Views:

The following new features are available in Hosted Email Security.

Table 1. New Features in This Release (Available on March 17, 2018)

Feature

Description

Mail Tracking Log Enhancement

Reorganizes mail tracking logs to show all the key information on one screen and allows you to sort out accepted or blocked traffic using the traffic type as the search condition.

For details, see Understanding Mail Tracking.

Table 2. New Features Available on January 20, 2018

Feature

Description

Drill-down on the Dashboard

Allows you to drill down from the Threat Details table on the dashboard to policy event logs for more threat analysis.

For details, see Threats Details Chart.

License Information View

Provides a summary of license information, including the activation code, expiration date and license version.

For details, see Viewing License Information.

End User Quarantine Console Logon Settings

Allows you to enable or disable the following methods to access the End User Quarantine console:

  • Logon using end user accounts

  • Single sign-on using existing Active Directory corporate credentials

For details, see About Logon Methods.

Support for General Data Protection Regulation (GDPR) Compliance

Provides support for GDPR compliance in Data Loss Prevention (DLP) templates. GDPR is a regulation intended to strengthen and unify data protection for all individuals within the European Union (EU).

For details about DLP templates, see DLP Compliance Templates.

Table 3. New Features Available on December 2, 2017

Feature

Description

Log Search by the Attachment SHA256 Hash Value

Provides a new search condition in mail tracking logs, which enables you to search logs by the SHA256 hash value of a message attachment. To quickly sort out mail tracking logs for email messages with a specific attachment, you can directly specify the SHA256 hash value of the attachment as the search condition.

For details, see Understanding Mail Tracking.

Table 4. New Features Available on November 4, 2017

Feature

Description

Simplified Domain Provisioning and Verification

Provides a new wizard to simplify the domain provisioning process and verifies domain ownership using the DNS TXT record. Domain-related configurations have been reorganized into three parts: General, Inbound Servers, and Outbound Servers sections.

For details, see About Domain Management.

Rule Order Customization

Allows you to either use the default rule order or customize the order of inbound and outbound policy rules. If you customize the rule order, Hosted Email Security will then apply policy rules in the order you defined to email messages.

For details, see Customizing the Rule Order.

Approved and Blocked Sender Lists Enhancement

Changes the current evaluation order of the approved and blocked sender lists.

The blocked sender lists on the End User Quarantine console and administrator console override the approved sender lists of the two consoles. Evaluation will be done in the following order:

  • End User Quarantine console blocked sender list

  • Administrator console blocked sender list

  • End User Quarantine console approved sender list

  • Administrator console approved sender list

For details, see Configuring Approved and Blocked Sender Lists.

Policy Sender and Recipient Enhancement

Enables you to import and export the senders, recipients, and exception lists for policy rules in both inbound and outbound protection.

For details, see Inbound Policy Rules.

Table 5. New Features Available on October 14, 2017

Feature

Description

Domain-based Message Authentication, Reporting and Conformance (DMARC)

As an email validation system to detect and prevent email spoofing, DMARC is intended to fight against certain techniques used in phishing and spam, such as email messages with forged sender addresses that appear to originate from legitimate organizations.

DMARC is designed to fit into the existing inbound email authentication process of Hosted Email Security, allowing you to define DMARC policies, including the actions to take on messages that fail DMARC authentication.

For details, see About Domain-based Message Authentication, Reporting & Conformance (DMARC).

Data Loss Prevention (DLP)

DLP safeguards an organization's digital assets against accidental or deliberate leakage. DLP evaluates data against a set of rules defined in policies to determine the data that must be protected from unauthorized transmission and the action that DLP performs when it detects transmission.

With DLP, Hosted Email Security protects your organization against data loss by monitoring your outbound email traffic.

For details, see Data Loss Prevention (DLP).

Table 6. New Features Available on August 19, 2017

Feature

Description

Predictive Machine Learning

Integrates the Predictive Machine Learning engine to protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis.

For details about Predictive Machine Learning settings, see Configuring Malware or Malicious Code Criteria.

For details about the engine, see About Predictive Machine Learning.

Single Sign-On to Cloud App Security

Provides an option for the administrator using the Customer License Portal (CLP) or Licensing Management Platform (LMP) account to access the associated Cloud App Security management console from the Hosted Email Security administrator console, without the need to provide logon credentials again.

See Accessing the Cloud App Security Management Console.

Language Preferences for Inline Actions

Allows users to select language preferences for inline actions when you configure the quarantine digest on the Digest Settings screen. In the quarantine digest email message, inline actions will be shown in the selected language.

See Configuring the Quarantine Digest.

Table 7. New Features Available on July 22, 2017

Feature

Description

Business Email Compromise (BEC)

Allows you to take actions on either the analyzed or the probable BEC attacks and specify high profile users who are most vulnerable to BEC attacks for message scanning.

The FBI defines Business Email Compromise (BEC) as "a sophisticated scam targeting businesses working with foreign suppliers and businesses that regularly perform wire transfer payments." Formerly known as Man-in-the-Email scams, these schemes compromise official business email accounts to conduct unauthorized fund transfers.

See Configuring Business Email Compromise Criteria.

Table 8. New Features Available on May 13, 2017

Feature

Description

Sender Filter Settings

Spammers have been spoofing email addresses for a long time. An email message has two sets of sender addresses: the envelope address and the message header address.

Allows you to show both addresses and add both of them to the approved or blocked sender list. If there is a mismatch between the envelope address and the message header address, Hosted Email Security can block the message as configured once matching any of the addresses in the blocked sender list.

See Managing Sender Filter.

Table 9. New Features Available on March 11, 2017

Feature

Description

Emerging Threat List

Provides the Emerging Threat List (ETL) in the standard IP reputation database to help identify active ransomware, malware, or other email threats.

See About Standard IP Reputation Settings.

Centralized Scan Exception Management

Provides centralized scan exception management in both inbound and outbound protection.

Hosted Email Security allows you to reject, bypass, or quarantine scanning messages that exceed Hosted Email Security capabilities or pose security risks.

The centralized scan exception settings are configurable in the following paths:

  • Inbound Protection > Scan Exceptions

  • Outbound Protection > Scan Exceptions

See Configuring Scan Exceptions.

Table 10. New Features Available on January 15, 2017

Feature

Description

Graymail Support

Manages graymail separately from common spam to allow administrators to identify graymail messages.

See Configuring Graymail Criteria.

Policy Event Log Enhancement

Records policy event logs for more threat types other than ransomware and advanced persistent threats, provides Rule Name as a new search condition, and allows you to query data for up to seven continuous days.

See Understanding Policy Events.

End User Quarantine Console Single Sign-On

Supports seamless single sign-on (SSO) using existing Active Directory corporate credentials. After deploying federation servers, end users can single sign on to the End User Quarantine console. Both Microsoft Active Directory Federation Services (AD FS) 2.0 and Azure Active Directory (AD) are supported for SSO.

See About Logon Methods.

X-Header Support

Provides the Insert X-Header action in "Modify" actions so that you can add a customized X-Header to the message header before delivering a message.

See Insert an X-Header.