paths/cybersafe/concepts/what-is-email-security.mdx b/src/content/docs/learning-paths/cybersafe/concepts/what-is-email-security.mdx index dd908a5a34d733a..289b44337456f93 100644 --- a/src/content/docs/learning-paths/cybersafe/concepts/what-is-email-security.mdx +++ b/src/content/docs/learning-paths/cybersafe/concepts/what-is-email-security.mdx @@ -1,13 +1,12 @@ --- -title: What is Email Security? +title: What is Email security? pcx_content_type: learning-unit sidebar: order: 5 - --- -import { Render } from "~/components" +import { Render } from "~/components"; Despite email's importance as a communication method, security and privacy were not built into the [The Simple Mail Transfer Protocol (SMTP) protocol](https://www.cloudflare.com/learning/email-security/what-is-smtp/). As a result, email is a major attack vector. -Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery, and filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/). \ No newline at end of file +Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery, and filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/). diff --git a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/api-deployment.mdx b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/api-deployment.mdx index 1e180e369e84c8e..3b6956dc08a4265 100644 --- a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/api-deployment.mdx +++ b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/api-deployment.mdx @@ -3,17 +3,16 @@ title: Deploy via Microsoft Graph API pcx_content_type: learning-unit sidebar: order: 2 - --- -import { Render } from "~/components" +import { Render } from "~/components"; -An API deployment model with Email Security has multiple benefits for Microsoft 365 Customers. +An API deployment model with Email security has multiple benefits for Microsoft 365 Customers. -The API deployment with Email Security offers: +The API deployment with Email security offers: - Easy protection for complex email architectures, without requiring any change to mail flow operations. - Agentless deployment for Microsoft 365. - Office 365 directory integration to retrieve user and group information and prevent user impersonation. -![Microsoft 365 API deployment diagram](~/assets/images/learning-paths/secure-o365-email/ms365-api-deployment.png) \ No newline at end of file +![Microsoft 365 API deployment diagram](~/assets/images/learning-paths/secure-o365-email/ms365-api-deployment.png) diff --git a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/email-security-next-steps.mdx b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/email-security-next-steps.mdx index 2227f6a7c112a81..ba3812d1d9126dd 100644 --- a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/email-security-next-steps.mdx +++ b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/email-security-next-steps.mdx @@ -5,14 +5,14 @@ sidebar: order: 4 --- -Now that you have learned how Email Security can protect your inbox from phishing attacks, refer to the following resources to onboard and enhance your email security posture: +Now that you have learned how Email security can protect your inbox from phishing attacks, refer to the following resources to onboard and enhance your email security posture: | Resource | Description | | ------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | [Phish submissions](/cloudflare-one/email-security/settings/phish-submissions/) | As part of your continuous email security posture, administrators and security analysts need to submit missed phish samples so Cloudflare can process them and take necessary action. | | [API integration](/cloudflare-one/email-security/setup/post-delivery-deployment/api/) | Onboard your domain via API deployment. | | [Impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/) | The impersonation registry contains combinations of emails of users who are likely to be impersonated. | -| [Trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/) | Trusted domains allows you to identify domains that should be exempted from Email Security detections. | +| [Trusted domains](/cloudflare-one/email-security/settings/detection-settings/trusted-domains/) | Trusted domains allows you to identify domains that should be exempted from Email security detections. | | [Allow policies](/cloudflare-one/email-security/settings/detection-settings/allow-policies/) | Allow policies exempt messages that match certain patterns from normal detection scanning. | | [Blocked senders](/cloudflare-one/email-security/settings/detection-settings/blocked-senders/) | Blocked senders can mark all messages from specific senders with a `MALICIOUS` disposition. | | [PhishGuard](/cloudflare-one/email-security/phishguard/) | PhishGuard is a managed email security service that provides resources for end-to-end phish and targeted attack management and response. | diff --git a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/index.mdx b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/index.mdx index d686dcd9629e83f..3f708ac776f5939 100644 --- a/src/content/docs/learning-paths/cybersafe/email-security-onboarding/index.mdx +++ b/src/content/docs/learning-paths/cybersafe/email-security-onboarding/index.mdx @@ -1,9 +1,8 @@ --- -title: Onboarding Email Security +title: Onboarding Email security pcx_content_type: overview sidebar: order: 3 - --- Continue securing your environment by protecting against email phishing attacks. diff --git a/src/content/docs/learning-paths/secure-o365-email/concepts/index.mdx b/src/content/docs/learning-paths/secure-o365-email/concepts/index.mdx index 78a97779863bb33..46bfe409a1a62aa 100644 --- a/src/content/docs/learning-paths/secure-o365-email/concepts/index.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/concepts/index.mdx @@ -5,12 +5,12 @@ sidebar: order: 1 --- -Review the concepts behind Cloudflare's Email Security. +Review the concepts behind Cloudflare's Email security. ## Objectives By the end of this module, you will be able to: -* Explain how Cloudflare works. -* Describe what Email Security is. -* Understand how Cloudflare prevents email-based phishing attacks. \ No newline at end of file +- Explain how Cloudflare works. +- Describe what Email security is. +- Understand how Cloudflare prevents email-based phishing attacks. diff --git a/src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx b/src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx index 5fba8cc5e8ca621..691556c473f0f82 100644 --- a/src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/concepts/prevent-phishing-attack.mdx @@ -5,7 +5,7 @@ sidebar: order: 5 --- -Cloudflare Email Security uses a variety of factors to determine whether a given email message attachment, URL, or specific network traffic is part of a phishing campaign. +Cloudflare Email security uses a variety of factors to determine whether a given email message attachment, URL, or specific network traffic is part of a phishing campaign. These small pattern assessments are dynamic in nature. Cloudflare's automated systems use a combination of factors to clearly distinguish between a valid phishing campaign and benign traffic. @@ -17,4 +17,4 @@ In a BEC attack, the attacker falsifies an email message to trick the victim int To detect these low volume, malicious emails that do not contain malware, malicious links or email attachments, Cloudflare analyzes the email thread, content, sentiment and context via message lexical analysis, subject analysis and sender analysis. Display names are also compared with known executive names for similarity using several matching models. -Refer to [How we detect phish](/email-security/reference/how-we-detect-phish/#sample-attack-types-and-detections) to learn more about additional attack types and detections. \ No newline at end of file +Refer to [How we detect phish](/email-security/reference/how-we-detect-phish/#sample-attack-types-and-detections) to learn more about additional attack types and detections. diff --git a/src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx b/src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx index 1a47f83a3eab721..c64531b8dbb5be8 100644 --- a/src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/concepts/protect-from-phishing-attacks.mdx @@ -13,4 +13,4 @@ As organizations continue to adopt Microsoft 365 to enhance communication and co Analysts agree that consolidating capabilities to minimize overlapping functionality is helping organizations reduce cost and complexity. However, they also advise organizations to carefully assess native features to ensure they satisfy all use cases. As Microsoft continues to build out its essential email security features, the growing overlap with SEGs has given organizations an opportunity to streamline security operations by leveraging capabilities already included in their E3 or E5 license. -This shift enables organizations to eliminate complex and costly SEG deployments, redirecting a fraction of that budget to integrate lightweight solutions that effectively address the most dangerous phishing threats. Cloudflare Email Security provides an integrated, low-touch solution that augments Microsoft 365 using machine learning threat analysis to automate the detection of BEC and multi-channel attacks. \ No newline at end of file +This shift enables organizations to eliminate complex and costly SEG deployments, redirecting a fraction of that budget to integrate lightweight solutions that effectively address the most dangerous phishing threats. Cloudflare Email security provides an integrated, low-touch solution that augments Microsoft 365 using machine learning threat analysis to automate the detection of BEC and multi-channel attacks. diff --git a/src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx b/src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx index 904f8c50f9be43a..85345caef6e4ff9 100644 --- a/src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/concepts/what-is-email-security.mdx @@ -1,5 +1,5 @@ --- -title: What is Email Security? +title: What is Email security? pcx_content_type: overview sidebar: order: 4 @@ -7,4 +7,4 @@ sidebar: Despite email's importance as a communication method, security and privacy were not built into the [The Simple Mail Transfer Protocol (SMTP) protocol](https://www.cloudflare.com/learning/email-security/what-is-smtp/). As a result, email is a major attack vector. -Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery, and filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/). \ No newline at end of file +Email security is the process of preventing [email-based](https://www.cloudflare.com/learning/email-security/what-is-email/) cyber attacks and unwanted communications. It spans protecting inboxes from takeover, protecting domains from [spoofing](https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/), stopping [phishing attacks](https://www.cloudflare.com/learning/access-management/phishing-attack/), preventing fraud, blocking [malware](https://www.cloudflare.com/learning/ddos/glossary/malware/) delivery, and filtering [spam](https://www.cloudflare.com/learning/email-security/how-to-stop-spam-emails/). diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/active-directory-sync.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/active-directory-sync.mdx index dcdc5e415c8b461..cae02d5b8af1be5 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/active-directory-sync.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/active-directory-sync.mdx @@ -5,7 +5,7 @@ sidebar: order: 2 --- -Directories are folders to store user data. Email Security allows you to manage directories from the Cloudflare dashboard. +Directories are folders to store user data. Email security allows you to manage directories from the Cloudflare dashboard. To manage a Microsoft directory: @@ -15,7 +15,7 @@ To manage a Microsoft directory: 4. Under **Directory name**, select **MS directory**. 