To set income Email policy sets
Select the following:
Option | Explanation |
General Security Settings Pane | |
Anti-Malware | Cyren scans incoming email for known malware. The user can select how to handle identified problems. The following options are available:
|
Manage File Type | This feature replaces the Suspected Attachment feature. This feature filters specific file attachments by their file extension. When using this feature, a customer can decide which types of attachments are to be received or rejected. E-Mail Security monitor email attachments for common sources of virus intrusion. These include file extensions such as EXE, ZIP etc. The following options are available:
The selected action will applied for the following file types: ade, adp, app, asp, bas, bat, bhx, cab, ceo, chm, cmd, com, cpl, crt, csr, der, exe, fxp, hlp, hta, inf, ins, isp, its, js, jse, lnk, mad, maf, mag, mam, mar, mas, mat, mde, mim, msc, msi, msp, mst, ole, pcd, pif, reg, scr, sct, shb, shs, vb, vbe, vbmacros, vbs, vsw, wmd, wmz, ws, wsc, wsf, wsh, xxe, docm, xlsm, arj, cab, jar, lha, rar, tar, zip, and gz. |
Advanced Threat Protection Pane | |
Malware Outbreak | Cyren monitors large numbers of email messages to detect malware outbreaks. These are blocked before they have been formally analyzed and assigned a signature. The following options are available:
|
DKIM | Domain Keys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing. The sending party signs each outgoing message with a DKIM signature with applies to specific message headers. Cyren Email fraud protection validates the DKIM signature with a public key provided in the Sender’s DNS records, and if the DKIM signature fails validation an action can be taken. The following options are available:
|
Sandbox Array | Suspect email and attachments are transferred to a safe environment on the Cyren servers. Once there the email or attachment is investigated to determine if it safe or not. |
Time of Click Protection | Some malware gets through the system, and when the user clicks on the malware, the system will have already identified it, and it will be disabled on the first click.
|
Spam, Phishing & News Pane: provides filtering of emails that are not harmful to the computer or network, but that tend to cause workers to spend excessive amounts of time on non-productive activities. | |
Spam & Phishing Filtering | Blocks spam from unidentified sources The following options are available:
|
Advertising Spam Filtering | Blocks email spam from advertisers The following options are available:
|
Solicited Bulk (Newsletters) | Blocks all newsletters. The following options are available:
|
Lists Pane | |
Block List | Filters websites that need to be blocked. You can insert Domains, IPs, email addresses. Please use only one entry per line. This entry may be followed by an optional comment, which is separated by at least one white space. Please use the following format: user@domain.com, or domain.com and 10.20.30.40 or 10.20.30.0/24 for the entries. Comments cam also start with '#', '//' or '–'. A block list entry can be useful if you repeatedly receive unsolicited emails from a particular sender, and the recognition is still inadequate even after reporting the issue multiple times. |
Allow List | Filters websites that are allowed. You can insert Domains, IPs, email addresses. Please use only one entry per line. This entry may be followed by an optional comment, which is separated by at least one white space. Please use the following format: user@domain.com, or domain.com and 10.20.30.40 or 10.20.30.0/24 for the entries. Comments cam also start with '#', '//' or '–'. An allow list entry can be useful in cases when legitimate emails from a particular sender are systematically categorized as spam. |
Message Handling | |
Bounce | These are messages indicating that previous emails were not delivered. Deliver: The email was delivered Handled as Spam & Phishing: Spam & Phishing rule will apply |
Empty | An email message that has no subject or text in the body of the message. Deliver: The email was delivered Handled as Spam & Phishing: Spam & Phishing rule will apply |
Almost Empty | An email that has a subject line but no text. Some users may send an email with a brief comment in the subject line without adding text in the body of the message. Deliver: The email was delivered Handled as Spam & Phishing: Spam & Phishing rule will apply |
4. The sliders and fields in the window are set to their default positions.
5. Set the switches to settings based on local requirements.
6. Select one of the following options:
7. The new Policy Set appears in the Policy drop-down menu of Rules tab.