Forcepoint Security Portal Help
Forcepoint Security Portal Help
2019
©2019 Forcepoint
Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. All other trademarks used in this document are the property of
their respective owner.
Every effort has been made to ensure the accuracy of this document. However, Forcepoint makes no warranties with respect to this documentation
and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint LLC shall not be liable for any error or
for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The
information in this documentation is subject to change without notice.
Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Annotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Editing an annotation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Report this email as spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Adding annotations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Domains tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Adding domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
CNAME records and A records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
MX records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Connections tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Configuring inbound mail routing rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Testing mail routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Adding inbound and outbound routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Disaster recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Antivirus tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Editing inbound or outbound rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Antivirus exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
URL Sandboxing tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
URL sandboxing exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Antispam tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Antispam exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Adding an entry to a whitelist or blacklist . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Uploading a whitelist or blacklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Uploading whitelist and blacklist exceptions in bulk . . . . . . . . . . . . . . . . . . . 94
Antispoofing tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Spoofed Message Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Internal Executive Spoofing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
DKIM Signing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Antispoofing Checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Content Filter tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Editing content rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Attachments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Masking attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Quarantining messages with specific file types . . . . . . . . . . . . . . . . . . . . 105
Image analysis and quarantining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Attachment exceptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Parking attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Park attachments by file type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Creating custom file types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Unknown attachment types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Securing suspicious attachments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Message Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Filtering using lexical rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Phrase score and lexical rule thresholds . . . . . . . . . . . . . . . . . . . . . . . . . 113
Forcepoint Email Security Cloud protects your organization against the threats of
malware, spam, and other unwanted content in email traffic.
Forcepoint Email Security Cloud provides maximum protection for email systems to
prevent malicious threats from entering an organization’s network. Each message is
analyzed by a robust set of antivirus and antispam filters to prevent infected email
from entering the network. Domain and IP address based message routing ensures
reliable, accurate delivery of email.
The following add-on email modules are available in the cloud:
● The Forcepoint Advanced Malware Detection for Email module enables you to:
■ Send suspicious files received in email messages to a cloud-hosted sandbox
for analysis
■ Define whether suspected phishing messages should be quarantined, or
allowed with suspicious URLs replaced by a link to a block page that you
specify
● The Forcepoint Email Security - Encryption Module provides an additional
encryption option beyond TLS and manual exchange of passwords, offering
identity-based encryption and customization of the email notification that the
recipient sees before decrypting the message.
● The Forcepoint Email Security - Image Analysis Module enables you to
quarantine messages that have images attached to prevent potentially questionable
images from entering your organization. You can also add permitted images to a
whitelist.
You configure and manage your services using the Security Portal. The portal
provides a central, graphical interface to the general configuration, policy
management, and reporting functions of your service, making defining and enforcing
email security an easy, straightforward process. You maintain control over the system
through on-demand statistics and reporting, while powerful self-service tools allow
end users to manage quarantined mail, helping relieve the burden on IT staff.
This guide is intended for IT administrators who are responsible for setting up and
operating Forcepoint Email Security Cloud accounts.
It relates to all Forcepoint Email Security Cloud services, although the functionality
available to you depends on licensing.
The layout of the Security Portal screens is similar for all services. Wherever possible
this guide indicates where a feature or functionality is specific to a particular service.
Initial steps
Take the following steps to get started with Forcepoint Email Security Cloud.
1. Request an evaluation.
2. Register for the service.
3. Log on to the Security Portal.
4. Add inbound and outbound connections.
5. Add domains.
6. Set up outbound email routing.
7. Set up inbound email routing.
8. Restrict connections to your mail servers.
9. Set up users and groups.
It is likely that you have already completed these steps. If not please see the
Forcepoint Email Security Cloud Getting Started Guide.
Note
To use the Security Portal, your browser must be Javascript-enabled.
Related topics:
● Getting Started
If you have not already done so, we strongly recommend that you follow the advice
provided in the Forcepoint Email Security Cloud Getting Started Guide and restrict
connections to your email servers so that they only accept email from the IP address
ranges used by Forcepoint. These can be found on the DNS records and service IP
addresses page.
Privacy statement
Related topics:
● Logging on and portal security
The Security Portal uses 2 cookies during logon. The first is used to identify whether
the user’s Web browser is willing to accept and store cookies for the portal; it contains
no information. If the first cookie is successfully stored, a second cookie is stored
containing temporary information about the session. No personal information is stored
in either cookie, and both cookies are used only for the duration of the session.
Idle timeout
For security reasons, if you are logged on to the Security Portal and are inactive for a
predefined period, you are automatically logged off. When you next attempt to
perform an action, you are asked to log on again. Once you have done so, you are
taken to the page that you requested. The inactivity timer is between 30 and 60
minutes.
The Security Portal interface can be divided into the following main areas:
1. Banner
2. Toolbar
3. Content pane
The banner shows:
● Any Alerts that are available for your account.
● A Cloud Service Status option that provides a link to the Cloud Operations
customer dashboard. Use this link if you are experiencing any kind of pervasive
service problem to determine what might be happening and see what steps are
being taken to correct the issues.
● Your current logon account. When you’re ready to end your administrative
session, click the arrow next to the administrator name and select Log Off.
● The Help menu, from which you can access assistance for the page you are
currently viewing, further product information, and Forcepoint Technical Support
resources.
The Help menu also includes the Support PIN. You must authenticate yourself
with this PIN when calling Forcepoint Technical Support.
Each PIN is unique per user, and is generated when a user logs on. The PIN is then
valid for 24 hours after logon. After a 24-hour period has expired, a new PIN is
generated at the next logon.
Important
In order to preserve and maintain the security of your data, support representatives
will not be able to provide customer support without an accurate, up-to-date PIN.
The toolbar indicates which part of the Security Portal is currently active:
● Dashboard provides access to the Forcepoint Email Security Cloud dashboards.
● Reporting gives access to all reporting options, including email reports, account
service reports, and your saved reports.
● Email contains all configuration settings relating to Forcepoint Email Security
Cloud, including account-wide email settings, policy management, and the
Message Center.
● Account provides access to configuration options that apply to all cloud services.
This includes administrator management, directory synchronization, licenses, and
groups.
When you select an item in the toolbar, a navigation pane drops down, containing the
available navigation choices for that item. Click the toolbar item again to close the
navigation pane.
The content pane varies according to the selection you make in the navigation pane.
Dashboard
To view your main email dashboard, go to Dashboard. If you are a cloud web and
email customer, select the Email tab. The dashboard provides a snapshot view of how
your cloud email services are performing.
The panels you see depend on your subscription settings. You may see the following:
● Email Activity Overview - the number of inbound and outbound email requests
processed for your account in the last 7 days.
● Inbound Composition Categories and Outbound Composition Categories
- reports how Forcepoint Email Security Cloud categorized your inbound and
outbound email. Composition categories include:
● Top 5 Viruses - indicates the top 5 viruses seen in your account along with the
number of email carrying each of these viruses.
● URL Categories in Email - indicates how Forcepoint Email Security Cloud
classified all of the URLs found in your organization’s email.
● Cloud Email Spam Detection Rate - from an email flow of know spam
messages (separate from all subscriber email flow), indicates the percentage of
messages classified as spam by Forcepoint Email Security Cloud analysis. This is
a good indicator of the Forcepoint Email Security Cloud spam detection rate.
You have the option of viewing this data in either a bar graph or pie chart.
Alerts
Click the speech bubble icon in the toolbar to see alerts for your account.
Alerts are the primary means of communicating with customers to keep you fully
informed of service issues. If you suspect that there may be a problem with the
service, log on and check for new alerts. The number of alerts for your account is
displayed with the alert icon.
You may see the following alert types:
Select an alert summary in the left pane to see more detail, if available, in the right
pane.
Administrators with account-level privileges can click Account in the cloud portal
toolbar to see the configuration options that apply to the complete account. The exact
options available on the menu depend on the services you are licensed for.
● To change the password for your cloud service administrator account, select My
Account.
● To view the configuration audit database for your account, select Audit Trails.
● Select Contacts to view and modify the contact details of people in your
organization who administer, support, and pay for services. The administrator
contacts can be given logons to the portal and their permissions restricted as
necessary. You can also use this page to modify your password settings, set two-
factor authentication, and display a terms of use page for administrators.
● To set up your own combinations of file types, MIME types, and file extensions
for email attachment blocking, choose Custom file types.
● If you are using Before configuring directory synchronization for your account,
see Planning for your first synchronization.
● Select End Users to search for end users so you can enable or disable their Web
access, delete them, or change their policy assignments. (This option is available
only to accounts enabled for directory synchronization.)
● When you define Groups, they are available in all your policies in all services.
This allows you to define a consistent set of rules across the services for groups of
end users.
This chapter covers the configuration of account-level options. To configure the
majority of email service options, click Email in the toolbar and then select the
appropriate setting type or policy.
My Account
Use the My Account page if you need to change your password or generate a new one.
Enter and confirm a password, then click Submit when done. The password must
conform to your password policy, as described on the screen.
Optionally, you can also change your password question. Select a question from the
drop-down list, then enter an answer to the question and click Submit.
See Changing passwords, page 17, for more information about passwords.
Contacts
Related topics:
● Adding a contact
● Password settings
Use the Contacts page to define the password policy for administrators in your
account, and to manage the contact list and administrator logons.
The Account Management area displays the current requirements for passwords in
your account, as well as any expiration limit. For more information, see Password
settings, page 14.
The contact information in the Contacts area is created with the details supplied
during enrollment. The initial contact assumes the role of master user, a super
administrator with the highest rights and privileges for your account.
Forcepoint Support uses the contact details defined on this page should they need to
contact you. You can specify multiple contact addresses and numbers for each contact,
plus a call order that specifies the order in which each contact method should be
attempted.
Note
If the contact also has logon privileges, you must enter an email address to enable
them to use the password reset function, if required.
It is your responsibility to administer the logon privileges for the contacts in your
account, and to ensure access to the cloud portal is maintained or protected as
appropriate. You are also responsible for any actions taken by the users of the
administrator logons that you create.