5. From here, you can manage **Groups** or **Users** directories. -Email Security allows you to view and manage your groups directory and their [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). +Email security allows you to view and manage your groups directory and their [impersonation registry](/cloudflare-one/email-security/settings/detection-settings/impersonation-registry/). When a group is added to the registry, all members are registered by default. To manage your group directory, on the **MS directory** page, select **Groups**. @@ -31,7 +31,7 @@ To add multiple groups to the registry at once: 2. Select the **Action** dropdown list. 3. Select **Add to registry**. -In addition, Email Security allows you to: +In addition, Email security allows you to: - [Remove groups from the registry](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory/#remove-groups-from-registry). - [Filter the impersonation registry](/cloudflare-one/email-security/directories/manage-integrated-directories/manage-groups-directory/#filter-impersonation-registry). diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/audit-logs.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/audit-logs.mdx index 30b8ad44c32e6bc..72497bda44a53bb 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/audit-logs.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/audit-logs.mdx @@ -5,7 +5,7 @@ sidebar: order: 6 --- -With Email Security, you can enable logs to review actions performed on your account. +With Email security, you can enable logs to review actions performed on your account. To enable audit logs: @@ -13,9 +13,11 @@ To enable audit logs: 2. Select **Analytics & Logs** > **Logpush**. 3. Select **Audit logs**. 4. Under **Configure logpush job**: - - **Job name**: Enter the job name. - - **If logs match**: Select Filtered logs: - - **Field**: Choose `ResourceType`. - - **Operator**: Choose `starts with`. - - **Value**: Enter `email_security`. -5. Select **Submit**. \ No newline at end of file + +- **Job name**: Enter the job name. +- **If logs match**: Select Filtered logs: + - **Field**: Choose `ResourceType`. + - **Operator**: Choose `starts with`. + - **Value**: Enter `email_security`. + +5. Select **Submit**. diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx index 8c6dd028f237966..273d91973b96f8c 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/create-allow-policies.mdx @@ -5,12 +5,12 @@ sidebar: order: 3 --- -Email Security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning. +Email security allows you to configure allow policies. An allow policy exempts messages that match certain patterns from normal detection scanning. -You can choose how Email Security will handle messages that match your criteria: +You can choose how Email security will handle messages that match your criteria: -- **Trusted Sender**: Messages will bypass all [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) and link following. Typically, it only applies to phishing simulations from vendors such as KnowBe4. Many emails contain links in them. Some of these could be links to surveys, phishing simulations and other trackable links. By marking a message as a Trusted Sender, Email Security will not scan any attachments from the sender and will not attempt to open the links in the emails. -- **Exempt Recipient**: Messages will be exempt from all Email Security [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) intended for recipients matching this pattern (email address or regular expression only). Typically, this only applies to submission mailboxes for user reporting to security. +- **Trusted Sender**: Messages will bypass all [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) and link following. Typically, it only applies to phishing simulations from vendors such as KnowBe4. Many emails contain links in them. Some of these could be links to surveys, phishing simulations and other trackable links. By marking a message as a Trusted Sender, Email security will not scan any attachments from the sender and will not attempt to open the links in the emails. +- **Exempt Recipient**: Messages will be exempt from all Email security [detections](/cloudflare-one/email-security/reference/dispositions-and-attributes/) intended for recipients matching this pattern (email address or regular expression only). Typically, this only applies to submission mailboxes for user reporting to security. - **Accept Sender**: Messages will exempt messages from the `SPAM`, `SPOOF`, and `BULK` [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/) (but not `MALICIOUS` or `SUSPICIOUS`). Commonly used for external domains and sources that send mail on behalf of your organization, such as marketing emails or internal tools. ## Configure allow policies @@ -18,22 +18,22 @@ You can choose how Email Security will handle messages that match your criteria: To configure allow policies: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**, then go to **Detection settings** > **Allow policies**. 4. On the **Detection settings** page, select **Add a policy**. 5. On the **Add an allow policy** page, enter the policy information: - - **Input method**: Choose between **Manual input**, and **Uploading an allow policy**: - - **Manual input**: - - **Action**: Select one of the following to choose how Email Security will handle messages that match your criteria: - - **Trust sender**: Messages will bypass all detections and link following. - - **Exempt recipient**: Message to this recipient will bypass all detections. - - **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. - - **Rule type**: Specify the scope of your policy. Choose one of the following: - - **Email addresses**: Must be a valid email. - - **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. - - **Domains**: Must be a valid domain. - - **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email. - - **(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email Security will only honor policies that pass authentication. - - **Notes**: Provide additional information about your allow policy. - - **Uploading an allow policy**: Upload a file no larger than 150 KB. The file can only contain `Pattern`, `Notes`, `Verify Email`, `Trusted Sender`, `Exempt Recipient`, and `Acceptable Sender` fields. The first row must be a header row. -6. Select **Save**. \ No newline at end of file + - **Input method**: Choose between **Manual input**, and **Uploading an allow policy**: + - **Manual input**: + - **Action**: Select one of the following to choose how Email security will handle messages that match your criteria: + - **Trust sender**: Messages will bypass all detections and link following. + - **Exempt recipient**: Message to this recipient will bypass all detections. + - **Accept sender**: Messages from this sender will be exempted from Spam, Spoof, and Bulk dispositions. + - **Rule type**: Specify the scope of your policy. Choose one of the following: + - **Email addresses**: Must be a valid email. + - **IP addresses**: Can only be IPv4. IPv6 and CIDR are invalid entries. + - **Domains**: Must be a valid domain. + - **Regular expressions**: Must be valid Java expressions. Regular expressions are matched with fields related to the sender email address (envelope from, header from, reply-to), the originating IP address, and the server name for the email. + - **(Recommended) Sender verification**: This option enforces DMARC, SPF, or DKIM authentication. If you choose to enable this option, Email security will only honor policies that pass authentication. + - **Notes**: Provide additional information about your allow policy. + - **Uploading an allow policy**: Upload a file no larger than 150 KB. The file can only contain `Pattern`, `Notes`, `Verify Email`, `Trusted Sender`, `Exempt Recipient`, and `Acceptable Sender` fields. The first row must be a header row. +6. Select **Save**. diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/impersonation-registry.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/impersonation-registry.mdx index d2eb18dbf8e6ae7..7e5833b3f7d9506 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/impersonation-registry.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/impersonation-registry.mdx @@ -7,12 +7,12 @@ sidebar: Attackers often try to impersonate executives within an organization when sending malicious emails (with requests about banking information, trade secrets, and more), which is known as a [Business Email Compromise (BEC)](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/) attack. -The impersonation registry protects against these attacks by looking for spoofs of known key users in an organization. Information about key users you either synced with your directory or entered manually in the dashboard is used by Email Security to run enhanced scan techniques and find these spoofed emails. +The impersonation registry protects against these attacks by looking for spoofs of known key users in an organization. Information about key users you either synced with your directory or entered manually in the dashboard is used by Email security to run enhanced scan techniques and find these spoofed emails. To add a user to the impersonation registry: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings** > **Impersonation registry**. 4. Select **Add a user**. 5. Select **Input method**: Choose between **Manual input**, **Upload manual list**, and **Select from existing directories**: diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/index.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/index.mdx index a4de6e0f487533b..2d5aa86ed6d7248 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/index.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/index.mdx @@ -1,10 +1,10 @@ --- -title: Configure Email Security +title: Configure Email security pcx_content_type: overview sidebar: order: 3 --- -With Email Security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up Email Security. +With Email security, there is limited manual configuration and tuning. The Active Directory sync, allow policies, and additional detections are important to consider when you set up Email security. -In this module, you will configure your email environment. \ No newline at end of file +In this module, you will configure your email environment. diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/report-phish.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/report-phish.mdx index b9c254825300b6b..620ebb77f4812ba 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/report-phish.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/report-phish.mdx @@ -5,9 +5,9 @@ sidebar: order: 5 --- -Before deploying Email Security to production, you will have to consider reporting any phishing attacks, evaluating which disposition to assign a specific message, and using different screen criteria to search through your inbox. +Before deploying Email security to production, you will have to consider reporting any phishing attacks, evaluating which disposition to assign a specific message, and using different screen criteria to search through your inbox. -PhishNet is an add-in button that helps users to submit phish samples missed by Email Security detection. +PhishNet is an add-in button that helps users to submit phish samples missed by Email security detection. To set up PhishNet O365: @@ -18,4 +18,5 @@ To set up PhishNet O365: ```txt https://phishnet-o365.area1cloudflare-webapps.workers.dev?clientId=ODcxNDA0MjMyNDM3NTA4NjQwNDk1Mzc3MDIxNzE0OTcxNTg0Njk5NDEyOTE2NDU5ODQyNjU5NzYzNjYyNDQ3NjEwMzIxODEyMDk1NQ ``` -4. Verify and complete the wizard. \ No newline at end of file + +4. Verify and complete the wizard. diff --git a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx index 17ae4253e32168e..3007ab7939026ea 100644 --- a/src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/configure-email-security/set-additional-detections.mdx @@ -5,7 +5,7 @@ sidebar: order: 4 --- -Email Security allows you to configure the following additional detections: +Email security allows you to configure the following additional detections: - [Domain age](/cloudflare-one/email-security/settings/detection-settings/additional-detections/#configure-domain-age) - [Blank email detection](/cloudflare-one/email-security/settings/detection-settings/additional-detections/#configure-blank-email-detection) @@ -15,7 +15,7 @@ Email Security allows you to configure the following additional detections: To configure additional detections: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Settings**. 