Configuration
The Configuration group offers three sub items: Configuration, Whitelists, and Pending Approvals
Configuration
The first option to prevent internal emails from being marked as phishing should only be checked if you have a level of certainty that your internal emails will not be compromised. A compromised internal email is a very powerful platform to launch phishing attacks.
The second option requires an administer to approve a message prior to termination. To approve a phishing report, use the Pending Approvals view.
Whitelists
Whitelists specify which messages may not be processed even if marked as phishing by an end user. You can add entire domains or email addresses to the whitelist. Use the asterisk as a wildcard character.
Pending Approvals
If you have enabled the ‘require approval’ option specified above, phishing reports will show up in this view and will not be further processed until an administrator presses the Approve button. Pressing the Reject button will prevent further processing.
Â
Â