Adding a contact
To add a new contact:
1. Click Add.
2. Select the new contact’s Title, and enter the first name and surname. The Full
name field is automatically populated.
3. Select the Contact type from the drop-down list.
4. Optionally, enter further details for the contact, including the job title, department,
and address.
5. Enter a telephone number, email address, or both. It is recommended that you
provide at least one form of contact that Support can use if required.
6. Select a preference for each contact method, to inform Support of the preferred
order in which to attempt each contact method.
7. Click Submit.
Note
You can also access this screen by clicking the contact’s logon ID in the User Name
column on the main Contacts screen.
2. By default, the email address is used as the contact’s logon ID. To change this,
edit the User Name field.
3. Enter and confirm a password for the user.
You can type a password for the user and confirm it. Alternatively, if you want to
automatically generate a password that complies with the password policy, click
Create a password for me. The password, which meets the stated password
policy, populates into the Password field.
4. Define when the user’s password should expire. By default this uses the expiration
settings defined as part of your account’s password policy (see Password
expiration limit, page 16).
5. To force the user to change the password when they log on, mark Change
password next log on. This is recommended.
When the user first logs on, a screen is displayed giving them 8 days to select a
password question from the list provided and enter an answer. This password question
and answer is used if the user later forgets their password (see Forgotten passwords,
page 18). If the user does not set a password question within the 8-day limit, they are
forced to do so at their next logon
Note
If you have enabled two-factor authentication for a user, this page can be used to
reset authentication for users who have been locked out, or who are unable to use
their authenticator app. Click Reset beside the Two-factor authentication label to
require the user to configure authentication again. See Two-factor authentication,
page 19.
This page also displays the date and time of the user’s last successful and
unsuccessful logon, if available.
Configuring permissions
By default, all rights are assigned to the master user (the initial contact established in
your account, with super administrator privileges). When the master user creates a
new user, by default only the View All Reports permission is assigned to that account.
This is the minimum permission a user needs to be able to log on; it grants
permissions over only the Reporting tab on the main menu bar.
We provide flexible users’ rights so you can create a hierarchy of administrators. For
example, much of the functionality accessed from the portal is useful for help desk
agents to aid with problem isolation; but they do not necessarily require control over
policy configuration.
Likewise, you should assign Directory Synchronization privileges to the contact you
set up for the Directory Synchronization Client (see Set up authentication, page 37),
but no-one else should need this privilege.
Permissions are granted at an account and policy level. This lets you create multiple
policies, and administrators can control their own policy but no one else’s.
Note
Visibility for some account and policy permissions depends upon the permission
being assigned to your administrator account. If you do not have a permission, you
cannot view or manage that permission for other users.
4. Use the Policy Permissions table to add or remove policy, audit trail, and related
permissions.
■ Refer to the list below for information about each permission set.
■ To refine policy-level permissions, click Advanced.
Note
The Advanced button does not show for contacts with Manage Users permissions,
because they are assumed to have maximum account-level permissions.
Note
The View Filtered Reports option may not be enabled in your account.
Note
If users are logged on to the portal when their permissions are changed, the changes
do not take effect until they log off and then log on again.
Password settings
Related topics:
● Password policy
● Password expiration limit
● Changing passwords
● Forgotten passwords
● Two-factor authentication
● Terms of use
Click Account > Contacts > Edit to define password settings for your account. On
this screen, you can define an expiration limit for your users, set the user lockout
option, and set two-factor authentication for all users. If you have more than one
password policy (a policy that defines how “strong” your users’ passwords must be),
you can also choose which policy to use.
If available in your account, you can also use the selected password policy for your
end users. Select Apply password policy to end users authenticating with the
service to impose the same password requirements for any end users who are
registered for the service and using manual authentication, including the minimum
and maximum length and restrictions on using previous passwords. If you have also
defined a Password expiration limit, you can select Remind end users when
passwords should be changed to send an email reminder to end users when they
need to change their passwords.
Note
Password policies for end users is a limited-availability feature and may not be
enabled in your account.
Password policy
Related topics:
● Password settings
● Password expiration limit
● Changing passwords
● Forgotten passwords
● Two-factor authentication
● Terms of use
A password policy defines how “strong” your users’ passwords are required to be. (A
strong password is a secure password.) The password policy in the cloud portal sets
the minimum length, maximum length, password history, sequence rules, and unique
character rules of a user’s password.
Following are the minimum requirements:
Parameter Default
policy value
Minimum length 8
Maximum length 30
Password history size (number of former passwords to check) 3
Maximum number of characters in sequence 4
Minimum number of unique characters 5
In addition, passwords:
● Cannot contain the user’s logon ID
● Cannot contain common words or keyboard sequences
● Must include uppercase letters
● Must include lowercase letters
● Must include numbers
Related topics:
● Password policy
● Password settings
● Changing passwords
● Forgotten passwords
● Two-factor authentication
We recommend that you require users to change their passwords on a regular basis.
Passwords can be set to automatically expire after a set number of days. You can
override this setting for individual users on their Login details screen (see Adding
logon details, page 11).
1. Navigate to Account > Contacts.
2. Select a Password expiration limit setting. If you select No, passwords will
never expire (not recommended). If you select Yes, a drop-down menu allows you
to set the number of days after which passwords will expire.
From the menu, select one of the following as the expiration period: 30, 60, 90,
120, 180 days, or Custom days. If you select Custom days, a new field appears so
you can enter any number of days you want. Periods longer than 365 days are not
supported.
3. Click Save.
User lockout
Related topics:
● Changing passwords
● Forgotten passwords
● Resetting two-factor authentication for a portal user
If a user enters an incorrect password when attempting to log on, they have a limited
number of further attempts before they are locked out for a period of time. You set up
the number of further attempts and the lockout time period on the main setup screen
for the user.
1. On the Contacts screen, click Edit.
2. From the User lockout drop-down list, select a lockout time period. The options
are 15 minutes, 1 hour, 4 hours, 24 hours, or Forever.
If you select Forever, an administrator with Manage Users permissions must
unlock the user account before the user can log on again.
3. Select the number of permitted failed attempts from the drop-down list. This can
be between 3 and 10.
4. Click Update.
Changing passwords
Related topics:
● Password policy
● Password settings
● Password expiration limit
● Forgotten passwords
● Two-factor authentication
Users are required to change passwords when they expire or when a change is forced
by an administrator. Only administrators with Manage Users permissions can force a
user to change his or her password. To force a change, select the Change Password
next logon box on the user’s contact screen. When users are required to change their
passwords, they see a Change Password screen the next time they log on.
Users can also opt to change their password from Account > My Account, which
displays the same Change Password screen.
If a user creates a password that does not meet the password policy standards, they
receive an error message and are asked to try again. For example:
This password has been used recently. Please try another.
To implement the changed password, users should click Save. They should also make
note of the password for future reference.
Forgotten passwords
Related topics:
● Password policy
● Password settings
● Password expiration limit
● Changing passwords
● Two-factor authentication
If a user forgets their password, they can click the Forgot your password? link on the
logon screen and follow the instructions to reset the password:
1. The user enters their portal user name and clicks Submit.
2. The cloud service sends an email to the email address listed in the contact details
associated with that user name.
Note
If the email address set up for the user name on the Contacts page is out of date or
invalid, the user must contact their administrator to get their password reset.
Note
If a user forgets the answer to their password question, they must contact their
administrator to get their password reset.
Should you need to generate a new password for a user, follow these steps:
1. Go to Account > Contacts.
2. In the User Name column of the contact list, click the required user name.
3. Click Edit on the User screen.
4. Click Create a password for me.
5. Make note of the password.
6. Click Submit.
Two-factor authentication
Related topics:
● Resetting two-factor authentication for a portal user
● Password policy
● Password settings
● Password expiration limit
● Changing passwords
Note
Compatible authenticator apps are available for Android, iOS, Blackberry, and
Windows Phone. Desktop and browser-based apps are also available for Microsoft
Windows, Mac OS, and Linux. This feature is validated with the Microsoft
Authenticator app, but alternative apps that use the Time-based One-time Password
Algorithm (TOTP) protocol, such as Google Authenticator, are also supported.
Terms of use
Related topics:
● Email: Configure block and notification pages
●
The Terms of use option allows you to display a page that requires administrators to
agree to your company’s terms of use before logging on to the portal. If enabled, this
setting applies to all portal administrators. Administrators must agree to the terms of
use each time they log on.
Your “Agree to Terms of Use” block page should be customized to include details of
(or provide a link to) your terms.
See Configure block and notification pages, page 58 for details of how to customize
block pages.
To enable the terms of use acceptance page for all portal users:
1. Go to the Account > Contacts page.
2. Toggle the Terms of use switch to ON.
3. Click Save.
The next time portal administrators log on, they will be prompted to either accept your
terms of use, or log off.
Note
By default, a generic “Agree to Terms of Use” block page is provided. Before
enabling this feature, ensure you customize this page to include details of (or a link
to) your company’s terms of use. See Configure block and notification pages, page
58 for details of how to customize block pages.
The cloud service provides a number of file formats and file types to enable you to
manage messages containing attachments. File types allow you to quarantine
attachments by specific formats, for example GIF files or HTML documents. File
formats are more generic: for example, the Sound format includes anything related to
sound files, including RealAudio, Windows Media Audio, MPEG Audio, and MIDI
files.
If the available file formats and types do not meet your requirements, you can set up
custom file types containing one or more file types and MIME types. You can then use
the custom file types to quarantine or park messages with the attachments you specify.
For more information, see Creating custom file types, page 109.
Directory Synchronization
Related topics:
● Working with LDAP Directories
● What is LDAP?
● How the service works with LDAP
● Basic steps
Click Account > Directory Synchronization when you want to configure your
account for directory synchronization. See Configure directory synchronization, page
35, for details on this screen and other LDAP considerations.
End Users
Related topics:
● End Users tab
● Managing registered users
To view and manage user data, click Account > End Users. (This option is only
available if you have directory synchronization enabled.) The resulting screen has 3
columns.
Column Description
Criteria to use Check the boxes on the left to indicate what search criteria to use.
Search Criteria Narrow down the search by entering or selecting precise data in
the middle column. Under source, you can choose whether to
search synchronized users or portal-managed users.