4. On the Settings page, go to **Detection settings** > **Additional detections**, and select **Edit**. diff --git a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx index 19ff3c47a24a030..18f0cbcec6fb445 100644 --- a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/configure-auto-moves.mdx @@ -13,12 +13,12 @@ To configure auto-move events: 4. Select **Moves**. 5. Under **Auto-moves**, select **Configure**. 6. Assign actions based on malicious, spoof, suspicious, spam, and bulk dispositions. Select among: - - **Soft delete - user recoverable**: Moves the message to the user's **Recoverable Items - Deleted** folder. Messages can be recovered by the user. - - **Hard delete - admin recoverable**: Completely deletes messages from a user's inbox. - - **Move to trash**: Moves messages to the trash or deleted items email folder. - - **Move to junk**: Moves the message to the junk or spam folder. - - **No action**: Messages stay in the origin folder. + - **Soft delete - user recoverable**: Moves the message to the user's **Recoverable Items - Deleted** folder. Messages can be recovered by the user. + - **Hard delete - admin recoverable**: Completely deletes messages from a user's inbox. + - **Move to trash**: Moves messages to the trash or deleted items email folder. + - **Move to junk**: Moves the message to the junk or spam folder. + - **No action**: Messages stay in the origin folder. 7. Select **Post-delivery** moves: - - **(Recommended) Post-delivery response**: Enabling this option allows Email Security to rescan delivered emails at multiple time intervals for previously unknown phishing sites or campaigns. - - **(Recommended) Phish submission response**: Enabling this option allows Email Security to move emails that your users reported as phishing and Email Security determined to be malicious. -8. Select **Save**. \ No newline at end of file + - **(Recommended) Post-delivery response**: Enabling this option allows Email security to rescan delivered emails at multiple time intervals for previously unknown phishing sites or campaigns. + - **(Recommended) Phish submission response**: Enabling this option allows Email security to move emails that your users reported as phishing and Email security determined to be malicious. +8. Select **Save**. diff --git a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions.mdx b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions.mdx index 9daa8645f1f216e..390c233d8d94060 100644 --- a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions.mdx @@ -7,6 +7,6 @@ sidebar: import { Render } from "~/components"; -Email Security returns five potential verdicts for every email it scans. Review the detections and consider how you would treat them once an auto-move is enabled. Below is an overview of the disposition and recommendation actions by Cloudflare: +Email security returns five potential verdicts for every email it scans. Review the detections and consider how you would treat them once an auto-move is enabled. Below is an overview of the disposition and recommendation actions by Cloudflare: diff --git a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/index.mdx b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/index.mdx index 771d374410658ed..69c1f266451d216 100644 --- a/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/index.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/enable-auto-moves/index.mdx @@ -11,8 +11,8 @@ Now that you have set up your email environment, you can enable auto-move events Ensure you have completed the previous modules before enabling auto-moves. ::: -Auto-move events are events where emails are automatically moved to different inboxes based on the disposition assigned to them by Email Security. +Auto-move events are events where emails are automatically moved to different inboxes based on the disposition assigned to them by Email security. When you set up auto-moves, you can move messages manually or set up automatic moves to send messages matching certain [dispositions](/learning-paths/secure-o365-email/enable-auto-moves/email-dispositions/) to specific folders within a user's mailbox. -You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email Security. Scanned emails that were previously delivered and now match this new phishing information will be moved. \ No newline at end of file +You can also enable Post Delivery Response and Phish Submission Response to re-evaluate messages previously delivered against new information gathered by Email security. Scanned emails that were previously delivered and now match this new phishing information will be moved. diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/create-email-security-account.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/create-email-security-account.mdx index bc7e43c74859fad..8e3e820926146e3 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/create-email-security-account.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/create-email-security-account.mdx @@ -1,19 +1,19 @@ --- -title: Create an Email Security account +title: Create an Email security account pcx_content_type: overview sidebar: order: 3 --- -To create your Email Security account, you will need the alphanumeric string on the URL when logged in to the Cloudflare dashboard. +To create your Email security account, you will need the alphanumeric string on the URL when logged in to the Cloudflare dashboard. If you do not have a Cloudflare account, you can create one for free by referring to the [Cloudflare sign-up page](https://dash.cloudflare.com/sign-up). -Once you have created your account, your account team will create an Email Security account for you. +Once you have created your account, your account team will create an Email security account for you. To establish your tenant, you will need the following information: - Average monthly inbound message volume - Number of active email users - At least one domain -- Admin email address \ No newline at end of file +- Admin email address diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/deployment-models.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/deployment-models.mdx index 93e67e4077b81e7..b0ea7fd86fc4064 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/deployment-models.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/deployment-models.mdx @@ -5,8 +5,8 @@ sidebar: order: 4 --- -While there are multiple deployment methods, the easiest way to get started with Email Security is via the API deployment method. +While there are multiple deployment methods, the easiest way to get started with Email security is via the API deployment method. -When you choose the [API deployment](/cloudflare-one/email-security/setup/post-delivery-deployment/api/), Email Security can both scan and take actions on emails after they have reached a user's inbox. +When you choose the [API deployment](/cloudflare-one/email-security/setup/post-delivery-deployment/api/), Email security can both scan and take actions on emails after they have reached a user's inbox. -With a [Journaling setup](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/) alone without API integration, Email Security can only scan emails after it has reached a user's inbox. \ No newline at end of file +With a [Journaling setup](/cloudflare-one/email-security/setup/post-delivery-deployment/bcc-journaling/journaling-setup/m365-journaling/) alone without API integration, Email security can only scan emails after it has reached a user's inbox. diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/index.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/index.mdx index c91a9cbe5b24be9..935e358f3e34fc5 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/index.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/index.mdx @@ -1,14 +1,14 @@ --- -title: Get started with Email Security +title: Get started with Email security pcx_content_type: overview sidebar: order: 1 --- -In this learning path, you will learn how to protect your organization from phishing attacks with Email Security. +In this learning path, you will learn how to protect your organization from phishing attacks with Email security. Your users will experience a reduction in spam and phishing emails, and have simple ways to report any suspicious activity. -Administrators will be able to review detections and phishing trends that target their organization without having to tune Email Security. +Administrators will be able to review detections and phishing trends that target their organization without having to tune Email security. -This module will kickstart your email flow. \ No newline at end of file +This module will kickstart your email flow. diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/initial-login.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/initial-login.mdx index 2c5997161ab2ccb..ed495e0340285b9 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/initial-login.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/initial-login.mdx @@ -5,6 +5,6 @@ sidebar: order: 3 --- -Once your tenant is created by your account team, you will receive an email that grants you access to the Email Security platform. +Once your tenant is created by your account team, you will receive an email that grants you access to the Email security platform. -Multi-factor authentication is required, so you will need an authenticator tool to set up your second factor prior to gaining access. Scan the QR code, set up your second factor, create a new password, and enter the Email Security portal. \ No newline at end of file +Multi-factor authentication is required, so you will need an authenticator tool to set up your second factor prior to gaining access. Scan the QR code, set up your second factor, create a new password, and enter the Email security portal. diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/recommended-deployment-model.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/recommended-deployment-model.mdx index ba96d0cb0358e3b..1029e08f98a9b79 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/recommended-deployment-model.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/recommended-deployment-model.mdx @@ -5,12 +5,12 @@ sidebar: order: 5 --- -An API deployment model with Email Security has multiple benefits for Microsoft 365 Customers. +An API deployment model with Email security has multiple benefits for Microsoft 365 Customers. -The API deployment with Email Security offers: +The API deployment with Email security offers: - Easy protection for complex email architectures, without requiring any change to mail flow operations. - Agentless deployment for Microsoft 365. - Office 365 directory integration to retrieve user and group information and prevent user impersonation. -![Microsoft 365 API deployment diagram](~/assets/images/learning-paths/secure-o365-email/ms365-api-deployment.png) \ No newline at end of file +![Microsoft 365 API deployment diagram](~/assets/images/learning-paths/secure-o365-email/ms365-api-deployment.png) diff --git a/src/content/docs/learning-paths/secure-o365-email/get-started/setup-ms-graph-api.mdx b/src/content/docs/learning-paths/secure-o365-email/get-started/setup-ms-graph-api.mdx index 0568401a29c5895..77e9a66a09b5ba4 100644 --- a/src/content/docs/learning-paths/secure-o365-email/get-started/setup-ms-graph-api.