The following new features are available in Hosted Email Security.
Feature |
Description |
---|---|
Mail Tracking Log Enhancement |
Reorganizes mail tracking logs to show all the key information on one screen and allows you to sort out accepted or blocked traffic using the traffic type as the search condition. For details, see Understanding Mail Tracking. |
Feature |
Description |
---|---|
Drill-down on the Dashboard |
Allows you to drill down from the Threat Details table on the dashboard to policy event logs for more threat analysis. For details, see Threats Details Chart. |
License Information View |
Provides a summary of license information, including the activation code, expiration date and license version. For details, see Viewing License Information. |
End User Quarantine Console Logon Settings |
Allows you to enable or disable the following methods to access the End User Quarantine console:
For details, see About Logon Methods. |
Support for General Data Protection Regulation (GDPR) Compliance |
Provides support for GDPR compliance in Data Loss Prevention (DLP) templates. GDPR is a regulation intended to strengthen and unify data protection for all individuals within the European Union (EU). For details about DLP templates, see DLP Compliance Templates. |
Feature |
Description |
---|---|
Log Search by the Attachment SHA256 Hash Value |
Provides a new search condition in mail tracking logs, which enables you to search logs by the SHA256 hash value of a message attachment. To quickly sort out mail tracking logs for email messages with a specific attachment, you can directly specify the SHA256 hash value of the attachment as the search condition. For details, see Understanding Mail Tracking. |
Feature |
Description |
---|---|
Simplified Domain Provisioning and Verification |
Provides a new wizard to simplify the domain provisioning process and verifies domain ownership using the DNS TXT record. Domain-related configurations have been reorganized into three parts: General, Inbound Servers, and Outbound Servers sections. For details, see About Domain Management. |
Rule Order Customization |
Allows you to either use the default rule order or customize the order of inbound and outbound policy rules. If you customize the rule order, Hosted Email Security will then apply policy rules in the order you defined to email messages. For details, see Customizing the Rule Order. |
Approved and Blocked Sender Lists Enhancement |
Changes the current evaluation order of the approved and blocked sender lists. The blocked sender lists on the End User Quarantine console and administrator console override the approved sender lists of the two consoles. Evaluation will be done in the following order:
For details, see Configuring Approved and Blocked Sender Lists. |
Policy Sender and Recipient Enhancement |
Enables you to import and export the senders, recipients, and exception lists for policy rules in both inbound and outbound protection. For details, see Inbound Policy Rules. |
Feature |
Description |
---|---|
Domain-based Message Authentication, Reporting and Conformance (DMARC) |
As an email validation system to detect and prevent email spoofing, DMARC is intended to fight against certain techniques used in phishing and spam, such as email messages with forged sender addresses that appear to originate from legitimate organizations. DMARC is designed to fit into the existing inbound email authentication process of Hosted Email Security, allowing you to define DMARC policies, including the actions to take on messages that fail DMARC authentication. For details, see About Domain-based Message Authentication, Reporting & Conformance (DMARC). |
Data Loss Prevention (DLP) |
DLP safeguards an organization's digital assets against accidental or deliberate leakage. DLP evaluates data against a set of rules defined in policies to determine the data that must be protected from unauthorized transmission and the action that DLP performs when it detects transmission. With DLP, Hosted Email Security protects your organization against data loss by monitoring your outbound email traffic. For details, see Data Loss Prevention (DLP). |
Feature |
Description |
---|---|
Predictive Machine Learning |
Integrates the Predictive Machine Learning engine to protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis. For details about Predictive Machine Learning settings, see Configuring Malware or Malicious Code Criteria. For details about the engine, see About Predictive Machine Learning. |
Single Sign-On to Cloud App Security |
Provides an option for the administrator using the Customer License Portal (CLP) or Licensing Management Platform (LMP) account to access the associated Cloud App Security management console from the Hosted Email Security administrator console, without the need to provide logon credentials again. |
Language Preferences for Inline Actions |
Allows users to select language preferences for inline actions when you configure the quarantine digest on the Digest Settings screen. In the quarantine digest email message, inline actions will be shown in the selected language. |
Feature |
Description |
---|---|
Business Email Compromise (BEC) |
Allows you to take actions on either the analyzed or the probable BEC attacks and specify high profile users who are most vulnerable to BEC attacks for message scanning. The FBI defines Business Email Compromise (BEC) as "a sophisticated scam targeting businesses working with foreign suppliers and businesses that regularly perform wire transfer payments." Formerly known as Man-in-the-Email scams, these schemes compromise official business email accounts to conduct unauthorized fund transfers. |
Feature |
Description |
---|---|
Sender Filter Settings |
Spammers have been spoofing email addresses for a long time. An email message has two sets of sender addresses: the envelope address and the message header address. Allows you to show both addresses and add both of them to the approved or blocked sender list. If there is a mismatch between the envelope address and the message header address, Hosted Email Security can block the message as configured once matching any of the addresses in the blocked sender list. |
Feature |
Description |
---|---|
Emerging Threat List |
Provides the Emerging Threat List (ETL) in the standard IP reputation database to help identify active ransomware, malware, or other email threats. |
Centralized Scan Exception Management |
Provides centralized scan exception management in both inbound and outbound protection. Hosted Email Security allows you to reject, bypass, or quarantine scanning messages that exceed Hosted Email Security capabilities or pose security risks. The centralized scan exception settings are configurable in the following paths: |
Feature |
Description |
---|---|
Graymail Support |
Manages graymail separately from common spam to allow administrators to identify graymail messages. |
Policy Event Log Enhancement |
Records policy event logs for more threat types other than ransomware and advanced persistent threats, provides Rule Name as a new search condition, and allows you to query data for up to seven continuous days. |
End User Quarantine Console Single Sign-On |
Supports seamless single sign-on (SSO) using existing Active Directory corporate credentials. After deploying federation servers, end users can single sign on to the End User Quarantine console. Both Microsoft Active Directory Federation Services (AD FS) 2.0 and Azure Active Directory (AD) are supported for SSO. See About Logon Methods. |
X-Header Support |
Provides the Insert X-Header action in "Modify" actions so that you can add a customized X-Header to the message header before delivering a message. See Insert an X-Header. |