Show in Results Check the boxes on the right to indicate what information to
include in the results.
Click Search when done. Please note that the search may be slow if there are a large
number of users.
From the resulting data, you can make individual edits or bulk edits. For example, you
can:
1. Undo the manual override (applies only to directory synchronization)
2. Delete one or more users
Use the Download results option at the bottom of the screen to export the search
results to a CSV file.
Using the drop-down list between the search box and the search results, select the
action you want to make, then select the users on which to perform the action and
click Go. All changes made on this screen override any group/policy assignments
(existing or future ones).
You can view and manage user data at the policy level as well using the End Users
screen for the policy. The account-level page shown here is available only to users
with account-level privileges.
Groups
Related topics:
● Downloading and uploading groups
The groups functionality enables you to create policies using your organization’s
hierarchy.
Groups can contain:
● email addresses of users in your organization
● other groups
Groups are configured at the account level. To set up groups in the cloud service, click
Account > Groups.
The resulting screen shows a list of groups currently defined for your account, an
indication of whether they were added manually on the portal or automatically
through the directory synchronization feature, and the web policy to which the group
is assigned.
On this screen, you have the ability to create new groups and edit group membership.
Click a group name to edit it, or click Add to add a new group.
Important
Add or load groups only if you intend to use them for policy assignment or
exceptions. You don’t need them just because users are members of them.
If a policy includes a group that contains email addresses not on domains routed by
the cloud email service, those email addresses are ignored.
Warning
If you already have groups in place for web users and there are dependencies
between the groups and rules, selecting Replace all groups with CSV file could
void exceptions to your rules. (For example, if a rule states that no one but the
Accounting group can access www.financialnews.com, and then you upload a new
Group list, it is possible that Accounting could lose access to that website.)
To maintain existing group/rule associations, make sure that group names in the
CSV file match group names in the portal exactly. The best way to achieve this is to
download existing group configurations to a PC, manipulate them as needed, then
upload the changes to the cloud.
Licenses
Related topics:
● Licenses page
● License information
● Accepting licenses
Our subscription model operates in a similar manner to many software vendors: to use
the service, you must accept the terms of your agreement. Once you have done this,
your services are automatically enabled, renewed, or upgraded depending upon the
subscription type.
The purchase and billing systems are fully integrated with the cloud portal. Each cloud
service has a subscription associated with it, and that subscription is applied to each
customer account.
To view the subscriptions associated with your account, go to Account > Licenses.
You can use this area of the portal to view and manage your rights to use cloud
services.
Note
If an alert indicates that your account is currently unlicensed, or that a license has
been added or changed and must be accepted to place the provisions into service,
please check the Account > Licenses page for further information.
Licenses page
Related topics:
● License information
● Accepting licenses
The Licenses page provides basic information about your account, including:
● The account status
● Your enrollment key
● A summary of licenses for available products and add-on modules. A tick appears
next to the components that your account is licensed for.
● The length of time your reporting data is retained
● The location where your reporting data is stored.
Depending on the subscriptions associated with your account, you may also see up to
3 sections:
1. Pending licenses: Licenses that require accepting.
2. Current licenses: Licenses that have been accepted and are currently valid.
3. Previous licenses: Licenses that have either expired or been replaced by another
license.
License information
Subscriptions are generated automatically when you order a service. Each
subscription contains the following information:
● Users: The number of users or mailboxes for which your account is licensed.
● Started / Expires: Start and end dates of the license.
● Contract: The contract governing the license. This contains a link to a copy of the
contract.
Accepting licenses
The first time you log on to a new cloud service account, you are shown the licenses
screen and must accept the terms of the agreement to activate your account and
continue. If multiple subscriptions exist, you can accept them all at once.
Whenever a new subscription is ordered for you (for example, at renewal time or
following an upgrade), it is added to your account in a pending state. You must accept
this subscription to use the service. Each time you log on, you are taken to the licenses
screen to remind you that a subscription requires accepting.
Note
To ensure continuity of service, you should accept any pending licenses as soon as
possible. This requires Modify Configuration permissions.
If your license expires before you have a chance to renew it, you receive a grace
period. During that period, please order a new subscription as soon as possible.
● Your account can enforce multiple policies on your email and web traffic.
● It is good practice to keep the number of policies to a minimum, because if a
global change is required, you must make it across all policies.
● To prevent accidental changes, many configuration options are grayed out until
you click the appropriate edit box.
● Each service has its own configuration screen accessed by clicking the appropriate
tab on the main policy setup screen. Regardless of the services that you are
licensed to use, you see all tabs. If you click the tab for a service that you are not
licensed to use, you are informed of such.
● Where multiple email addresses, domains, or user names are entered into a screen,
they should be separated by commas.
● You can click Help at any time to access online help information.
● All changes are made in real time and usually only take a few minutes to
propagate across the cloud infrastructure.
● Forcepoint Email Security Cloud analyzes inbound and outbound email including
both inbound and outbound spam. Analyzing outbound spam helps detect email
that might be being sent by a botnet or otherwise compromised system at your
site.
● Most settings in the policy screens are specified separately for inbound and
outbound policy application. It is often not appropriate to set these identically for
each direction. For example if a virus is detected in outbound email, then you
probably do not want to send a notification to the intended recipient, whereas you
might for an inbound email.
● Each Forcepoint Email Security Cloud policy applies to a domain or set of
domains and specifies settings that the cloud email service uses to determine how
to process your email.
● If you need to route email for different domains to different servers, you need to
create a separate policy for each set of domains. Each policy includes its own
routing table.
To access an email policy, go to the Email > Policy Management > Policies page.
On the Policies page, you are presented with a choice of service-specific policies.
Related topics:
● Maintenance
● Configure directory synchronization
The cloud service allows you to make use of existing LDAP directories, such as
Active Directory or Lotus Domino, so you don’t have to re-create user accounts and
groups for your email and web services or manage users and groups in two places.
The cloud service synchronizes with LDAP directories via a client-resident
application known as the Directory Synchronization Client. Changes made to a
directory, such as deleting a former employee or adding a new one, are picked up by
the service on the next scheduled update. If you have more than one LDAP directory,
the client can merge them together before synchronizing the data with the service.
Important
The cloud service supports only one instance of the Directory Synchronization
Client for each account. Using multiple synchronization configurations, or even
using multiple installations of the Directory Synchronization Client, can cause data
on the cloud service to be overwritten.
For Forcepoint Email Security Cloud, you can synchronize primary and secondary
email addresses and groups into the portal, improve spam detection, and improve the
quality of reporting (less spam in the report). Directory synchronization makes it
easier to manage groups as well.
What is LDAP?
Related topics:
● How the service works with LDAP
● Basic steps
● Cloud-based tasks
● Client tasks
● Maintenance
● Configure directory synchronization
● Set up authentication
5. The client authenticates with the portal using a username and password that you
establish manually on the Contacts page. (Consider an appropriate password
expiration policy for that user so you don’t have to regularly update the client
application with the password changes.)
6. LDAP synchronized data is viewable but not editable through the portal.
The synchronization client resides on a computer at the customer’s site and accesses
one or more LDAP directories via the customer’s network. If more than one LDAP
directory is accessed, then this data can be merged together by the synchronization
client before it is synchronized with the cloud service.
When you are setting up directory synchronization, it is important that you review the
data you are about to synchronize before you synchronize it. The way that you
structure data in your LDAP-compliant directory affects how you should structure
groups and users in the portal for policies and exceptions. You should devise a
synchronization strategy before you start.
To start, what data do you want to get out of your LDAP directory and what do you
plan to do with it?
Second, how is that data organized?
Third, how do you need to structure users and groups in the portal to accommodate
your security requirements?
In a typical directory, users are members of many groups. For example, users may be
members of global groups like “All Sales;” they may be members of geographical
groups like “London” or “New York;” and they may be members of a department such
as “NY Telesales” and many others. When deciding on which groups to synchronize,
select only groups that are going to be useful to the cloud service, typically for setting
policy or group-based exceptions. See Deciding what to synchronize, page 33 for
more guidelines on this decision.
If you already have users and groups in the portal, then you’ll need to determine how
and whether to adjust that structure to match the LDAP directory (or vice versa).
Following are the most common use cases. Follow the links to review considerations
and checklists designed just for you.
● New customers:
■ Synchronizing users/groups with a single Web policy and exceptions
■ Synchronizing users/groups with more than one policy, and planning to
manage policy assignment through an LDAP directory
● New and existing email customers:
■ Synchronizing email addresses to provide a “whitelist” of valid email
addresses
■ Synchronizing users/groups to provide per-user/per-group exceptions to email
policies
● Existing customers:
■ Wanting to manage users/groups from an LDAP directory
■ Wanting to manage users/groups from an LDAP directory but Web policy
assignment from the portal
Related topics:
● What is LDAP?
● How the service works with LDAP
● Basic steps
● Cloud-based tasks
● Client tasks
● Set up authentication
You do not need to synchronize all of the groups and users in your LDAP-compliant
directory. Instead, synchronize only groups that are useful to the cloud service.
Consider this Active Directory (AD) example:
If you are going to set up a policy for members of a US Telesales department that
gives them special permission to access certain websites, you should synchronize the
“US Telesales” group. There is no need to sync the “London” group if you are not
going to set up geographical policies in the cloud service, even if the London users are
going to be using the service.
Sometimes when users are synchronized to the cloud service, they are members of
multiple AD groups, but only a subset of those groups is synchronized. This is not a
problem: the cloud service is designed to accept users with group references that are
not on the service.
You specify which groups to synchronize using an LDAP search facility on the
Directory Synchronization Client. There is great flexibility in selecting the appropriate
data to synchronize. For example, you can use the membership of an LDAP group
attribute to select the users you want, even though you may not select that group in the
group synchronization setup itself.
Note
If you add or change a group name in Active Directory or move a group from one
organizational unit (OU) to another, be sure to add the new name to the group
inclusion list on the Directory Synchronization Client before the next
synchronization. Otherwise, the group is deleted from the portal.