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/get-started/setup-ms-graph-api.mdx @@ -6,14 +6,14 @@ sidebar: --- 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Email Security**. +2. Select **Email security**. 3. Select **Monitoring**. 4. Enable **Microsoft Integration**: - 1. **Name integration**: Add your integration name, then select **Continue**. - 2. **Authorize integration**: - - Select **Authorize**. Selecting **Authorize** will take you to the Microsoft Sign in page where you will have to enter your email address. - - Once you enter your email address, select **Next**. - - After selecting **Next**, the system will show a dialog box with a list of requested permissions. Select **Accept** to authorize Email Security. Upon authorization, you will be redirected to a page where you can review details and enroll integration. - 3. **Review details**: Review your integration details, then: - - Select **Complete Email Security set up** where you will be able to connect your domains and configure auto-moves. - - Select **Continue to Email Security**. \ No newline at end of file + 1. **Name integration**: Add your integration name, then select **Continue**. + 2. **Authorize integration**: + - Select **Authorize**. Selecting **Authorize** will take you to the Microsoft Sign in page where you will have to enter your email address. + - Once you enter your email address, select **Next**. + - After selecting **Next**, the system will show a dialog box with a list of requested permissions. Select **Accept** to authorize Email security. Upon authorization, you will be redirected to a page where you can review details and enroll integration. + 3. **Review details**: Review your integration details, then: + - Select **Complete Email security set up** where you will be able to connect your domains and configure auto-moves. + - Select **Continue to Email security**. diff --git a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/index.mdx b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/index.mdx index aa9b07bc2ffc08d..1b43eb8f27a9f02 100644 --- a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/index.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/index.mdx @@ -8,9 +8,9 @@ sidebar: To access an overview of your account, the total number of emails processed, a breakdown of types of threads detected, and other useful information: 1. Log in to [Zero Trust.](https://one.dash.cloudflare.com/) -2. Select **Email Security**. +2. Select **Email security**. -Under **Email Security**, select **Monitoring**. +Under **Email security**, select **Monitoring**. The dashboard will display the following metrics: diff --git a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/monitor-detections.mdx b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/monitor-detections.mdx index e901a8619484cc1..5a06c7e7c4d681e 100644 --- a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/monitor-detections.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/monitor-detections.mdx @@ -5,7 +5,7 @@ sidebar: order: 2 --- -Spam and Malicious emails are blocked outright by Email Security, but Suspicious and Spoof dispositions should be monitored. Suspicious messages should be investigated by a security analyst to determine the legitimacy of the message. +Spam and Malicious emails are blocked outright by Email security, but Suspicious and Spoof dispositions should be monitored. Suspicious messages should be investigated by a security analyst to determine the legitimacy of the message. [PhishGuard](/cloudflare-one/email-security/phishguard/) (Cloudflare's managed email security service) can review these messages for you and move them from the end user inbox if they are deemed malicious. @@ -18,9 +18,9 @@ In most cases, a Spoof disposition is triggered by a legitimate third-party mail ## Search email messages -Email Security offers a variety of ways for you to better examine and understand your message traffic: +Email security offers a variety of ways for you to better examine and understand your message traffic: -You can search for emails that have been processed by Email Security, whether they are marked with a [detection disposition](/email-security/reference/dispositions-and-attributes/) or not. +You can search for emails that have been processed by Email security, whether they are marked with a [detection disposition](/email-security/reference/dispositions-and-attributes/) or not. There are three ways for searching emails: @@ -32,4 +32,4 @@ Additional information on search can be found on the [Screen criteria](/cloudfla ### Export messages -With Email Security, you can export messages to a CSV file. Via the dashboard, you can export up to 1,000 rows. If you want to export all messages, you can use the [API](https://developers.cloudflare.com/api/resources/email_security/subresources/investigate/methods/get/). +With Email security, you can export messages to a CSV file. Via the dashboard, you can export up to 1,000 rows. If you want to export all messages, you can use the [API](https://developers.cloudflare.com/api/resources/email_security/subresources/investigate/methods/get/). diff --git a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phish-submissions.mdx b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phish-submissions.mdx index 9755a0a4f8f84a4..ee2c42ce1405ab2 100644 --- a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phish-submissions.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phish-submissions.mdx @@ -5,7 +5,7 @@ sidebar: order: 3 --- -While Email Security offers industry leading detection efficacy due to Cloudflare's Threat Intelligence, Preemptive Threat Hunting (actor and campaign infrastructure hunting with 8B, plus campaign threat signals assessed every day) and ML-Based Detection Models (Trust Graphs Computer Vision, Sentiment/Thread/Structural Analysis, Industry/Natural Language Understanding Modeling) false negatives and false positive can occur. +While Email security offers industry leading detection efficacy due to Cloudflare's Threat Intelligence, Preemptive Threat Hunting (actor and campaign infrastructure hunting with 8B, plus campaign threat signals assessed every day) and ML-Based Detection Models (Trust Graphs Computer Vision, Sentiment/Thread/Structural Analysis, Industry/Natural Language Understanding Modeling) false negatives and false positive can occur. There are two different ways to [submit a phish](/cloudflare-one/email-security/settings/phish-submissions/) sample: @@ -13,5 +13,5 @@ There are two different ways to [submit a phish](/cloudflare-one/email-security/ - Submitted directly by the end user, and used with phish submission buttons. To learn more about user-submitted phish, refer to [PhishNet for Microsoft O365](/cloudflare-one/email-security/settings/phish-submissions/#phishnet-o365). - User submissions can create another challenge for your organization. While it is important for end users to be vigilant and report what they believe may be a phishing email, they are often wrong. About 90% of the time, when an end user reports a missed phishing email, they are mistaken. This puts an extra burden on busy security teams as they sift through end user reports. The PhishGuard team at Cloudflare can solve this problem for your organization by reviewing end user submissions for you. - Admin submission: - - To be used when IT administrators or security teams submit to Email Security. Submit original phish samples as an attachment in EML format to the appropriate team submission address. - - Within the Email Security dashboard, Phish submissions will allow you to have a full understanding of what reclassification has been made and what the outcomes of those submissions are. + - To be used when IT administrators or security teams submit to Email security. Submit original phish samples as an attachment in EML format to the appropriate team submission address. + - Within the Email security dashboard, Phish submissions will allow you to have a full understanding of what reclassification has been made and what the outcomes of those submissions are. diff --git a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phishguard.mdx b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phishguard.mdx index 9fdcbe8d5e05f5a..fc0e1110ed32eac 100644 --- a/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phishguard.mdx +++ b/src/content/docs/learning-paths/secure-o365-email/monitor-your-inbox/phishguard.mdx @@ -5,7 +5,7 @@ sidebar: order: 5 --- -[PhishGuard](/cloudflare-one/email-security/phishguard/) serves as an extension of your Security Operations team with dedicated Email Security technical resources providing real-time monitoring of your email environment. The Active Defense Service provides: +[PhishGuard](/cloudflare-one/email-security/phishguard/) serves as an extension of your Security Operations team with dedicated Email security technical resources providing real-time monitoring of your email environment. The Active Defense Service provides: - Customized notification and responses for fraud and insider threats. - Reclassification of messages if the disposition is incorrect. @@ -16,7 +16,7 @@ sidebar: As a PhishGuard customer, the following service offerings should be enabled: -- Escalation contacts must be configured in the Email Security dashboard: This allows for email reports to be delivered regarding high risk items identified and responded to by the team. +- Escalation contacts must be configured in the Email security dashboard: This allows for email reports to be delivered regarding high risk items identified and responded to by the team. - Auto-moves should be enabled and configured for quarantine of identified items: Malicious should be prioritized, but configuring Spam for a move to junk/trash or even soft delete may also be highly useful to the client. Refer to the [PhishGuard](/cloudflare-one/email-security/phishguard/) documentation to learn more about this add-on service. diff --git a/src/content/docs/logs/logpush/logpush-job/datasets/account/email_security_alerts.md b/src/content/docs/logs/logpush/logpush-job/datasets/account/email_security_alerts.md index 0a5e1559a1a0aa4..113732684f19603 100644 --- a/src/content/docs/logs/logpush/logpush-job/datasets/account/email_security_alerts.md +++ b/src/content/docs/logs/logpush/logpush-job/datasets/account/email_security_alerts.md @@ -1,7 +1,7 @@ --- # Code generator. DO NOT EDIT. -title: Email Security Alerts +title: Email security Alerts pcx_content_type: configuration sidebar: order: 21 @@ -13,7 +13,7 @@ The descriptions below detail the fields available for `email_security_alerts`. Type: `string` -The canonical ID for an Email Security Alert (for example, '4WtWkr6nlBz9sNH-2024-08-28T15:32:35'). +The canonical ID for an Email security Alert (for example, '4WtWkr6nlBz9sNH-2024-08-28T15:32:35'). ## AlertReasons @@ -67,7 +67,7 @@ List of links detected in this message, benign or otherwise; limited to 100 in t Type: `string` -The message's mode of transport to Email Security.
Possible values are unset \| api \| direct \| bcc \| journal \| retroScan. +The message's mode of transport to Email security.
Possible values are unset \| api \| direct \| bcc \| journal \| retroScan. ## MessageID @@ -85,7 +85,7 @@ The origin of the message.
