Protection FAQs

Similar documents
How do I use ProofPoint anti-spam software at the GC

University Information Technology (UIT) Proofpoint Frequently Asked Questions (FAQ)

Cyber Security Guide for NHSmail

ProofPoint Protection Perimeter Security Daily Digest and Configuration Guide. Faculty/Staff Guide

Dataprise Managed Anti-Spam Console

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Introduction. Logging in. WebQuarantine User Guide

On the Surface. Security Datasheet. Security Datasheet

TOTAL CONTROL SECURITY END USER GUIDE

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Symantec Ransomware Protection

SPAM QUARANTINE. Security Service. Information Technology Services

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple

Office 365 Integration Guide Software Version 6.7

Getting Started 2 Logging into the system 2 Your Home Page 2. Manage your Account 3 Account Settings 3 Change your password 3

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Phishing in the Age of SaaS

At a Glance: Symantec Security.cloud vs Microsoft O365 E3

How to Use the Greymail Spam Filter

SAYRE AREA SCHOOL DISTRICT TECHNOLOGY TIPS SPAM SASD PROOFPOINT BASICS ON HOW

FAQ. Usually appear to be sent from official address

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Using WebQuarantine for Managing Quarantined Messages

Spam Management with PureMessage

Office 365. Exporting and Importing Safe and Blocked Senders List

Introduction. Logging in. WebMail User Guide

ID: Sample Name: dronefly.apk Cookbook: default.jbs Time: 10:24:54 Date: 07/06/2018 Version:

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Antispam Gateway Software Version 2.12

USER GUIDE. Accessing the User Interface. Login Page Resetting your Password. Logging In

Hello! we are here to share some stories

ID: Sample Name: 5GeZNwROcB.bin Cookbook: default.jbs Time: 15:22:54 Date: 30/11/2017 Version:

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Encrypted Users Guide. Revised 8/28/2017

Block Threats Before They Reach Your Network Make Downtime a Thing of the Past. Comprehensive and reliable protection

Admin Guide Boundary Defense for Anti-Virus & Anti-Spam

Sophos Central Admin. help

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

ID: Sample Name: lt.pak Cookbook: default.jbs Time: 12:40:34 Date: 26/07/2018 Version:

ID: Sample Name: dialog.nvp Cookbook: default.jbs Time: 00:09:12 Date: 10/05/2018 Version:

Machine-Powered Learning for People-Centered Security

ID: Sample Name: test Cookbook: default.jbs Time: 09:46:13 Date: 21/05/2018 Version:

Outbreak Filters. Overview of Outbreak Filters. This chapter contains the following sections:

Comodo Antispam Gateway Software Version 2.11

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Panda Security. Protection. User s Manual. Protection. Version PM & Business Development Team

Spam Protection Guide

Secure Recipient Guide

ID: Sample Name: vlaue.exe Cookbook: default.jbs Time: 18:54:49 Date: 26/01/2018 Version:

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Filtering User Guide. Guide to User Functions of Spam and Virus Filtering Service

KASPERSKY SECURITY FOR MICROSOFT OFFICE s are sent every second. It only takes one to bring down your business.

with Advanced Protection

MESSAGING SECURITY GATEWAY. Solution overview


ID: Sample Name: faktury_pdf.rar Cookbook: default.jbs Time: 12:24:33 Date: 15/12/2017 Version:

Total Security

ID: Sample Name: gpg4win exe.sig Cookbook: default.jbs Time: 21:44:31 Date: 02/02/2018 Version:

ID: Sample Name: com.cleanmaster.mguard_ apk Cookbook: defaultandroidfilecookbook.jbs Time: 18:32:59 Date: 27/02/2018 Version: 22.0.