Regardless of how many groups you synchronize, user detail must be sent as part of a
separate user synchronization. When you synchronize a group, you transfer
information about the group but not about its contents. User synchronizations include
details of the group(s) to which users belong. When you apply a web policy or an
email policy to a synchronized group, that policy is applied to all synchronized users
who are members of that group.
Please refer to the Directory Synchronization Client Administrator’s Guide in the
Technical Library for more information on using the LDAP search feature to target
only those users and groups that are required.
Basic steps
Although the steps for your use case may vary, the basic steps for setting up directory
synchronization follow:
In the cloud
1. Configure directory synchronization, page 35, for your account.
2. Set up authentication, page 37, for the client machine. The client should have its
own username and password to gain access to the cloud service.
On the client
1. Download the Directory Synchronization Client (see Client tasks, page 38) and
install it on a network client machine. Download the client administrator’s guide
as well. This contains valuable information on helping you integrate your
directory service with the cloud service.
2. Configure the client. Use the username and password established in the Contacts
section of the portal to authenticate.
3. Test the Directory Synchronization Client to make sure it is returning the correct
data from the LDAP server to the client. If you are an existing customer switching
to directory synchronization for the first time, you should compare the data with
that which already exists in the cloud.
4. Initiate a synchronization. The service updates its groups and users, including
policy assignment where appropriate.
If a synchronization is unsuccessful, you can use the Restore feature to restore the
directory information to a previous version. (See Restore directories, page 41 for
more information.)
5. Schedule automatic synchronization. You can update the cloud service several
times a day if required.
Refer to the Directory Synchronization Client Administrator’s Guide for instructions
on items 2-5.
Cloud-based tasks
Related topics:
● Maintenance
To set up your account for directory synchronization, perform the following steps in
the portal:
1. Configure directory synchronization, page 35, for your account.
2. Set up authentication, page 37, for the client machine.
General
Overwrite groups If you are a new customer with no group data in the cloud,
leave this box unchecked.
If you have existing data and are migrating to LDAP, check
this box if you want to overwrite current groups with the
synchronized groups when there is a group name conflict.
Users, groups, and email addresses are overwritten by LDAP
data of the same name. Once this occurs, they are
manageable only by LDAP synchronization.
If you are switching to LDAP for the first time, take care to
match your LDAP group names and membership to the
existing setup. Doing so allows existing policy selections
and settings to be maintained, as well as existing usernames/
passwords where applicable.
If you have duplicate names, you have 2 options: make sure
the duplicate can be overwritten or don’t allow overwriting
and rename the duplicates to avoid a conflict.
If you don’t select this option and duplicate names are found,
the transaction is rejected. In the cloud, you receive the error
“403: Attempt to overwrite portal-managed group ‘nnnn’.”
On the client, you receive “Error communicating with the
Hosted Service portal. Update abandoned.”
Web
Assign users to policy Because you are synchronizing user and group data, you can
manage policy membership through group membership.
Select the web policy to which you want to assign users if
they have no group-based policy assignment already. By
default, the first policy in the list is chosen.
User policy assignment Specify whether you want the user policy assignment to be
fixed after the first synchronization, or if you want the
service to check the group policy membership every time
users are synchronized or group policy assignments are
changed in the cloud.
Select “Follow group membership” if you want users’ policy
assignments to change automatically when there are changes
to their group membership. If you move someone to another
group, he or she moves to a different policy. This is the
default.
Select “Fixed” if you want to manage policy assignments in
the cloud. When you select “Fixed,” the service makes a
policy assessment for an individual user only when that user
first appears in the system (in other words, is synchronized
for the first time). It either assigns the user a group-based
policy or the default policy specified above. If you want to
move someone to a new policy, you need to do so in the
cloud.
Web
Email new users Select one of the radio buttons to indicate whether you want
email sent to new end users to notify them that they are now
protected by the cloud service. You can send email to all new
users, only those who do not have an NTLM identity, or no
one.
Be aware that sending to end users could flood your email
servers with messages and slow down performance. You’re
asked to confirm this decision. We recommend you do this
at a quiet time.
Email notification Choose which email you want to use to notify end users of
their enrollment in the cloud service. Initially, only the
default message is offered, but you can create custom
notifications if desired. See Configure block and notification
pages for more information.
For sender’s address, enter the address from which you want
notification messages sent to new users.
Email
(Quarantine/discard/ This determines what happens to email arriving at the cloud
bounce.) mail for service that is sent to an unknown email address. By default
unknown users it is quarantined.
Check this box if you want the message handled in this way.
Leave it unchecked if you do not.
Only Forcepoint Technical Support can modify the
disposition of this option.
Occasionally customers cannot enable or disable this option.
This happens when addresses have not been synchronized, a
similar access control has been manually added to your
policy, or Customer Services has explicitly turned it off.
Note
You can turn off directory synchronization any time and revert to managing all
users, groups, and email addresses in the cloud. If you plan to do this, please see
Turn off directory synchronization, page 42 for possible considerations.
Set up authentication
On the Contacts page, set up authentication for the client machine. We strongly
recommend that the client have its own username and password to gain access to the
cloud service. This keeps the synchronization process separate from your other
administration tasks and enables you to establish longer password expiration policies.
Once you establish a contact for the client machine, you configure the client to pass
these logon credentials when connecting to the service.
1. On the main menu bar, click Account.
2. Click Contacts.
3. In the Contacts section, click Add.
4. Enter identifying information for the client machine in the First name and
Surname fields. For example, “Directory Sync” and “Client.”
5. Click Submit.
6. In the User Name field, click here to add a user name.
7. Enter a password for the client machine. It must conform to the password policy
on the main Contacts page.
8. Enter a password expiration date for the client. To avoid having to regularly
update it, this should be different than the regular account settings; it should span
a longer period.
9. Under Account Permissions, check the Directory Synchronization box, and any
other permissions you want to give this “user”. You can act as an administrator
from this logon.
10. Click Submit.
Client tasks
Maintenance
After directory synchronization is set up and running properly, you can perform the
following tasks in the portal:
1. View and manage user data. Note you cannot edit data that has been synchronized
from your directory.
2. View and print reports
3. View recent synchronizations
4. Restore directories to previous version
5. Troubleshoot synchronization failures
6. Turn off directory synchronization
Report Description
Synchronization History The history log provides a connection history for the
Log specified period, up to 1000 rows.
Synchronization Time The time summary provides a list of the 20 longest
Summary synchronization times.
Column Description
Heading
Date The date and time that the synchronization was performed in
coordinated universal time (UTC). Format YYYY-MM-DD
HH:MM:SS.
Status An indication of whether the synchronization completed or failed.
Possible HTTP response codes include:
● 200 OK - Completed successfully.
● >400 - Synchronization failed
■ 403 Error text - The client synchronization failed for reasons
given in the error text. For example:
■ 403 Groups contain circular references
■ 403 Transaction failed
■ 403 Attempt to overwrite cloud-managed group.
■ 403 Email address exists in another account
● 503 Service Unavailable.
Type The type of record that was synchronized: Users, Groups, Addresses,
or Test. Test indicates that the client connected to the cloud service to
verify its settings, but did not synchronize.
Additions The number of new records added during the synchronization. If the
synchronization is not yet complete, “In progress” is displayed.
Deletions The number of records deleted during the synchronization.
2. Click the timestamp in the date column to view details about a specific
synchronization.
In the resulting screen, you can see the time that the connection started and ended
in the local time zone of the client machine. (This lets you see how long the
synchronization took). You can view the IP address of the source connection, the
username of the client initiating the synchronization, and the number of records
amended, added, or deleted. You can also see reporting and logging information.
Restore directories
If necessary, you can undo the last directory synchronization and restore the system to
its state before the synchronization.
Important
It is not possible to undo the restore, so changes you made in the cloud between the
last synchronization and the restore operation may be lost. You are warned of the
potential impact and asked to confirm the action.
Partially transmitted and temporarily stored data remains in the cloud service for a few
days as a possible debugging aid. This data is not used when you try to synchronize
again.
Important
Ensure that a synchronization is not under way when you disable directory
synchronization. If a synchronization is running, you may end up with an
incomplete set of data: for example, your groups might have synchronized
successfully, but your users might not.
When you turn off directory synchronization, Group and user IDs on previously
synchronized items are retained, so you can easily re-enable synchronization at a later
date.
Please note that changes made manually in the cloud to data items that were
previously synchronized are lost if you later re-synchronize. When you re-enable
synchronization, you are indicating that it is now the LDAP directory that holds the
master data, and a full re-synchronization is performed.
Related topics:
● File sandboxing
● Aliases
● DNS records and service IP addresses
● Blacklists and whitelists
● Personal Email Subscriptions
● Email notifications
● Configure block and notification pages
● Image whitelist
● Defining Email Policies
Use the Email > Settings options to configure account-level settings for Forcepoint
Email Security Cloud, including aliases, blacklist and whitelists, and end user email
reports (Personal Email Subscriptions) for your account.
File sandboxing
Related topics:
● What does a file sandboxing transaction look like?
● URL Sandboxing tab
● URL Sandboxing utility
Note
You must have the Forcepoint Advanced Malware Detection for Email module to
use this feature.
Use the Email > Settings > File Sandboxing page to send suspicious files received in
email messages to a cloud-hosted sandbox for analysis. The sandbox activates the file,
observes the behavior, and compiles a report. If the file is malicious, the message is
either quarantined, or an email alert is sent to the administrators that you specify,
containing summary information and a link to the report.
A file that qualifies for sandboxing:
■ Is not classified as “malicious” by virus scanning or Forcepoint ThreatSeeker
Intelligence
■ Fits the Security Labs profile for suspicious files
■ Is a supported file type for sandboxing.
Note
Because the file was not detected as malicious, it was not blocked and has been
delivered to the email recipient.
1. File analysis is disabled by default. Select On to send qualified files to the cloud-
hosted sandbox for analysis.
2. Select the analysis mode you wish to use:
■ Monitor only performs the file analysis; however, because the file was not
originally detected as malicious, it is not blocked and is delivered to the email
recipient regardless of the analysis results.
■ Enforce holds any messages with attachments sent for analysis, and then
quarantines those messages found to contain malicious attachments.
3. Specify the email address of at least one person in your organization who will
receive notifications.