Possible values are unset \| inter Type: `string` -The original sender address as determined by Email Security mail processing (for example, 'firstlast@cloudflare.com'). +The original sender address as determined by Email security mail processing (for example, 'firstlast@cloudflare.com'). ## ReplyTo @@ -151,7 +151,7 @@ Value of the Subject header provided by the sender. Type: `array[string]` -Threat categories attributed by Email Security processing (for example, 'CredentialHarvester', 'Dropper'). +Threat categories attributed by Email security processing (for example, 'CredentialHarvester', 'Dropper'). ## Timestamp diff --git a/src/content/docs/reference-architecture/architectures/cloudflare-sase-with-microsoft.mdx b/src/content/docs/reference-architecture/architectures/cloudflare-sase-with-microsoft.mdx index 05ed9d96cda4d15..355ccd250e3ea5a 100644 --- a/src/content/docs/reference-architecture/architectures/cloudflare-sase-with-microsoft.mdx +++ b/src/content/docs/reference-architecture/architectures/cloudflare-sase-with-microsoft.mdx @@ -51,7 +51,7 @@ Microsoft and Cloudflare can be integrated in the following ways. - Leveraging Microsoft [Intune](https://learn.microsoft.com/en-us/mem/intune/fundamentals/what-is-intune) device posture in Cloudflare policies to ensure only managed, trusted devices have access to protected resources - Using Cloudflare [CASB](/cloudflare-one/integrations/cloud-and-saas/) to inspect your [Microsoft 365](https://www.microsoft.com/en-us/microsoft-365/what-is-microsoft-365) tenants and alert on security findings for incorrectly configured accounts and shared files containing sensitive data - Using Cloudflare's [Secure Web Gateway](/cloudflare-one/traffic-policies/) to control access to Microsoft SaaS applications such as Outlook, OneDrive and Teams -- Using Cloudflare's [Email Security](/email-security/) service to increase protection of email from phishing attacks and business email compromise. +- Using Cloudflare's [Email security](/email-security/) service to increase protection of email from phishing attacks and business email compromise. ### Microsoft Entra ID with Cloudflare @@ -92,7 +92,7 @@ Cloudflare's Secure Web Gateway (SWG) can help organizations achieve safe and se By leveraging Cloudflare SWG as a secure gateway for Microsoft 365 access, organizations can benefit from advanced threat protection, granular access controls, traffic inspection, and centralized visibility, ensuring a safe and secure experience for their users while mitigating risks and maintaining compliance. -### Cloudflare's Email Security for improved email protection +### Cloudflare's Email security for improved email protection Phishing is the root cause of upwards of 90% of breaches that lead to financial loss and brand damage. Cloudflare's email security solution sits in front of all email going to your Microsoft 365 tenant, filtering out spam, bulk, malicious and spoof content. The solution can leverage Microsoft [rules for quarantine actions](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/four-user-quarantine-admin-quarantine/), allowing you to fine tune how different email detections are handled. @@ -102,7 +102,7 @@ It is also possible to configure cloud email security to scan [Microsoft 365 inb ## Summary -By leveraging Cloudflare and its integrations with Microsoft, organizations can establish a Zero Trust security posture that goes beyond the limitations of traditional network security models. With Cloudflare's Zero Trust Network Access (ZTNA), organizations can replace self hosted VPNs and enforce conditional access based on user identity and device posture. The integration with Microsoft Entra ID allows for authentication and access control, while Microsoft Intune provides device posture information. Additionally, Cloudflare's CASB offers visibility into the security of Microsoft 365 configuration, the Secure Web Gateway inspects and filters traffic to Microsoft 365, and Email Security protects against phishing attacks, ensuring a secure and compliant environment. This approach enables faster and more secure access to applications, while providing granular control over user access based on identity and device posture. +By leveraging Cloudflare and its integrations with Microsoft, organizations can establish a Zero Trust security posture that goes beyond the limitations of traditional network security models. With Cloudflare's Zero Trust Network Access (ZTNA), organizations can replace self hosted VPNs and enforce conditional access based on user identity and device posture. The integration with Microsoft Entra ID allows for authentication and access control, while Microsoft Intune provides device posture information. Additionally, Cloudflare's CASB offers visibility into the security of Microsoft 365 configuration, the Secure Web Gateway inspects and filters traffic to Microsoft 365, and Email security protects against phishing attacks, ensuring a secure and compliant environment. This approach enables faster and more secure access to applications, while providing granular control over user access based on identity and device posture. ![Figure 4: A summary of Cloudflare SASE and Microsoft integrations.](~/assets/images/reference-architecture/cloudflare-sase-with-microsoft/cloudflare-sase-with-microsoft-fig4.svg "Figure 4: A summary of Cloudflare SASE and Microsoft integrations") diff --git a/src/content/docs/reference-architecture/architectures/sase.mdx b/src/content/docs/reference-architecture/architectures/sase.mdx index b3bac97711f75ed..b9d1a1c371aa7b2 100644 --- a/src/content/docs/reference-architecture/architectures/sase.mdx +++ b/src/content/docs/reference-architecture/architectures/sase.mdx @@ -683,7 +683,7 @@ It's worth noting that many of the capabilities described in this document can b | Zero Trust Network Access | [How to build Access policies](/cloudflare-one/access-controls/policies/) | | Remote Browser Isolation | [Understanding browser isolation](/cloudflare-one/remote-browser-isolation/) | | API-Driven CASB | [Scanning SaaS applications](/cloudflare-one/integrations/cloud-and-saas/) | -| Email Security | [Understanding Cloudflare Email Security](/email-security/) | +| Email security | [Understanding Cloudflare Email security](/email-security/) | | Replacing your VPN | [Using Cloudflare to replace your VPN](/learning-paths/replace-vpn/concepts/) | If you would like to discuss your SASE requirements in greater detail and connect with one of our architects, please visit [https://www.cloudflare.com/cloudflare-one/](https://www.cloudflare.com/cloudflare-one/) and request a consultation. diff --git a/src/content/docs/reference-architecture/architectures/security.mdx b/src/content/docs/reference-architecture/architectures/security.mdx index d87b51559b5f683..f1911de4e0032e9 100644 --- a/src/content/docs/reference-architecture/architectures/security.mdx +++ b/src/content/docs/reference-architecture/architectures/security.mdx @@ -591,7 +591,7 @@ The same DLP profiles can also be used in our Cloud Access Security Broker (CASB A lot of this section has focused on protecting access to private networks and applications, but a business must also protect their employees and their devices. Our [secure web gateway](/cloudflare-one/traffic-policies/) (SWG) service sits between users connected to Cloudflare and any resource they are attempting to access, both public and private. Policies can be written to prevent employees from accessing high-risk websites or known sites that distribute malware. Policies can also be written to mitigate phishing attacks by blocking access to domains and websites known to be part of phishing campaigns. Protecting users and their devices from Internet threats also reduces associated risks of those same users and devices accessing private resources. -Another critical private resource to secure is email. This is often one of the most private of all resources, as it contains confidential communications across your entire organization. It's also a common attack surface, mostly by way of phishing attacks. [Email Security](https://www.cloudflare.com/zero-trust/products/email-security/) (CES) examines all emails in your employee's inboxes and detects spoofed, malicious, or suspicious emails and can be configured to act accordingly. CES can be integrated by changing your domain MX records and redirecting all email via Cloudflare. Another option, for Microsoft and Google, is to integrate via API and inspect email already in a user’s inbox. For suspicious emails, links in the email are rewritten to leverage Cloudflare's [browser isolation service](/cloudflare-one/remote-browser-isolation/) so that when a user heads to that website, their local machine is protected against any malicious code that might be running in the browser. +Another critical private resource to secure is email. This is often one of the most private of all resources, as it contains confidential communications across your entire organization. It's also a common attack surface, mostly by way of phishing attacks. [Email security](https://www.cloudflare.com/zero-trust/products/email-security/) (CES) examines all emails in your employee's inboxes and detects spoofed, malicious, or suspicious emails and can be configured to act accordingly. CES can be integrated by changing your domain MX records and redirecting all email via Cloudflare. Another option, for Microsoft and Google, is to integrate via API and inspect email already in a user’s inbox. For suspicious emails, links in the email are rewritten to leverage Cloudflare's [browser isolation service](/cloudflare-one/remote-browser-isolation/) so that when a user heads to that website, their local machine is protected against any malicious code that might be running in the browser. ![Cloud email security filters unwanted email traffic from your users inboxes.](~/assets/images/reference-architecture/security/security-ref-arch-23.svg) diff --git a/src/content/docs/reference-architecture/by-solution.mdx b/src/content/docs/reference-architecture/by-solution.mdx index 8e59b472364c112..2152ef9b91fad0e 100644 --- a/src/content/docs/reference-architecture/by-solution.mdx +++ b/src/content/docs/reference-architecture/by-solution.mdx @@ -60,7 +60,7 @@ Architecture documentation related to using Cloudflare for Zero Trust, SSE and S - [Secure your Internet traffic and SaaS apps](/learning-paths/secure-internet-traffic/concepts/) - [Replace your VPN](/learning-paths/replace-vpn/concepts/) - [Deploy clientless access](/learning-paths/clientless-access/concepts/) -- [Secure Microsoft 365 email with Email Security](/learning-paths/secure-o365-email/concepts/) +- [Secure Microsoft 365 email with Email security](/learning-paths/secure-o365-email/concepts/) ### Networking diff --git a/src/content/docs/reference-architecture/design-guides/zero-trust-for-saas.mdx b/src/content/docs/reference-architecture/design-guides/zero-trust-for-saas.mdx index 661175fa19ee48a..f8a032fd226d046 100644 --- a/src/content/docs/reference-architecture/design-guides/zero-trust-for-saas.mdx +++ b/src/content/docs/reference-architecture/design-guides/zero-trust-for-saas.mdx @@ -56,7 +56,7 @@ What you will learn: This guide assumes you have an Enterprise contract with Cloudflare that includes: - Cloudflare Zero Trust licenses for the number of users you plan to onboard -- Cloudflare Cloud Email Security licenses for the number of users whose cloud inbox emails will be filtered +- Cloudflare Cloud Email security licenses for the number of users whose cloud inbox emails will be filtered :::note[Free and PayGo capabilities] A lot of the capabilities described in this document [are also available in our free and Pay-as-you-go plans](https://www.cloudflare.com/en-gb/plans/zero-trust-services/). @@ -177,15 +177,15 @@ Organizations with stringent requirements about email communications for complia While SaaS email solutions offer native security capabilities, their