ID: Sample Name: fonttable.xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:14:58 Date: 27/04/2018 Version:

Mail Services SPAM Filtering

GFI MailSecurity 2011 for Exchange/SMTP. Administration & Configuration Manual

Office 365 Groups. Creating, Managing, and Joining an Office 365 Group

Life After Webmail Reference Guide

Securing Office 365 with Symantec

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

SentinelOne Technical Brief

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

SandBlast Agent FAQ Check Point Software Technologies Ltd. All rights reserved P. 1. [Internal Use] for Check Point employees

ID: Sample Name: Unconfirmed crdownload Cookbook: default.jbs Time: 22:58:07 Date: 08/11/2017 Version:

ID: Cookbook: urldownload.jbs Time: 16:10:39 Date: 07/12/2017 Version:

WEBSENSE PERSONAL MANAGER

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

ID: Sample Name: binarydata Cookbook: default.jbs Time: 22:09:57 Date: 22/11/2017 Version:

Protecting from Attack in Office 365

Anti-Spam. Overview of Anti-Spam Scanning

ID: Sample Name: numbering.xml Cookbook: defaultandroidfilecookbook.jbs Time: 05:15:39 Date: 27/04/2018 Version:

Technical Brochure F-SECURE THREAT SHIELD

Get Max Internet Security where to buy software for students ]

Quick Heal Microsoft Exchange Protection

Untangle Administrator's Guide. Blitz Networking Systems

MODERN DESKTOP SECURITY

Anti-Spam Processing at UofH

How does the Excalibur Technology SPAM & Virus Protection System work?

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

FedPayments Reporter Encrypted Delivery Overview

6 Ways Office 365 Keeps Your and Business Secure

Outlook for ios/android App. Adding and Removing a Shared Calendar on Outlook for ios/android

The best for everyday PC users

Sophos Central Partner. help

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

MailCleaner Extended FAQ

Outlook Web App. Configuring and Managing Mailbox Rules for a Departmental Mailbox

Zillya Internet Security User Guide

Using Your New Webmail

TurnkeyMail 7.x Help. Logging in to TurnkeyMail

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Automated Context and Incident Response

Transcription:

Email Protection FAQs

Table of Contents Email Protection FAQs... 3 General Information... 3 Which University email domains are configured to use Email Protection for Anti-Spam?... 3 What if I am still receiving spam email to my inbox?... 3 What is Advanced Threat Protection (ATP)?... 3 Managing Quarantined Emails... 5 How do I manage my quarantine?... 5 How long do the messages stay in my quarantine?... 5 How do I receive notifications that an email has been quarantined?... 5 How do I use the Quarantine Notification email?... 5 How do I get an email that is not spam out of my quarantine?... 5 How do I use the web interface?... 6 University of Miami Information Technology Email Protection FAQs Page 2

Email Protection FAQs General Information Which University email domains are configured to use Email Protection for Anti-Spam? aeeas.physics.miami.edu arc.miami.edu as.miami.edu eng.miami.edu exchange.ir.miami.edu g.law.miami.edu law.miami.edu listserv.cgcent.miami.edu mail.as.miami.edu medlistserv.med.miami.edu miami.edu physics.miami.edu phyvax.physics.miami.edu rsmas.miami.edu students.law.miami.edu umail.miami.edu umiami.edu What if I am still receiving spam email to my inbox? No anti-spam system is 100% accurate. Spammers are constantly coming up with new and improved methods of sending spam and vendors of anti-spam software are constantly updating their software to detect the latest spamming trends. It is possible for spam messages to make it past the University's spam filtering system and into your mailbox. If you find this is the case and you occasionally have more than a reasonable amount of spam making its way to your mailbox, you can add the offending address to your Blocked Senders List (see Block a mail sender and Filter junk email and spam in Outlook on the web). For additional assistance, please contact the IT Support Center at 305-284-6565, option 3. What is Advanced Threat Protection (ATP)? Advanced Threat Protection is a protection service, which replaces all the URLs (web addresses/links) in an email with ATP URLs (e.g. https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2...). These ATP web addresses are routed through email protection services to determine if the destination website is a safe site. If the destination website proves to be a safe site, the user is allowed to access the destination. University of Miami Information Technology Email Protection FAQs Page 3