Notifications are sent only for monitor mode. If you have selected the Enforce
mode, you may still want to enter an email address in case a message pending
analysis is released from quarantine with no further processing before analysis is
complete. In this case, a notification will be sent if the attachment is found to be
malicious.
The specified person does not have to be a Forcepoint Email Security Cloud
administrator. If you specify multiple email addresses, ensure you enter one
address per line.
4. Select the file types you want to submit for analysis from the File types to scan
list.
5. Click Save.
CNAME records
The CNAME Records section lists the DNS CNAME records you must publish in
order to enable DKIM signing for outbound messages (see DKIM Signing, page 100).
The domains listed on this page include a code that is unique to your account.
Prior to enabling a DKIM signing rule, you must create CNAME records in each
domain you wish to use as the DKIM signing domain (note that the same DKIM
signing domain can be used for all sender domains that are sub-domains of the signing
domain).
The public/private key pairs used for DKIM signing are managed by Forcepoint, and
are rotated periodically, with a period of validity overlap to allow the successful
signing of delayed messages. Two CNAME records must be published for each of
your signing domains, enabling a DNS lookup to validate signed messages.
In the DNS records for your signing domain, map the host subdomains listed in the
table to the corresponding out.mailcontrol.com domain. For example:
Note
Keys are automatically rotated after six months. Forcepoint will publish the TXT
record for the secondary key (fpkeyNNN-2) six months after the creation of the
fpkeyNNN-1 record. Customers are required to add both CNAME entries at the
outset, so that key rotation can occur without further action needed.
Note that NNN in the examples above represents a number unique to your account.
Use the CNAME Record check function on the Antispoofing tab to ensure that your
CNAME records have been published correctly. See Enabling a DKIM signing rule,
page 101.
Service IP addresses
Because Forcepoint Email Security Cloud is a hosted service, we are responsible for
managing system capacity. For this reason, we may occasionally choose to alter the
route of your email within our service. To enable us to do this seamlessly without
requiring you to make further changes, you must allow SMTP connections from all
the IP ranges listed under Service IP Addresses on this page. To access the Security
Portal, ensure that ports 80 and 443 are also permitted for these IP ranges.
Aliases
Related topics:
● Adding or modifying an alias
● Downloading and uploading aliases
Forcepoint Email Security Cloud can rewrite email addresses as email enters and
leaves your system. Aliases must be to and from domains associated with your
Forcepoint Email Security Cloud policies. Aliases let you rewrite email addresses
both inbound from the Internet and outbound to the Internet. When an alias has been
applied, email passes through the policy for the new address. Addresses in the SMTP
envelope and in those header fields defined in the standard Internet message format
(as defined in RFC 2822) are rewritten.
● An alias can apply both inbound and outbound. In this case, there is a one-to-one
mapping of an internal address to an external address and vice-versa. This is often
called masquerading an address.
● An outbound-only alias is also a one-to-one mapping.
● An inbound-only alias can be a one-to-one or a one-to-many mapping (a
distribution list). To specify a distribution list, separate email addresses with
commas.
● If an alias is neither inbound nor outbound, it is a disabled record.
To view the aliases that have been configured for your system, select Email >
Settings > Aliases.
To search for all aliases in the system, enter an asterisk in the Email address field,
check both the Inbound and Outbound check boxes, then click Search.
To narrow the list to specific entries, enter search criteria in the Email address field,
such as “*john*”. Wildcards are supported.
Related topics:
● Aliases
● Downloading and uploading aliases
Related topics:
● Aliases
● Adding or modifying an alias
You can download the complete alias list as a comma-separated values (CSV) file.
You can then edit this using a simple text editor or a spreadsheet application such as
Microsoft Excel. If you are intending to upload aliases, be very careful not to change
the format of the file. The first line of the file is a header line - it must always be
exactly:
Inbound,Outbound,External,Internal
Related topics:
● Adding an entry to a whitelist or blacklist
1. Select Email > Settings > Black & White Lists to see which email addresses
have been black- or whitelisted for your account.
2. Enter search criteria into the fields provided, then click Search.
Field Description
Address Enter a specific address for which to search, or use wildcards to expand
Pattern your search. Enter an asterisk (*) to search for all addresses that have been
black- or whitelisted.
Action Select the type of search you want to perform. You can search for Accept
actions (whitelist), Reject actions (blacklist), or both.
Minimum Indicate a policy threshold for your search. You can specify an interest in
policies addresses that are black or whitelisted in at least nn policies.
contained in
The resulting screen shows black- or whitelisted addresses that appear in the specified
number of policies for your account.
To manage blacklists and whitelists for your policies or end users, go to the Antispam
tab for the policy. See Adding an entry to a whitelist or blacklist, page 93 for more
information.
Related topics:
● Subscriptions tab
● Settings tab
● Text and Language tab
● Bulk Upload tab
● Requesting a message report
● Understanding the report
To configure the content of email message reports sent to end users, select Email >
Messages > Personal Email Subscriptions. The personal email subscription gives
end users a summary of the messages that they have received and sent.
You can choose to subscribe your end users to personal email message reports via the
portal. Users receive a single report in the format that you configure, and the report
contains a link that a user must click to receive the report on a weekly basis.
Otherwise, to receive a report, users must request it via a website. They can also
subscribe to the report for automatic delivery. For information on the contents of the
report and the request process, see End-User Self Service, page 147.
On the Personal Email Subscriptions page, there are 4 tabs:
● Subscriptions
● Settings
● Text and Language
● Bulk Upload
Subscriptions tab
Related topics:
● Personal Email Subscriptions
● Settings tab
● Bulk Upload tab
● Text and Language tab
In the Subscriptions tab, you can see a list of the recipients of a personal email
subscription, the email addresses or accounts covered in the subscription, and a
description of the subscription, if provided. Optionally, you can filter elements in the
list.
To create a new personal email subscription for an end user:
1. Click Add.
2. Under Subscription, enter an email address for the Recipient, and optionally,
enter a Description.
3. Under Manage Accounts, enter any other email aliases or accounts that you wish
to consolidate into this subscription.
Enter one email address at a time, clicking Add Address after each. If you choose
to consolidate multiple email addresses into one report, the recipient gets a report
containing details of all sent and received mail for all associated email addresses.
Note that any whitelist or blacklist entries associated with the email addresses are
not merged – i.e. if a sender has previously been whitelisted for one address, it is
not automatically whitelisted for other addresses in the same report subscription.
However, if the report recipient later chooses to whitelist or blacklist an address
by clicking the Whitelist or Blacklist buttons in the report, it will apply to all
email accounts or aliases associated with the report.
4. Under Report Options, define the following options:
■ Select the Email types to include in the report.
Note
Subscriptions to the Forcepoint Email Security Cloud message report lapse after 93
days. 62 days after subscribing, each time users receive a report, they are reminded
that they should renew their subscription. To see the expiration date for a
subscription, go to Reporting > Account Reports > Services. In the Show drop-
down list, choose Personal Email Subscriptions - Subscriptions. Click Generate
Report. The report includes the expiration date as well as recipient and subscriber
addresses.
■ Select the language and time zone you want reflected in the report.
5. Click OK. This becomes the default configuration for all future message reports.
You can change this configuration at any time.
To edit existing subscriptions, click on the pencil icon next to the recipient’s name.
The Edit Subscription box appears in which you can perform the same steps outlined
above.
Settings tab
Related topics:
● Personal Email Subscriptions
● Subscriptions tab
● Bulk Upload tab
● Text and Language tab
The Settings tab shows the default settings for your personal email subscription
reports, which are used when an end user first subscribes and if new subscriptions are
created via LDAP synchronization. In Settings, you can perform actions, such as
allowing end users to modify report content, and several other features described
below. Report options that you define when adding a new subscription override these
general settings.
Note
These settings are used as the default options for new subscriptions. Changing these
settings does not modify existing subscriptions.
Below is a summary of what you can do. Click Apply after you’ve made your
selections.
Fallback language
For Fallback language, specify the language to use when the end user’s browser uses a
language for which there are no translations available.
There are 14 languages available:
● Czech
● Dutch
● English (U.K.)
● English (U.S.)
● French
● German
● Greek
● Italian
● Polish
● Portuguese
● Portuguese (Brazilian)
● Romanian
● Slovak
● Spanish
● Swedish
Fallback timezone
Use the Fallback timezone drop-down to specify the default timezone used in the
report.
Report frequency
Select how often the message report should be delivered.
If you select daily or weekdays, you can also configure multiple reports to be sent
each day by choosing the hours when the report should be generated. Note that the
maximum frequency is every 3 hours, so if you click 6, for example, 7 and 8 are
disabled and the next hour you can select is 9.
Reporting period
Select the period over which the report will be run. This defines how many days’
worth of data is included in the report. Select a period between 1 day and 30 days.
Report content
Use the check boxes to indicate which of the 6 possible sections to include in the
message report:
Note
This option may not be available in your account. To enable the option, contact
Support.
If you are synchronizing your end users with the cloud service using the Directory
Synchronization Client, you can check the Subscribe users from future user
directory synchronizations box to subscribe new end users to the personal email
reports rather than asking them to subscribe themselves. After you have checked this
box, whenever there is an update of users in the directory and the update is
synchronized to Forcepoint Email Security Cloud, the new users are automatically
subscribed to the report.
Optionally, you can click Subscribe current users to subscribe all of your
synchronized end users currently in the cloud.
The subscribed end users get a report in the format defined on this page. The report
includes a link that, when clicked, subscribes the end user to the report on a weekly
basis.
Related topics:
● Personal Email Subscriptions
● Subscriptions tab
● Settings tab
● Bulk Upload tab
When a report is requested or scheduled for delivery, Forcepoint Email Security Cloud
sends an email message that includes the personal email subscription report. To edit
the text that appears in the email message, select Email > Messages > Personal
Email Subscriptions, then go to the Text and Language tab.
Click Add to select a language for which you want to customize the text. Then follow
the steps described below.
On the resulting screen:
1. From the Language drop-down menu, select the language you wish to use.
2. To specify customized email subject lines:
■ Clear the Use the default value boxes.