popularity makes them high-value targets for attackers who seek to exploit vulnerabilities and limitations in their inbound filtering capabilities. To mitigate this risk, IT teams should consider supplementing the native capabilities of cloud email solutions with specialized solutions for inbound email filtering. -[Cloudflare's Email Security](https://www.cloudflare.com/en-gb/zero-trust/products/email-security/) scans for malicious content or attachments in emails and proactively monitors the Internet for attacker infrastructure and attack delivery mechanisms. It identifies programmatically-created and impersonation domains used to host malicious content as part of planned attacks. This data also helps protect against business and vendor email compromises ([BEC](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/)/[VEC](https://www.cloudflare.com/en-gb/learning/email-security/what-is-vendor-email-compromise/)), which are notoriously difficult to detect due to their lack of payloads and resemblance to legitimate email traffic and a gap for legacy email security platforms. +[Cloudflare's Email security](https://www.cloudflare.com/en-gb/zero-trust/products/email-security/) scans for malicious content or attachments in emails and proactively monitors the Internet for attacker infrastructure and attack delivery mechanisms. It identifies programmatically-created and impersonation domains used to host malicious content as part of planned attacks. This data also helps protect against business and vendor email compromises ([BEC](https://www.cloudflare.com/en-gb/learning/email-security/business-email-compromise-bec/)/[VEC](https://www.cloudflare.com/en-gb/learning/email-security/what-is-vendor-email-compromise/)), which are notoriously difficult to detect due to their lack of payloads and resemblance to legitimate email traffic and a gap for legacy email security platforms. Integrating Cloudflare into the existing email infrastructure is both flexible and straightforward, with deployment options available in [inline](/email-security/deployment/inline/) and [API](/email-security/deployment/api/) modes. -In an inline deployment, Cloudflare's Email Security will evaluate email messages before they reach a user's inboxes (by pointing the email domain MX record to Cloudflare). This allows Cloudflare to [quarantine messages](/email-security/email-configuration/admin-quarantine/) so they never reach the user's inbox or [tag messages with email headers](/email-security/reference/dispositions-and-attributes/#header-structure) to inform the email provider how emails should be handled (for example, [by redirecting bulk emails directly to the spam folder](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine/)). Cloudflare can also [modify the subject and body of email messages](/email-security/email-configuration/email-policies/text-addons/) to inform a user to be more cautious about a suspicious email and [rewrite links within emails and even isolate those links behind a remote browser](/email-security/email-configuration/email-policies/link-actions/). +In an inline deployment, Cloudflare's Email security will evaluate email messages before they reach a user's inboxes (by pointing the email domain MX record to Cloudflare). This allows Cloudflare to [quarantine messages](/email-security/email-configuration/admin-quarantine/) so they never reach the user's inbox or [tag messages with email headers](/email-security/reference/dispositions-and-attributes/#header-structure) to inform the email provider how emails should be handled (for example, [by redirecting bulk emails directly to the spam folder](/email-security/deployment/inline/setup/office-365-area1-mx/use-cases/one-junk-admin-quarantine/)). Cloudflare can also [modify the subject and body of email messages](/email-security/email-configuration/email-policies/text-addons/) to inform a user to be more cautious about a suspicious email and [rewrite links within emails and even isolate those links behind a remote browser](/email-security/email-configuration/email-policies/link-actions/). -In an API deployment, Cloudflare's Email Security will see the email messages only after they have reached the users' inboxes by setting up Journaling/BCC rules in the email provider or through API scan. Then, through integrations with the email provider, Cloudflare can [retract phishing emails](/email-security/email-configuration/retract-settings/) from users' inboxes. Unlike the inline mode, this deployment method does not support quarantining emails or modifying the email messages. However, it is an easy way to add protection in complex email infrastructures with no changes to the existing mail flow operations. +In an API deployment, Cloudflare's Email security will see the email messages only after they have reached the users' inboxes by setting up Journaling/BCC rules in the email provider or through API scan. Then, through integrations with the email provider, Cloudflare can [retract phishing emails](/email-security/email-configuration/retract-settings/) from users' inboxes. Unlike the inline mode, this deployment method does not support quarantining emails or modifying the email messages. However, it is an easy way to add protection in complex email infrastructures with no changes to the existing mail flow operations. -These modes can be used concurrently to enhance email security. The inline mode ensures that Cloudflare's Email Security scans and filters emails before they reach users' inboxes. For emails that initially pass through without being flagged as threats, Cloudflare [periodically re-evaluates them](/email-security/email-configuration/retract-settings/office365-retraction/#post-delivery-retractions-for-new-threats). If these emails are later identified as part of a phishing campaign, they are automatically retracted with the API. This proactive approach protects organizations against deferred phishing attacks, where attackers send emails with seemingly benign links that are weaponized after delivery to bypass initial detection. +These modes can be used concurrently to enhance email security. The inline mode ensures that Cloudflare's Email security scans and filters emails before they reach users' inboxes. For emails that initially pass through without being flagged as threats, Cloudflare [periodically re-evaluates them](/email-security/email-configuration/retract-settings/office365-retraction/#post-delivery-retractions-for-new-threats). If these emails are later identified as part of a phishing campaign, they are automatically retracted with the API. This proactive approach protects organizations against deferred phishing attacks, where attackers send emails with seemingly benign links that are weaponized after delivery to bypass initial detection. ![Figure 8: Cloudflare can protect email services either inline or by API.](~/assets/images/reference-architecture/zero-trust-for-saas/zero-trust-saas-image-08.svg "Figure 8: Cloudflare can protect email services either inline or by API.") diff --git a/src/content/docs/reference-architecture/implementation-guides/index.mdx b/src/content/docs/reference-architecture/implementation-guides/index.mdx index e5bcda9c736449d..77077a23dc10025 100644 --- a/src/content/docs/reference-architecture/implementation-guides/index.mdx +++ b/src/content/docs/reference-architecture/implementation-guides/index.mdx @@ -16,7 +16,7 @@ Implementation guides provide [step-by-step instructions](/reference-architectur - [Secure your Internet traffic and SaaS apps](/learning-paths/secure-internet-traffic/concepts/) - [Replace your VPN](/learning-paths/replace-vpn/concepts/) - [Deploy Zero Trust Web Access](/learning-paths/clientless-access/concepts/) -- [Secure Microsoft 365 email with Email Security](/learning-paths/secure-o365-email/concepts/) +- [Secure Microsoft 365 email with Email security](/learning-paths/secure-o365-email/concepts/) ## Application Security diff --git a/src/content/docs/reference-architecture/implementation-guides/zero-trust/index.mdx b/src/content/docs/reference-architecture/implementation-guides/zero-trust/index.mdx index 518428dc317bc9f..ff7d95a027f2ebc 100644 --- a/src/content/docs/reference-architecture/implementation-guides/zero-trust/index.mdx +++ b/src/content/docs/reference-architecture/implementation-guides/zero-trust/index.mdx @@ -15,4 +15,4 @@ Zero Trust implementation guides walk you through the steps to deploy a Zero Tru - [Secure your Internet traffic and SaaS apps](/learning-paths/secure-internet-traffic/concepts/) - [Replace your VPN](/learning-paths/replace-vpn/concepts/) - [Deploy Zero Trust Web Access](/learning-paths/clientless-access/concepts/) -- [Secure Microsoft 365 email with Email Security](/learning-paths/secure-o365-email/concepts/) +- [Secure Microsoft 365 email with Email security](/learning-paths/secure-o365-email/concepts/) diff --git a/src/content/learning-paths/secure-o365-email.json b/src/content/learning-paths/secure-o365-email.json index 9c0cda54c005ef1..318ef99c61386dc 100644 --- a/src/content/learning-paths/secure-o365-email.json +++ b/src/content/learning-paths/secure-o365-email.json @@ -1,7 +1,7 @@ { - "title": "Secure Microsoft 365 email with Email Security", + "title": "Secure Microsoft 365 email with Email security", "path": "/learning-paths/secure-o365-email/concepts/", "pcx_content_type": "learning-path", - "description": "Use Cloudflare's Email Security to protect your Microsoft 365 email inbox from phishing and malware attacks.", + "description": "Use Cloudflare's Email security to protect your Microsoft 365 email inbox from phishing and malware attacks.", "products": ["email-security-cf1"] } diff --git a/src/content/partials/cloudflare-one/email-security/deployment/m365-use-case-transport-rules.mdx b/src/content/partials/cloudflare-one/email-security/deployment/m365-use-case-transport-rules.mdx index 4e8c2879fe47c3c..74cc7287222bae1 100644 --- a/src/content/partials/cloudflare-one/email-security/deployment/m365-use-case-transport-rules.mdx +++ b/src/content/partials/cloudflare-one/email-security/deployment/m365-use-case-transport-rules.mdx @@ -1,12 +1,11 @@ --- inputParameters: ruleName;;ruleWords;;doFollowing;;img;;ruleName2;;ruleWords2;;doFollowing2;;img2 - --- -import { Image } from 'astro:assets'; -import { GlossaryTooltip, Markdown } from "~/components" +import { Image } from "astro:assets"; +import { GlossaryTooltip, Markdown } from "~/components"; -To create the transport rules that will send emails with certain [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions) to Email Security: +To create the transport rules that will send emails with certain [disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions) to Email security: 1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage). @@ -15,14 +14,13 @@ To create the transport rules that will send emails with certain [disposition](/ 3. Select **Add a Rule** > **Create a new rule**. 4. Set the following rule conditions: - - * **Name**: *{props.one}*. - * **Apply this rule if**: *The message headers* > *includes any of these words*. - * **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. - * **Enter words**: {props.two} > **Add** > **Save**. - * **Apply this rule if**: Select **+** to add a second condition. - * **And**: *The sender* > *IP address is in any of these ranges or exactly matches* > enter the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. - * **Do the following** - *{props.three}*. + - **Name**: _{props.one}_. + - **Apply this rule if**: _The message headers_ > _includes any of these words_. + - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. + - **Enter words**: {props.two} > **Add** > **Save**. + - **Apply this rule if**: Select **+** to add a second condition. + - **And**: _The sender_ > _IP address is in any of these ranges or exactly matches_ > enter the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. + - **Do the following** - _{props.three}_. 