Policy Settings
The settings on the Policy page determine how Cisco Secure Email Cloud Mailbox handles mail. Default settings are applied when you Set Up Secure Email Threat Defense. To change your settings, make the change, then click the Save and Apply button.
|
|
|
|
---|---|---|---|
Manually selected when you set up Secure Email Threat Defense. |
|||
■ Microsoft 365 Authentication – Read/Write - Allows visibility and on-demand or automated remediation (that is, move or delete suspect messages). Read/write permissions will be requested from Microsoft 365. – Read - Allows visibility only, no remediation. Read-only permissions will be requested from Microsoft 365. If you select Read, you need only set the Attachment Analysis and Message Analysis directions. Remediation policy will not be applied. |
Manually selected when you set up Secure Email Threat Defense. If you change your Microsoft 365 Authentication setting, you will be redirected to reset your Microsoft 365 permissions. Note: When you choose Microsoft 365 Authentication: Read/Write, you should also verify your Automated Remediation Policy settings. |
||
The presence of a Secure Email Gateway (SEG) impacts how Secure Email Threat Defense identifies the Sender IP. |
– Use Cisco SEG default header (X-IronPort-RemoteIP). – Use Custom SEG header. You must add the header you wish to use. |
Manually selected when you set up Secure Email Threat Defense. For more information, see Policy Settings with a Gateway. |
|
Messages to be dynamically analyzed, including: ■Direction of mail attachments to be analyzed by Cisco Secure Malware Analytics |
– All for Microsoft O365 Message Source |
||
Remediation actions for messages found to be: |
Note: If the sender address belongs to a sender allow-list in Exchange or the message has already been remediated by Microsoft 365, remediation actions are not applied. |
||
Safe Sender : Do not remediate Microsoft Safe Sender messages with Spam or Graymail verdicts. |
Messages tagged by Microsoft in the journal header as Safe Sender and with Secure Email Threat Defense verdicts of Spam or Graymail will not be remediated if this box is checked. |
||
Imported Domains - Domains are imported to help determine message directions. Domains can be excluded from Automated Remediation Policy. |
|||
Unchecked. When you turn on Read/Write Remediation mode, select these check boxes to apply auto-remediation to specific domains. |
|||
Apply auto-remediation to domains not in the domain list above |
Applies when a domain is not explicitly listed. For example, if a new domain has been added to your Microsoft 365 account but not imported into Secure Email Threat Defense. |
Unchecked. When you turn on Read/Write mode, select this check box to ensure auto-remediation is applied to all internal emails. |
Policy Settings with a Gateway
If you have a Cisco Email Security appliance or similar gateway in place, consider using the following policy settings.
|
|
---|---|
It is important to indicate that a Secure Email Gateway (SEG) is present and which header can be used to identify it in incoming journals so Secure Email Threat Defense can determine the true originating sender of a message. Without this configuration it may appear that all messages come from the SEG, which could result in false positive convictions.
For information on verifying or configuring the header on Cisco Secure Email Cloud Gateway (formerly CES) or Cisco Secure Email Gateway (formerly ESA), see https://docs.ces.cisco.com/docs/configuring-asyncos-message-filter-to-add-sender-ip-header-for-cloud-mailbox.
If you are using Microsoft 365 as your message source, we also recommend bypassing your appliance so journals are sent directly from Microsoft 365 to Secure Email Threat Defense. You can do this by adding a connector in Microsoft 365, as described in Set Up Secure Email Threat Defense.
Switching Your Message Source
To change your message source, navigate to the Policy page.
1. Select the radio button for the new message source.
2. A notice indicating you are switching your message source appears. Click Continue.
3. The Switch Message Source dialog appears. You need to configure your previous message source to stop sending messages to Secure Email Threat Defense. For details on how to do this, see Delete Your Secure Email Threat Defense Journal Rule or Configure your Gateway to Stop Sending Messages.
4. Select the checkbox indicating you have stopped sending journals or messages from your previous source, then click Next.
5. Configure your new message source using the Message Intake Address or Journal Address shown in the dialog. The steps for setting up each type of message source are detailed in Set up Your Message Source.