In the event a user tries to visit a site flagged as malicious, they will receive the following webpage. Below is a more technical explanation of ATP: Dynamically analyze and block, in real-time, malicious URLs and attachments that evade traditional antivirus and reputation filters delivering banking Trojans, ransomware, and other malware. Detect sophisticated malware attacks, including: Polymorphic and zero-day malware Malicious attachments Other advanced exploits In order to detect such advanced malware effectively whether malware spread via spearphishing emails containing a malicious attachment, watering hole URLs over email, or longline phishing campaigns our malware analysis system technology uses a combination of sophisticated techniques to evaluate advance threats, including: Real-time checks against emerging campaigns and new malicious websites that are being detected across organizations. Static code analysis that looks for suspicious behavior, obfuscated scripts, malicious code snippets, and redirects to other malicious sites. Dynamic malware analysis that sandboxes the destination URL or suspicious attachments to simulate a real user on a machine, with the goal of observing any changes made to the system. Our anti-evasion technology, in the dynamic analysis, tricks malware into revealing itself by creating virtual environments that accurately reproduce real system and real user behavior and interactions. This process provides comprehensive detection analysis that determines whether the destination URL or an attachment under suspicion is malicious, even finding malware that is sophisticated enough to conceal itself from detection leveraging techniques, e.g., IP rotation, mouse movement simulation, real browser sessions, time-delayed analysis. University of Miami Information Technology Email Protection FAQs Page 4

Managing Quarantined Emails How do I manage my quarantine? Your quarantine can be accessed in two ways; using the digest email message or logging into the web interface here. How long do the messages stay in my quarantine? Any email that is trapped in your quarantine will remain there for 14 days. After the 14 days, email will automatically be removed from the system. You should regularly check your quarantine, either through your digest email message or by logging into the web interface, to ensure that all email stored in your quarantine is actually spam. How do I receive notifications that an email has been quarantined? You can sign up through the web interface, you can manage your spam quarantined messages. To access the web interface, open a web browser and go here. You will need to log in using your CaneID and password. The web interface shows all suspected spam messages with sender's address, subject line, date, and the size of the email. How do I use the Quarantine Notification email? If you opted-in, you will receive a daily message listing all the spam email that has been quarantined. Review the message for any emails that were incorrectly identified as a spam. No action will need to be taken on the spam emails listed in the digest. However, if you find an email in the Digest that you suspect is not spam, you can release the item to your mailbox. How do I get an email that is not spam out of my quarantine? If you find an email that was quarantined but is not spam, click on the Release to Inbox link for that email and it will be delivered to your mailbox. Click Report as Not Junk to release the message to your Inbox and report the message as a false positive to Microsoft. University of Miami Information Technology Email Protection FAQs Page 5

How do I use the web interface? Through the web interface, you can manage your spam quarantined messages. To access the web interface, open a web browser and go here. You will need to log in using your CaneID and password. The web interface shows all suspected spam messages with sender's address, subject line, date, size, and the spam score of the email. The following options are available in the Spam quarantine web interface: Spam: View messages based on classification Spam, Bulk, and Phish Search: Filter out messages based on a set of criteria. Refresh: Refresh the list of Quarantined messages. Release: Release message to Inbox. Release & Report: Release message to Inbox and report the message as a false positive to Microsoft. How do I release a quarantined message? Select the message(s) you wish to release and click Release to release the quarantined message(s)to your Inbox. Click Release & Report to release the message to your Inbox and report the message as a false positive to Microsoft. The released message will have the current time and date stamp. How do I see more details about the quarantined message? Double click on a message to see a summary of the message properties in a pane on the right side of the page. You will see the following information: Message ID Sender Address Received Subject Type (Spam, Bulk, or Phish) Expires Released To Not yet Released To You can also get even more details about the message by choosing Preview message. Any links inside the email will be disabled. University of Miami Information Technology Email Protection FAQs Page 6

How do I search or filter my quarantined messages? If you have a lot of quarantined items, you can reduce the number to a manageable amount by filtering them with search. 1. On the Quarantine page, choose Search. 2. Choose any combination of conditions by selecting the check boxes next to them (you can't use wildcards at this time). There are several conditions you can choose, including the following: Message ID Sender email address Recipient email address Subject Received Expires Type 3. Choose Search to start the search. To see all the messages in quarantine again, choose Clear search. University of Miami Information Technology Email Protection FAQs Page 7