5. Select **Next**. @@ -35,14 +33,13 @@ To create the transport rules that will send emails with certain [disposition](/ 9. Select **Add a Rule** > **Create a new rule**. 10. Set the following rule conditions: - - * **Name**: *{props.five}*. - * **Apply this rule if**: *The message headers* > *includes any of these words*. - * **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. - * **Enter words**: *{props.six}* > **Add** > **Save**. - * **Apply this rule if**: Select **+** to add a second condition. - * **And**: *The sender* > *IP address is in any of these ranges or exactly matches* > enter the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. - * **Do the following**: *{props.seven}*. + - **Name**: _{props.five}_. + - **Apply this rule if**: _The message headers_ > _includes any of these words_. + - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. + - **Enter words**: _{props.six}_ > **Add** > **Save**. + - **Apply this rule if**: Select **+** to add a second condition. + - **And**: _The sender_ > _IP address is in any of these ranges or exactly matches_ > enter the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. + - **Do the following**: _{props.seven}_. 11. Select **Next**. @@ -50,4 +47,4 @@ To create the transport rules that will send emails with certain [disposition](/ 13. Review your settings and select **Finish** > **Done**. -14. Select the rule *{props.five}* you have just created, and select **Enable**. +14. Select the rule _{props.five}_ you have just created, and select **Enable**. diff --git a/src/content/partials/cloudflare-one/email-security/deployment/m365-use-cases-antispam.mdx b/src/content/partials/cloudflare-one/email-security/deployment/m365-use-cases-antispam.mdx index 7d0bf8c9fd87ef1..4878be9cee67478 100644 --- a/src/content/partials/cloudflare-one/email-security/deployment/m365-use-cases-antispam.mdx +++ b/src/content/partials/cloudflare-one/email-security/deployment/m365-use-cases-antispam.mdx @@ -1,10 +1,9 @@ --- inputParameters: spamQuarantinePolicy;;phishingQuarantinePolicy;;highPhishingQuarantinePolicy;;img - --- -import { Image } from "astro:assets" -import { Markdown } from "~/components" +import { Image } from "astro:assets"; +import { Markdown } from "~/components"; To configure anti-spam policies: @@ -22,14 +21,14 @@ To configure anti-spam policies: 7. Set the following conditions and actions (you might need to scroll up or down to find them): -- **Spam**: *Move messages to Junk Email folder*. -- **High confidence spam**: *Quarantine message*. +- **Spam**: _Move messages to Junk Email folder_. +- **High confidence spam**: _Quarantine message_. - **Select quarantine policy**: {props.one}. -- **Phishing**: *Quarantine message*. +- **Phishing**: _Quarantine message_. - **Select quarantine policy**: {props.two}. -- **High confidence phishing**: *Quarantine message*. +- **High confidence phishing**: _Quarantine message_. - **Select quarantine policy**: {props.three}. -- **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. +- **Retain spam in quarantine for this many days**: Default is 15 days. Email security recommends 15-30 days. - Select the spam actions in the above step. 8. Select **Save**. diff --git a/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prereq.mdx b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prereq.mdx index 4762b571ca05ebd..b72ad37300f8cb6 100644 --- a/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prereq.mdx +++ b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prereq.mdx @@ -6,7 +6,7 @@ To ensure changes made in this tutorial take effect quickly, update the Time to Live (TTL) value of the existing MX records on your domains to five minutes. Do this on all the domains you will be deploying. -Changing the TTL value instructs DNS servers on how long to cache this value before requesting an update from the responsible nameserver. You need to change the TTL value before changing your MX records to Email Security. This will ensure that changes take effect quickly and can also be reverted quickly if needed. If your DNS manager does not allow for a TTL of five minutes, set it to the lowest possible setting. +Changing the TTL value instructs DNS servers on how long to cache this value before requesting an update from the responsible nameserver. You need to change the TTL value before changing your MX records to Email security. This will ensure that changes take effect quickly and can also be reverted quickly if needed. If your DNS manager does not allow for a TTL of five minutes, set it to the lowest possible setting. :::note Make TTL changes a few days before the production update, and wait at least as long as the old TTL values before making the update, since some senders might still be using the old cached values. @@ -44,4 +44,4 @@ Below is a list with instructions on how to edit MX records for some popular ser - **Cloudflare**: [Set up email records](/dns/manage-dns-records/how-to/email-records/) - **GoDaddy**: [Edit an MX Record](https://www.godaddy.com/help/edit-an-mx-record-19235) - **AWS**: [Creating records by using the Amazon Route 53 console](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-creating.html) -- **Azure**: [Create DNS records in a custom domain for a web app](https://learn.microsoft.com/en-us/azure/dns/dns-web-sites-custom-domain) \ No newline at end of file +- **Azure**: [Create DNS records in a custom domain for a web app](https://learn.microsoft.com/en-us/azure/dns/dns-web-sites-custom-domain) diff --git a/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx b/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx index 63545c48cd0945f..18cf3eb5803b9de 100644 --- a/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx +++ b/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx @@ -1,18 +1,17 @@ --- {} - --- -When configuring the Email Security MX records, it is important to configure hosts with the correct MX priority. This will allow mail flows to the preferred hosts and fail over as needed. +When configuring the Email security MX records, it is important to configure hosts with the correct MX priority. This will allow mail flows to the preferred hosts and fail over as needed. -Choose from the following Email Security MX hosts, and order them by priority. For example, if you are located outside the US and want to prioritize email processing in the EU, add `mailstream-eu1.mxrecord.io` as your first host, and then the US servers. +Choose from the following Email security MX hosts, and order them by priority. For example, if you are located outside the US and want to prioritize email processing in the EU, add `mailstream-eu1.mxrecord.io` as your first host, and then the US servers. -| Host | Location | Note | -| -------------------------------------------------------------------------------------------------------------------------------- | ----------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -|
  • `mailstream-central.mxrecord.mx`
  • `mailstream-east.mxrecord.io`
  • `mailstream-west.mxrecord.io`
  • | US | Best option to ensure all email traffic processing happens in the US. | -| `mailstream-eu1.mxrecord.io` | EU | Best option to ensure all email traffic processing happens in Germany, with backup to US data centers. | -| `mailstream-bom.mxrecord.mx` | India | Best option to ensure all email traffic processing happens within India. -| `mailstream-india-primary.mxrecord.mx` | India | Same as `mailstream-bom.mxrecord.mx`, with backup to US data centers. | -| `mailstream-asia.mxrecord.mx` | India | Best option to ensure all email traffic processing happens in India, with Australia data centers as backup. -| `mailstream-syd.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens within Australia. | -| `mailstream-australia-primary.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens in Australia, with India and US data centers as backup. | +| Host | Location | Note | +| -------------------------------------------------------------------------------------------------------------------------------- | ----------------------- | ------------------------------------------------------------------------------------------------------------------ | +|
  • `mailstream-central.mxrecord.mx`
  • `mailstream-east.mxrecord.io`
  • `mailstream-west.mxrecord.io`
  • | US | Best option to ensure all email traffic processing happens in the US. | +| `mailstream-eu1.mxrecord.io` | EU | Best option to ensure all email traffic processing happens in Germany, with backup to US data centers. | +| `mailstream-bom.mxrecord.mx` | India | Best option to ensure all email traffic processing happens within India. | +| `mailstream-india-primary.mxrecord.mx` | India | Same as `mailstream-bom.mxrecord.mx`, with backup to US data centers. | +| `mailstream-asia.mxrecord.mx` | India | Best option to ensure all email traffic processing happens in India, with Australia data centers as backup. | +| `mailstream-syd.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens within Australia. | +| `mailstream-australia-primary.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens in Australia, with India and US data centers as backup. | diff --git a/src/content/partials/cloudflare-one/email-security/detect-phish.mdx b/src/content/partials/cloudflare-one/email-security/detect-phish.mdx index ec9f1d28d2bd8a5..d3912c161805eb3 100644 --- a/src/content/partials/cloudflare-one/email-security/detect-phish.mdx +++ b/src/content/partials/cloudflare-one/email-security/detect-phish.mdx @@ -1,12 +1,10 @@ --- {} - - --- import { GlossaryTooltip, Render } from "~/components"; -Email Security uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a phishing campaign (marked with a [`Malicious` disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/)) or other common campaigns (for example, `Spam`). +Email security uses a variety of factors to determine whether a given email message, a web domain or URL, or specific network traffic is part of a phishing campaign (marked with a [`Malicious` disposition](/cloudflare-one/email-security/reference/dispositions-and-attributes/)) or other common campaigns (for example, `Spam`). :::note Certain URL rewrite schemes cannot be decoded (for example, Mimecast). @@ -134,4 +132,4 @@ These small pattern assessments are dynamic in nature and — in many cases — ### Network phishing - **Example**: C2 communications for lateral spread within the network or malicious phish downloaded from an external host. Typically seen when an end user gets infected outside the organization, comes back into the network and the C2 hosts uses the infected endpoint to download the implant based on the IP address space it is now resident in. -- **Detections applied**: Network device integrations (firewalls) and API-based integrations within existing orchestration services. \ No newline at end of file +- **Detections applied**: Network device integrations (firewalls) and API-based integrations within existing orchestration services. diff --git a/src/content/partials/cloudflare-one/email-security/post-verification-setup.mdx b/src/content/partials/cloudflare-one/email-security/post-verification-setup.mdx index c11bf705885b584..e2cc9df4d6fc4d5 100644 --- a/src/content/partials/cloudflare-one/email-security/post-verification-setup.mdx +++ b/src/content/partials/cloudflare-one/email-security/post-verification-setup.mdx @@ -1,12 +1,11 @@ --- {} - --- ## Verify successful deployment To verify that the deployment has been successful and that your emails are being scanned: -1. In [Zero Trust](https://one.dash.cloudflare.com/), select **Email Security**. +1. In [Zero Trust](https://one.dash.cloudflare.com/), select **Email security**. 