■ Supply a subject line for normal circumstances, one that you would like to
appear when a user’s report subscription is about to expire, and one to appear
after it has expired.
3. Click Submit.
If you do not have any report content selected, an error results. Return to the
Personal Email Subscriptions page, click Edit, check some boxes under Report
content and try again. If the submission is accepted, Edit Source buttons appear.
4. Click Edit Source to customize the message text that appears at the top or bottom
of the message. This allows you to edit the HTML source code for the message.
5. Type in the text editor’s entry field.
You can also include predefined keywords in the text (for example,
_TOTAL_RECEIVED_). When the report is generated, keywords are substituted
with data, such as the total number of messages received.
To view the keywords that are available for substitution, click View available
keyword substitutions. Click a keyword to paste it into the cursor position in the
active field.
6. Click Submit.
7. To view how the message looks to users, click View Report.
To put your customizations into effect, click Enable this customization, then click
Submit. If you do not click Enable this customization, the text set for the default
account is used. Click Edit to go back and edit the check boxes for email subject and
Enable this customization.
Choose another language to edit if desired and customize the message for that
language in the same way. Be sure to enable it before you submit it if you want it to
take effect.
New languages that you add appear on the Text and Language tab page with a check if
enabled. You can click on the link to the language, such as “en-us - English (US)” to
edit the email message text for that language.
Related topics:
● Personal Email Subscriptions
● Subscriptions tab
● Settings tab
● Text and Language tab
Email notifications
Related topics:
● Adding notifications
● Editing notifications
Notification messages can be sent when email is quarantined for any reason. Use the
Email > Policy Management > Notification Email screen to view, edit, and delete
notification messages.
Click Add Notification on the Notification Email screen to create a new notification
message, or click the name of an existing notification message to edit the message
contents and properties (See Adding notifications, page 56, or Editing notifications,
page 58, for more information.) On this page, you can also set the time zone to use for
dates that are included in notifications and park attachment annotations by clicking on
the link next to Time Zone.
You can set up separate notification messages for different types of policy breaches
and notifications to be sent to the intended recipient of an inbound email, the
postmaster, and to other addresses of your choice within policies. You can also notify
senders of outbound email but only if the outbound email is being sent from an
address within your organization, not from an external address. Note that you cannot
notify recipients of outbound messages.
Use the General and Content Filter policy tabs (navigate to Policy Management >
Policies and click a policy name) to configure when notification messages are sent
and which notification messages are used in each policy. (See General tab, page 68,
and Content Filter tab, page 103, for more information.)
Note
By default, Forcepoint Email Security Cloud does not send a notification when
email is quarantined as spam. A quarantine-notify disposition is available, but its use
is not recommended.
Adding notifications
Related topics:
● Email notifications
● Editing advanced encryption settings
Click Add Notification on the Notification Email screen to write and configure a
custom notification message from scratch, rather than using the default message.
Variables/tokens Description
_msgurl_ Generates a partial URL that gives access to the
message held in quarantine. Embed it using the
syntax ....
_NOTIFIED_RECIPIENTS_ Generates a string if the intended recipients have
been notified.
_RECIPIENTS_ The intended recipients of the message.
_DATE_ Displays the date Forcepoint Email Security Cloud
received the email that generated the notification.
The date is based on the time zone set on the
Notification Email screen.
_DISPOSITION_ What happened to the message causing the
notification. This usually takes the value
“quarantined.”
_NOTIFIED_ADMIN_ Generates a string if the specified postmaster has
been notified.
_MESSAGEID_ The ID as specified in the message headers.
_ENDIF_ End of a _IF_QUARANTINE_ or _IF_ENCRYPT_
block
_IF_ENCRYPT_ Place this at the beginning of a section that is relevant
only if the message has been encrypted. The section
must end with _ENDIF_.
_NOTIFIED_SENDER_ Generates a string if the originator has been notified.
_ADMIN_MAIL_ The postmaster address for the policy.
_DOMAIN_ The domain associated with the currently active
policy.
Variables/tokens Description
_IF_QUARANTINE_ Place this at the beginning of a section that is relevant
only if the message has been quarantined. The
section must end with _ENDIF_.
_SENDER_ The message originator.
_SUBJECT_ The subject of the message.
6. If you want to edit a separate plain text version of the notification message, select
Edit a separate plain text version.
7. If you want to send a separate version of this message to specific domains when
this notification is enabled, select Send variations of this message for specific
domains. The Add Domain Variation screen appears.
a. Select or enter the intended domain in the Domain field.
b. Specify a Subject line prefix (optional).
c. Enter the text for the notification in the message body field.
d. Click Save.
e. If you want to add additional variations for other domains, you can repeat
this process by selecting Add variation (the button will be disabled when
all domains have a variation assigned to them).
8. Click Save Changes when done.
Editing notifications
Related topics:
● Email notifications
● Adding notifications
Click the name of a notification message on the Notification Email page to edit the
contents of the notification, the character set used, and variations of the message for
specific domains.
For information about configuration options, see Adding notifications, page 56.
Related topics:
● Editing block and notification pages
Use the Email > Policy Management > Block & Notification Pages page to view
and edit block and notification pages.
When an email policy denies access to a resource or needs to inform the user of an
event, it can serve any configured notification page. There is a standard set of pages
included with your email product, and you can either modify these to suit your needs,
or add your own pages. You can then refer to the notification pages from any of your
policies.
Standard block and notification pages include:
Phishing (See Phishing, page 80)
Phishing Attack Blocked – This page provides information about phishing
emails, including a definition of phishing, a description of common tactics, and an
example of a phishing email message. You can either modify this to suit your
needs, or add your own page. The page is then used if a user clicks a link in an
email that is classified as part of a phishing attack.
URL Sandboxing (See URL Sandboxing tab, page 84)
Analysis Declined – This page displays when the user elects to not analyze a
suspicious link. (See Prompt for Analysis, below.) The default page title is
Analysis Declined.
Malicious Threat Detected – This page displays when a suspicious link is
determined to be malicious and is blocked. The default page title is Access
Denied.
Prompt for Analysis – This page displays when a user clicks on a suspicious link
in an email. This page notifies the user and gives the user the option to analyze the
link. (The other standard notification pages handle the possible outcomes.) The
default page title is Suspicious Link.
URL Verified – This page displays when an analyzed link is determined to be
safe. The default page title is URL Verified.
Uncategorized URL – This page displays when the link submitted for analysis
cannot be categorized. The default page title is Access Denied.
Unreachable URL – This page displays when a link cannot be reached. The
default page title is Unable to Analyze.
Unsupported Protocol – This page displays when the protocol is not supported
for analysis. The default page title is Unable to Analyze.
The pages are grouped for ease of navigation. Click a down arrow next to a group
name to see a list of all the pages within that group. To see all available pages, click
All.
Note
Pages that you create are listed under Custom.
To delete a custom page, click the delete icon next to the page name. The delete icon
is displayed only if the custom page is not used in any policies.
Default language
The default language for block and notification pages is English. You can change this
by selecting a different language from the Default language drop-down list.
If you select a different default language and then click Save, your changes are
immediately visible to end users. Ensure that you have saved pages in the new default
language; if a page is not available in the new default language, the English page is
displayed.
Default logo
By default, the logo displayed on the notification pages is the Forcepoint Email
Security Cloud company logo. To change the logo:
1. Click Edit. The Default Logo popup window is displayed.
2. Select Custom images, and enter the URL of the image you want.
The image must be a JPEG, GIF, or PNG file. Click Verify Image to confirm the
format and location of the image file.
3. Click OK. The new logo is displayed in the Settings area.
4. Click Save.
c. To use an image of your choosing, select Custom images and enter the URL
of the image you want.
The image must be a JPEG, GIF, or PNG file. Click Verify Image to confirm
the format and location of the image file.
d. Click OK.
7. To view and edit the HTML source, click HTML Editing. Any valid HTML may
be used within a notification page.
Note
If you edit a page in the HTML view and then click Basic Editing to return to the
basic editor, you will lose any changes made in the HTML view.
8. To see how the page appears to end users, click Preview. The page appears in a
separate window.
9. Click Save when done.
If you want to discard customizations made to a standard page, click Revert to
Default. This removes all changes that have been made to the page in your account,
and reverts the page to the original one supplied in Forcepoint Email Security Cloud.
Image whitelist
Select Email > Settings > Image White List to view and edit the list of images that
are not analyzed by Forcepoint Email Security Cloud.
Note
You must have the Forcepoint Email Security Image Analysis Module to use this
feature.
Add images to the whitelist if they are known to be clean – for example, you might
want to add acceptable images that have been quarantined to ensure they do not get
blocked in future.
Note
You can whitelist images directly from the Message Center. See Managing
quarantined images, page 146.
The image whitelist can contain a maximum of 200 images. Images are displayed in
the order they were added, with the most recent at the top.
To add an image on the Image White List page:
1. Click Browse, and navigate to the location of the image file on your network.
If you think that inbound or outbound messages are not being delivered, use the mail
testing options to check connectivity. The inbound mail test checks your MTAs and
performs testing for the domain you specify, optionally based on sender and recipient
addresses. The outbound mail test requires sender and recipient information to
perform checks on whether mail is being routed correctly.
● Inbound mail testing
● Outbound mail testing
● Viewing results
Viewing results
Feedback is displayed in a popup on screen while the tests are running, and results are
displayed on the page once available. Click Download Full Results to download
detailed results to a text file in a location of your choice.
You may see one or more of the following in your results:
Problem Resolution
SMTP Test Failure The cloud service could not connect to port 25 on your
connection. Confirm port 25 is open, and also check the
text file for traceroute results for that connection, to see
where the connectivity error occurs.
Server Security Error The cloud service could not connect to your domain
using the security settings specified in the connection.
This may be due to one of the following:
● the host name could be verified against the
certificate. Ensure the common name on the
certificate matches the MTA with which the cloud
service is communicating.
● The security settings are set to Encrypt or
Encrypt+CN and the certificate is not from a trusted
certificate authority (CA).
● The connection does not support the encryption
strength set in the policy (encryption algorithms
must support a 128 or 256 bit key).
TLS error The cloud service could not send a message to either
the connection or the mail recipient using TLS. If you
have enabled mandatory TLS, ensure all security
settings between the cloud service, your MTAs, and all
required third-party MTAs are configured correctly.
Outbound route connectivity The cloud service could not connect to the recipient
failure domain’s MTA. This may be because port 25 is not
open, or because the connection attempt timed out.
Related topics:
● URL Sandboxing tab
● URL sandboxing exceptions
With URL sandboxing, if users click on a link within an email and that link or
elements associated with that link are suspicious, they receive a warning that “The
link may not be safe.” To view details of a URL that has the URL sandboxing feature
applied to it:
1. Go to Email > Messages > Toolbox and select the URL Sandboxing Utility tab.
2. Enter a sandboxed URL, and then click Submit to show the original URL and its
recipient, security and policy settings. An administrator in the account that
sandboxed the URL sees:
An administrator in the account that did not sandbox the URL only sees:
● Sandboxed URL
● Original URL
● Block Policy Flags
● Recipient email address
Related topics:
● General tab
● Domains tab
● Connections tab
● Antivirus tab
● URL Sandboxing tab
● Antispam tab
● Antispoofing tab
● Content Filter tab
● Encryption tab
To configure an email policy, select Email > Policy Management > Policies, then
click the name of the policy to configure. If you have not previously configured a
policy, click the policy named DEFAULT. You can rename the default policy to
something more meaningful to your organization, especially if you plan to create
multiple policies.
Notice that each policy has multiple tabs to configure:
● General tab
● Domains tab
● Connections tab
● Antivirus tab
● URL Sandboxing tab
● Antispam tab
● Antispoofing tab
● Content Filter tab
● Encryption tab
Click the link to learn how to configure each one of these settings. Standard account-
level settings are shown in Standard Email Configuration.
Use the Policy Management > Notification Email screen to configure notification
messages sent when email is quarantined (see Email notifications, page 56 for more
information).
General tab
The General tab lets you perform general functions on your email account. There are
2 functional areas on this screen:
● General policy information
● Notifications and Annotations
To change a policy name or postmaster address for a policy, click Edit under the
general policy information.
To enable notifications or annotations for inbound mail, click Edit in the Inbound box.
To enable notifications or annotations for outbound mail, click Edit in the Outbound
box.
On the resulting screen, use the check boxes to indicate whether you want to notify
senders, recipients, or others, and whether you want to annotate messages. You can
only notify senders of outbound email if the outbound email is being sent from an
address within your organization, not from an external address. Note that you cannot
notify recipients of outbound messages.
Field Description
Policy Name Enter a name for the policy.
Postmaster Enter an email address for the postmaster. The postmaster address is
used as the address from which system notifications are sent. Your
users may occasionally reply to these notifications, so this should be an
email address that is monitored by your IT staff or administrative
contact.
Notifications
Notification messages can be sent when email is quarantined for any reason. Use the
Policy Management > Notification email screen to view, edit, and delete notification
messages. For more information, see Email notifications, page 56.
In a policy, you can set up different notifications to be sent for inbound and outbound
messages.
To define the notifications used in a policy:
1. On the General tab, click Edit under either Inbound or Outbound.
2. Specify who receives a notification message when an email is quarantined. You
can select the recipient (for inbound messages only), the sender (for outbound
messages only), the administrator, or others. If you select Others, enter the email
address(es), separated by commas.
3. For each option that you specify in step 2, select a notification message from the
drop-down list.
4. Click Submit.
Annotations
Related topics:
● Editing an annotation
● Report this email as spam
Annotations are added to messages as they pass through Forcepoint Email Security
Cloud. By default, they are set up for entire policies; however, you can also set up
more specific annotations.
Examples of annotations that you might add to inbound messages are, “Click here to
report this message as spam,” and “This message has been analyzed for malware by
Forcepoint Email Security Cloud.”
For inbound email, you can create annotations specific to each domain in your policy.
For outbound email, you can create annotations specific to an arbitrary list of sender
domains, sender email addresses, or groups.
If you have the Forcepoint Email Security Encryption Module, you can also add
specific annotations for decrypted messages. These annotations are created from the
Encryption tab; see Editing advanced encryption settings, page 135.
Editing an annotation
Related topics:
● Adding annotations
Because email can be sent as HTML or plain text, Forcepoint Email Security Cloud
maintains two versions of each annotation. To edit an annotation:
1. On the General tab of a policy, click one of the annotation links (taking care to
choose an Inbound or Outbound annotation).
Note
If you are adding an annotation for a decrypted message on the Encryption tab,
click Edit, then click the annotation link.
Note
If your HTML annotation contains a block of text, it is recommended that you split
up the lines with line breaks. Lines longer than 190 characters can cause unwanted
exclamation marks to appear in the annotation.
Make sure that annotations are enabled for this policy by checking the annotation box
on the policy page.
Important
If you choose to edit the default inbound annotation, you lose the Report this email
as spam feature. See Report this email as spam, page 70 for more information.
We strongly recommend that you apply the default inbound annotation “Click here to
report this email as spam.” For new policies, this annotation is enabled by default.
This gives users immediate feedback and helps us tune our spam filter for future
releases. Here is the feedback that users receive when they click this link:
To aid in the process of spam tuning, when you use the “Report as spam” annotation,
we recommend that you configure Forcepoint Email Security Cloud to keep a private
copy of clean email messages for a short period, separate from the quarantine area (see
Keep a copy of clean messages, page 88). If Forcepoint Email Security Cloud has the
original message available, our operations staff and automated systems can analyze
the message.
Adding annotations
If desired, you can write an annotation message from scratch rather than editing the
default. Just click Add on the Inbound or Outbound Annotations screen.
On the resulting screen:
1. Choose the domain or address list to annotate.
2. Choose the position of the screen on which to put the annotation: bottom or top.
3. Choose the default character set to use.
4. Enter text into the text editor as desired.
5. Click Submit when done.
Make sure that annotations are enabled for this policy by checking the annotation box
on the policy page. A check indicates enabled. An X indicates disabled.
Domains tab
Related topics:
● Adding domains
Select the Domains tab on the policy to view or change domains for the policy.
Each Forcepoint Email Security Cloud policy applies to a set of domains. Before a
domain is accepted by Forcepoint Email Security Cloud and processed according to
your policy, it must first be checked to ensure that we can deliver mail for the domain
to your mail server and that the domain does in fact belong to your company.
The Route Status column displays the result of the inbound route check. The
Ownership Status column shows the result of each domain’s ownership check. Status
can be Unchecked (awaiting validation or check failed; unavailable for use within
policy), or Checked (check passed; active within policy). To view more details of the
domain and its status, click the domain name link. If your domain has failed one or
both of its checks and the domain does belong to you, please contact Support.
When viewing a domain for a policy, click Show MX records to check the MX record
configuration for the domain.
Adding domains
To add domains to any policy (including the default policy), you must first set up a
valid inbound connection on the Connections tab, page 74 that will accept messages
for the domain you plan to add. A valid inbound connection is one that accepts
messages on port 25 for the domain. If it is behind the firewall, the firewall must allow
email traffic from the IP address ranges listed on the DNS records and service IP
addresses, page 46 page. The connection is checked as part of the validation.
To add a domain or sub-domains to the policy:
1. Click Add on the Domains tab.
2. Enter the domain name in the Domain field.
3. To apply the policy to all sub-domains in the current domain, select Include sub-
domains.
4. Click Submit.
At this stage Forcepoint Email Security Cloud checks for a valid inbound connection
for this domain and displays the result on the Add Domain screen. If it cannot find or
validate a connection, an error message appears.
Important
The inbound connection checking does not guarantee the correct delivery of email
messages. It is strongly recommended that you run your own testing on the inbound
connection that you have specified
The Add Domain screen also displays the following options for you to verify
ownership of the domain you have entered. The ownership check initially displays as
Failed, because it cannot succeed until you have done one of the following:
● Create a CNAME record in your DNS that aliases the character string shown on
the screen to autodomain.mailcontrol.com. For more information, see CNAME
records and A records, page 73.
● Create an A record for the character string shown on the screen, pointing to the IP
address of autodomain.mailcontrol.com. For more information, see CNAME
records and A records, page 73.
● Add your customer-specific DNS records into your MX records in your DNS. For
more information about adding and editing MX records, see MX records, page 74.
Once you have made one of the above changes, click Check Now.
Important
If you choose to use MX record verification, the service will accept email messages
for this domain as soon as the MX records are set up.
If you return to the list of domains on the Domains tab before the required record has
been added or successfully propagated, the details you entered appear in the domain
list with the status Unchecked. Once you have created the required records, click the
domain name to view the details, and then click Check Now again to retry the
validation.
Important
Do not configure domains until you are ready to verify ownership, because all
domains are marked Rejected after 7 days if ownership verification has not been
completed. You must then call Support to edit or re-enable the domain.
CNAME records
CNAME records are used to assign an alias to an existing hostname in DNS.
A CNAME record might look like this:
abcdefgh.mydomain.com CNAME autodomain.mailcontrol.com.
A records
An A record is the Address record which maps a domain or subdomain to a valid IP
address. In this case, it is matching a character string provided on the Add Domain
screen. The record indicates that the specified string can be reached at the given IP
address.
An A record might look like this:
abcdefgh.mydomain.com IN A 86.111.217.190
Where
● IN indicates Internet
● A indicates the Address record.
The above example indicates that the IP address for abcdefgh.mydomain.com is
86.111.217.190.
MX records
An MX record is an entry in a DNS database that defines the host willing to accept
mail for a given machine. Your MX records must route email through Forcepoint
Email Security Cloud to your Internet mail gateway.
Your DNS records, which end in in.mailcontrol.com, are available on the DNS
records and service IP addresses page.
Contact your DNS manager (usually your Internet service provider) and ask them to
set up or replace your current MX records for the domain you have added with the
customer-specific DNS records listed on the DNS records and service IP addresses
page (the ones that end in in.mailcontrol.com). For example, they might change:
Change From To
MX mydomain.com. IN MX 50 mydomain.com. IN MX 5 cust0000-
Preference 1 mail.mydomain.com. 1.in.mailcontrol.com.
