E-mail Security
Last updated
Was this helpful?
Last updated
Was this helpful?
1.E-mail Secur'ty module enables users to report risky e-mails to enable a centralized analysis. The end-user Add-in can be customized from the “E-mail Secur'ty -> Settings” menu, Add-in Customization section. It is recommended to do it before the deployment. Parameters like display name cannot be changed after the deployment and require a re-deployment if a change is done.
2.After configuring the Add-in's main parameters, go to the "General Info" section on the same page for installing the add-in. Please select your e-mail server type before copying the link or downloading the manifest file. It is recommended to use the link for Office 365 based deployments. For Microsoft Exchange Server-based deployments, downloading the file and uploading it to the Microsoft Exchange Server should be preferred.
6. Once the Deployment is complete, the users can report e-mails that they think is suspicious.
7. The reported e-mails are accessible from the “E-mail Security -> Reported E-mails” menu. By clicking the “…” button, actions can be carried out, including detailed analysis, central deletion, and updating the status.
8. TAGS in E-mail Security enables detailed classification for the reported e-mails.
3. To deploy the add-in from Office 365, please refer to the page on the Microsoft Web Site.
4. To deploy the add-in from Microsoft Exchange Server, please refer to the page on the Microsoft Web Site.
Due to a Microsoft update on office-js add-in infrastructure, please make sure at least Exchange 2019 cumulative update seven is applied to enable the add-in work on OWA. .
5. To deploy the add-in from the end-user Microsoft Outlook application, please refer to the page on the Microsoft Web Site.