2. Go to **Settings** > **Domain management** > **Domains**, then select **View**. -3. Under **Your domains**, locate your domain, and verify that **Status** (which describes the state of the configuration) displays **Active**. \ No newline at end of file +3. Under **Your domains**, locate your domain, and verify that **Status** (which describes the state of the configuration) displays **Active**. diff --git a/src/content/partials/email-security/deployment/journaling-connector.mdx b/src/content/partials/email-security/deployment/journaling-connector.mdx index a696122eda59522..6aba5ccccf9cc5f 100644 --- a/src/content/partials/email-security/deployment/journaling-connector.mdx +++ b/src/content/partials/email-security/deployment/journaling-connector.mdx @@ -1,17 +1,16 @@ --- {} - --- -### 1. Configure connector for delivery to Email Security (formerly Area 1) (if required) +### 1. Configure connector for delivery to Email security (formerly Area 1) (if required) :::note -Email Security only scans inbound emails. +Email security only scans inbound emails. ::: If your email architecture does not include an outbound gateway, you can skip this step and [proceed to the next one](#2-configure-journal-rule). -On the other hand, if your email architecture requires outbound messages to traverse your email gateway, you may want to consider configuring a connector to send the journal messages directly to Email Security. +On the other hand, if your email architecture requires outbound messages to traverse your email gateway, you may want to consider configuring a connector to send the journal messages directly to Email security. 1. Log in to the [Exchange admin center](https://admin.exchange.microsoft.com), and go to **Mail flow** > **Connectors**. @@ -20,52 +19,47 @@ On the other hand, if your email architecture requires outbound messages to trav 2. Select **Add a connector**. 3. Configure the new connector as follows: - - * **Connection From**: Office 365 - * **Connection to**: Partner Organization + - **Connection From**: Office 365 + - **Connection to**: Partner Organization ![Configure the connector](~/assets/images/email-security/deployment/api-setup/journaling/step3-configure-connector.png) 4. Select **Next**. 5. Configure the connector as follows: - - * **Name**: `Deliver journal directly to Area 1` - * **Description**: `Deliver journal directly to Area 1` - * **Turn it on**: Enabled. + - **Name**: `Deliver journal directly to Area 1` + - **Description**: `Deliver journal directly to Area 1` + - **Turn it on**: Enabled. ![Name the connector and give it a description](~/assets/images/email-security/deployment/api-setup/journaling/step5-name-connector.png) 6. Select **Next**. 7. Configure the **Use of connector** setting as follows: - - * Select **Only when email messages are sent to these domains**. - * In the text field, enter `journaling.mxrecord.io` as the host address, and select **+** to add the domain. + - Select **Only when email messages are sent to these domains**. + - In the text field, enter `journaling.mxrecord.io` as the host address, and select **+** to add the domain. ![Configure use of connector](~/assets/images/email-security/deployment/api-setup/journaling/step7-use-of-connector.png) 8. Select **Next**. 9. Configure the **Routing** setting as follows: - - * Select **Route email through these smart hosts**. - * In the text field, enter `journaling.mxrecord.io` as the [smart host](https://en.wikipedia.org/wiki/Smart_host) address, and select **+** to add the domain. + - Select **Route email through these smart hosts**. + - In the text field, enter `journaling.mxrecord.io` as the [smart host](https://en.wikipedia.org/wiki/Smart_host) address, and select **+** to add the domain. ![Configure the routing setting](~/assets/images/email-security/deployment/api-setup/journaling/step9-routing.png) 10. Select **Next**. 11. In **Security restrictions**, you need to keep the default TLS configuration. Review the following settings: - - * Make sure the **Always use Transport Layer Security (TLS) to secure the connection (recommended)** checkbox is selected. - * In **Connect only if the recipients email server certificate matches this criteria** select **Issued by a trusted certificate authority (CA)**. + - Make sure the **Always use Transport Layer Security (TLS) to secure the connection (recommended)** checkbox is selected. + - In **Connect only if the recipients email server certificate matches this criteria** select **Issued by a trusted certificate authority (CA)**. ![Configure security restrictions](~/assets/images/email-security/deployment/api-setup/journaling/step11-security.png) 12. Select **Next**. -13. You need to validate the connector by using your tenant’s specific journaling address. To find this address, go to the [Email Security dashboard](https://horizon.area1security.com/support/service-addresses) > **Support** > **Service Addresses page**. +13. You need to validate the connector by using your tenant’s specific journaling address. To find this address, go to the [Email security dashboard](https://horizon.area1security.com/support/service-addresses) > **Support** > **Service Addresses page**. ![Validate the connector](~/assets/images/email-security/deployment/api-setup/journaling/step13-validate-email.png) @@ -102,11 +96,10 @@ Your connector is now active. You can find it in **Exchange admin center** > **M ![Select journal rules](~/assets/images/email-security/deployment/api-setup/journaling/step6-journal-rules.png) 7. Select **New rule** to configure a journaling rule, and configure it as follows: - - * **Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email Security dashboard](https://horizon.area1security.com/support/service-addresses). For example, `@journaling.mxrecord.io`. - * **Journal Rule Name**: `Journal Messages to CloudflareArea 1` - * **Journal messages sent or received from**: *Everyone* - * **Type of message to journal**: *External messages only* + - **Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email security dashboard](https://horizon.area1security.com/support/service-addresses). For example, `@journaling.mxrecord.io`. + - **Journal Rule Name**: `Journal Messages to CloudflareArea 1` + - **Journal messages sent or received from**: _Everyone_ + - **Type of message to journal**: _External messages only_ 8. Select **Next**. @@ -114,7 +107,7 @@ Your connector is now active. You can find it in **Exchange admin center** > **M ![Verify the journal rule information](~/assets/images/email-security/deployment/api-setup/journaling/step9-verify-journal-rules.png) -Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email Security. After it propagates, you can access the Cloudflare Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email Security from your Exchange server. +Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email security. After it propagates, you can access the Cloudflare Email security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email security from your Exchange server. ### 3. Compliance @@ -143,11 +136,10 @@ After creating the distribution lists based on regions for your users, configure ![Select journal rules](~/assets/images/email-security/deployment/api-setup/journaling/step6-journal-rules.png) 7. Select **New rule** to configure a journaling rule, and configure it as follows: - - * **Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email Security dashboard](https://horizon.area1security.com/support/service-addresses). If you need to process emails in certain geographic regions, refer to the [Geographic locations](#geographic-locations) table for more information on what address you should use. - * **Journal Rule Name**: `Journal Messages to CloudflareArea 1` - * **Journal messages sent or received from**: *A specific user or group* and select the user group you [created above](#3-compliance). - * **Type of message to journal**: *External messages only* + - **Send journal reports to**: This address is specific to each customer tenant, and can be found in your [Email security dashboard](https://horizon.area1security.com/support/service-addresses). If you need to process emails in certain geographic regions, refer to the [Geographic locations](#geographic-locations) table for more information on what address you should use. + - **Journal Rule Name**: `Journal Messages to CloudflareArea 1` + - **Journal messages sent or received from**: _A specific user or group_ and select the user group you [created above](#3-compliance). + - **Type of message to journal**: _External messages only_ 8. Select **Next**. @@ -155,4 +147,4 @@ After creating the distribution lists based on regions for your users, configure ![Verify the journal rule information](~/assets/images/email-security/deployment/api-setup/journaling/step9-verify-journal-rules.png) -Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email Security. After it propagates, you can access the Cloudflare Email Security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email Security from your Exchange server. +Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Email security. After it propagates, you can access the Cloudflare Email security dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Email security from your Exchange server. diff --git a/src/content/partials/email-security/timestamp.mdx b/src/content/partials/email-security/timestamp.mdx index 01600c90c32ddea..1d0d053d3d128a0 100644 --- a/src/content/partials/email-security/timestamp.mdx +++ b/src/content/partials/email-security/timestamp.mdx @@ -1,6 +1,5 @@ --- {} - --- -Timestamps in the dashboard of Email Security (formerly Area 1) are localized to your timezone. Email Security reads this information from the clock of your computer when you log in. +Timestamps in the dashboard of Email security (formerly Area 1) are localized to your timezone. Email security reads this information from the clock of your computer when you log in. diff --git a/src/content/products/email-security-cf1.yaml b/src/content/products/email-security-cf1.yaml index c0f9b6c1509503c..c1ae62693a1354a 100644 --- a/src/content/products/email-security-cf1.yaml +++ b/src/content/products/email-security-cf1.yaml @@ -1,7 +1,7 @@ -name: Email Security +name: Email security product: - title: Email Security + title: Email security url: /cloudflare-one/email-security/ group: Cloudflare One diff --git a/src/content/products/email-security.yaml b/src/content/products/email-security.yaml index 67a3948c54f6aed..fbab34a51be7efa 100644 --- a/src/content/products/email-security.yaml +++ b/src/content/products/email-security.yaml @@ -1,12 +1,12 @@ -name: Email Security +name: Email security product: - title: Email Security (formerly Area 1) + title: Email security (formerly Area 1) url: /email-security/ group: Cloudflare One show: false meta: - title: Cloudflare Email Security (formerly Area 1) docs - description: Cloudflare Email Security is a cloud based service that stops phishing attacks, the biggest cybersecurity threat, across all traffic vectors - email, web and network. + title: Cloudflare Email security (formerly Area 1) docs + description: Cloudflare Email security is a cloud based service that stops phishing attacks, the biggest cybersecurity threat, across all traffic vectors - email, web and network. author: "@cloudflare" diff --git a/src/content/release-notes/api-deprecations.yaml b/src/content/release-notes/api-deprecations.yaml index fa6edc484e78d61..5d595cb69ef9693 100644 --- a/src/content/release-notes/api-deprecations.yaml +++ b/src/content/release-notes/api-deprecations.yaml @@ -19,7 +19,7 @@ entries: * `GET /radar/http/summary/bot_class` * `GET /radar/http/timeseries_groups/device_type` * `GET /radar/http/timeseries_groups/bot_class` - * Other similar summary and timeseries groups endpoints for the following datasets: AI Bots, AI Inference, AS112, DNS, Email Routing, Email Security, HTTP, Layer 3 Attacks, Layer 7 Attacks, Leaked Credential Checks + * Other similar summary and timeseries groups endpoints for the following datasets: AI Bots, AI Inference, AS112, DNS, Email Routing, Email security, HTTP, Layer 3 Attacks, Layer 7 Attacks, Leaked Credential Checks Replacements: