E-mail Security
Last updated
Last updated
1.E-mail Secur'ty module enables users to report risky e-mails to enable a centralized analysis. The end-user Add-in can be customized from the “E-mail Secur'ty -> Settings” menu, Add-in Customization section. It is recommended to do it before the deployment. Parameters like display name cannot be changed after the deployment and require a re-deployment if a change is done.
2.After configuring the Add-in's main parameters, go to the "General Info" section on the same page for installing the add-in. Please select your e-mail server type before copying the link or downloading the manifest file. It is recommended to use the link for Office 365 based deployments. For Microsoft Exchange Server-based deployments, downloading the file and uploading it to the Microsoft Exchange Server should be preferred.
3. To deploy the add-in from Office 365, please refer to the page https://docs.microsoft.com/en-us/microsoft-365/admin/manage/manage-deployment-of-add-ins?view=o365-worldwide on the Microsoft Web Site.
4. To deploy the add-in from Microsoft Exchange Server, please refer to the page https://docs.microsoft.com/en-us/exchange/install-or-remove-outlook-add-ins-2013-help on the Microsoft Web Site.
Due to a Microsoft update on office-js add-in infrastructure, please make sure at least Exchange 2019 cumulative update seven is applied to enable the add-in work on OWA. Download Security Update For Exchange Server 2019 CU7 (KB4581424) from Official Microsoft Download Center.
5. To deploy the add-in from the end-user Microsoft Outlook application, please refer to the page https://support.microsoft.com/en-us/office/installing-office-add-ins-to-your-mailbox-65e243f5-cdac-4987-8185-97069a6058cb on the Microsoft Web Site.
6. Once the Deployment is complete, the users can report e-mails that they think is suspicious.
7. The reported e-mails are accessible from the “E-mail Security -> Reported E-mails” menu. By clicking the “…” button, actions can be carried out, including detailed analysis, central deletion, and updating the status.
8. TAGS in E-mail Security enables detailed classification for the reported e-mails.