Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Configuration group offers three sub items: Configuration, Whitelists, and Pending Approvals

...

Configuration

...

Configuration

...

The first option to prevent internal emails from being marked as phishing should only be checked if you have a level of certainty that your internal emails will not be compromised. A compromised internal email is a very powerful platform to launch phishing attacks.

The second option requires an administer to approve a message prior to termination. To approve a phishing report, use the Pending Approvals view.

Whitelists

Whitelists specify which messages may not be processed even if marked as phishing by an end user.

...

. You can add entire domains or email addresses to the whitelist. Use the asterisk as a wildcard character.

...

Pending Approvals

If you have enabled the ‘require approval’ option specified above, phishing reports will show up in this view and will not be further processed until an administrator presses the Approve button. Pressing the Reject button will prevent further processing.

...