MX mydomain.com. IN MX 51 mydomain.com. IN MX 5 cust0000-
Preference 2 mail.mydomain.com. 2.in.mailcontrol.com.
Make sure they include the trailing period, and ask them to set both of these records to
an equal preference value.
It can take up to 24 hours to propagate changes to your MX records across the
Internet. During this time, you should keep your previous mail routing active to ensure
all your mail is delivered: while your MX records are changing over, some mail will
be delivered using your old MX information, and some mail will be delivered using
your new MX information.
Connections tab
Select the Connections tab on the policy to view or change connections for the policy.
Your policy must have at least one default inbound connection and one outbound
connection in order to be active on the system.
The Inbound Mail Routing Rules section of the tab specifies rules that route inbound
mail from Forcepoint Email Security Cloud to particular email servers depending on
the recipients. The rules are applied in the order listed; you can change the order by
dragging the priority numbers up and down the list, then clicking Save Order.
To add a new inbound mail routing rule, click Add New Rule, then see Configuring
inbound mail routing rules, page 75.
You can check which of your mail routing rules, if any, applies to a particular email
address by clicking mail routing test utility. See Testing mail routing, page 77.
The Default Inbound Routes section defines where the service sends email that is not
matched by an inbound routing rule after processing messages received from the
Internet - these are the connections to your email servers.
The Outbound box specifies from which connections the service is prepared to accept
email for your domains (for onward delivery to the Internet).
Note that the service always attempts to deliver or receive email messages over a TLS
connection if the sending or receiving MTA supports it. If opportunistic TLS is not
available, the data transfer is made via plain text, rather than encrypted text. In either
case, the data transfer is successfully accomplished. If you wish to use mandatory
TLS, see Transport Layer Security, page 123.
Related topics:
● Testing mail routing
Click Add New Rule on the Connections tab to add an inbound routing rule that
applies to specified users, groups, domains, or content types. This enables you to route
mail to different mail hosts for certain groups of users in your network, useful if, for
example, your organization has multiple mail servers for different locations or
subsidiaries.
If a message is sent to a user who is in more than one group covered by your inbound
routing rules, the first rule in the list that matches the user will be applied. A message
sent to multiple users who have different routing rules will be split into multiple
copies and routed as configured for each individual user.
If you set up a content type rule, the rule is applied to messages that are encrypted with
PGP. You can apply that rule to all PGP-encrypted messages, or choose to apply it to
messages for specific users, groups, or domains.
Before it can be enabled for mail routing, a rule must be checked to ensure the
following:
● Forcepoint Email Security Cloud can connect to the specified inbound mail hosts.
● The mail hosts accept messages for all domains explicitly specified in the rule.
This is required for the rule to be valid.
● The mail hosts accept messages for the domains contained in all email addresses
explicitly specified in the rule. This is required for the rule to be valid.
● The mail hosts accept messages for at least one domain within the policy.
Note
If a group includes a domain that the mail hosts do not accept messages for, some
mail may not be delivered. We recommend that you check your groups for domains
not accepted by your mail hosts, and that you recheck your inbound mail routing
rules if you change or resynchronize your groups in the portal.
The mail host checking takes place as you configure the inbound rule.
1. Enter a Rule Name. This is required.
2. In the Apply To field, enter one or more recipients for the rule to apply to. These
can be individual email addresses, groups configured in Forcepoint Email
Security Cloud, or domain names. You can enter multiple recipients, separated by
commas.
This field is required unless you are creating a rule that routes by content type and
select PGP Encrypted only as described below.
To edit an existing recipient, click the item. Press Enter to save your changes as a
new entry in the Apply To list. To discard your changes, press Esc.
To remove an item from the Apply To list, click the Delete icon next to the item.
3. To apply the rule only to confidential messages encrypted with PGP, mark PGP
Encrypted only.
If you select this option, the Apply To field is no longer mandatory.
4. Optionally, select a Security value: Unenforced, Encrypt, Encrypt+CN, Verify, or
Verify+CN. See Encryption tab, page 122 for further information.
5. If you are enforcing security, select an Encryption Strength: 128 or 256.
6. Click Add Mail Host to add a receiving mail server to the rule.
You can add up to 10 mail hosts to a rule. If Forcepoint Email Security Cloud
cannot deliver inbound email to the first mail host in the list, it tries the other
servers in order until the message is delivered. To change the order of the mail
hosts, click an order number and drag it up or down the list.
7. Enter a Host Name (for example mail.mycompany.com) for the server. If the host
name cannot be resolved on the Internet, enter an IP Address for the server as
well. Click the button to confirm.
Forcepoint Email Security Cloud checks the mail host and sets the Status to
Passed or Failed.
If the route check failed, click Failed to open a popup window that displays details
of the failure. Filter the results of the check to view domains that are required or
optional for the rule, and those that passed or failed.
In this window, you can recheck all the domains in the rule, or just the domains
that failed. You can also choose to Ignore Failed domains, which changes the
mail host’s Status to Passed. Be aware that if you ignore failed domains, some
messages may be undelivered.
You can edit the server settings by clicking the pencil button.
8. To enable the rule for use, mark Enabled.
Note
At least one mail host in the list must pass the check for the rule to be saved as
enabled. If the check fails, you can still save the rule, but you must first clear the
Enabled check box.
If you make changes to the rule, for example changing the recipients it applies to or
editing the Security settings, each mail host must be rechecked. Click the Check all
mail hosts button to run the check again.
Related topics:
● Configuring inbound mail routing rules
The mail routing test utility enables you to check which inbound mail routing rules
apply to specific email addresses.
Enter one or more email addresses, separated by commas. If you have defined mail
routing rules that apply to PGP-encrypted messages, you can select Show rules for
PGP emails to these addresses to include those rules in your test. Then click Test
Addresses.
The Test Results section contains a line for each entered email address, displaying
which groups the address is a member of, and which inbound routing rule or rules, if
any, applies to the address. Click on a rule name to see and edit the rule details.
If you enter an IP address you are asked to give this connection a name. The name
you give your IP address connection is not important and can just be “inbound” or
whatever you feel is appropriate.
If you enter an invalid IP address such as one from the reserved, private range, an
error results.
3. Enter a Preference value to specify the order in which connections should be
used. (Connections with preference value 1 are used before all other connections.)
4. Optionally, choose a Security value: Unenforced, Encrypt, Encrypt+CN, Verify,
or Verify+CN. See Encryption tab, page 122 for further information.
5. If you have selected a Security value, select an Encryption Strength: 128 or 256.
6. Click Submit.
To add an outbound route:
1. On the Connections tab, click Add under Outbound Routes.
2. In the Server section, either:
■ Select Server name or IP address, and enter a fully qualified host name or an
IP address.
If you enter an IP address you are asked to give this connection a name. The
name you give your IP address connection is not important and can just be
“outbound” or whatever you feel is appropriate.
If you enter an invalid IP address such as one from the reserved, private range,
an error results.
Or:
■ If your organization is using Microsoft Office 365 for email, select Office
365.
Or:
■ If your organization is using Google Apps for email, select Google Apps.
Note
If you select Office 365 or Google Apps, you must configure the outbound mail
gateway in your Office 365 or Google Apps account to point to your customer-
specific DNS records. These are the records ending in “out.mailcontrol.com” on the
DNS records and service IP addresses page.
Note
If you have selected Office 365 or Google Apps in the Server section, you cannot
set encryption options as part of the connection. To enforce encryption on your
outbound route, configure your Office 365 or Google Apps account.
Note
If you have the Email Security Encryption Module, all outbound connection routes
must have a security value of Verify+CN. See Advanced encryption, page 132 for
further information.
4. If you have selected a Security value, select an Encryption Strength: 128 or 256.
5. Click Submit.
Disaster recovery
Forcepoint Email Security Cloud provides a number of features that can help in the
event of a major disaster or a failure of your Internet connectivity or email server.
Email queuing
If Forcepoint Email Security Cloud cannot deliver email to any of the specified
inbound connections, it queues all email for up to seven days and attempts to deliver
queued email to each route approximately every thirty minutes. The queue operates on
a first-in first-out basis, so the oldest email is delivered first when a connection
becomes available.
Connectivity test
For an inbound connection, click Test to carry out a connectivity test to its destination
from your Forcepoint Email Security Cloud clusters.
The connectivity test shows you the response Forcepoint Email Security Cloud
received from the email server, plus information about the time taken to reach that
destination. You can run this test from various clusters in order to troubleshoot local
connectivity issues.
Antivirus tab
Related topics:
● Editing inbound or outbound rules
Select the Antivirus tab on the policy to set up rules for antivirus protection.
Listed are the inbound and outbound antivirus rules that have been set for this policy.
To edit the inbound or outbound rules, click Edit in either the Inbound Rules or
Outbound Rules box.
Related topics:
● Antivirus exceptions
The majority of the antivirus functionality is the same for inbound and outbound
email. Field descriptions are provided below.
Virus
Check this box if you want viruses to be quarantined when detected. Viruses are
software programs capable of reproducing themselves and usually capable of causing
great harm to files or other programs on the computer.
Phishing
This option is applicable to inbound email only. Define whether suspected phishing
messages should be quarantined, or allowed with suspicious URLs replaced by a link
to a block page that you specify.
To set up block pages for phishing messages, see Configure block and notification
pages, page 58.
To bypass phishing checks for certain users, domains, or groups, click Phishing
Exceptions. See Antivirus exceptions, page 82.
Content
Filter active HTML content
This ThreatSeeker Intelligence feature automatically analyzes HTML inside messages
and disables any potential dangerous content (by disabling specific HTML tags). You
can define how strictly the system applies this security feature. Available settings are:
Setting Description
Low Disable embedded scripts (<SCRIPT> and <OBJECT> tags) and disable
unknown HTML tags that are deemed to be potentially dangerous.
Medium As Low but also disable “Web bugs” (URLs that are referred to inside a
message, excluding links to images) and HTML styles that contain code.
Setting Description
High As Low but disable all “Web bugs” and all HTML styles.
Very high Extremely strict: as High, but this also disables all hypertext links to
protect against a number of known vulnerabilities in common email
clients.
The recommended setting is Medium; setting the level higher than this may cause
messages to display too poorly for general users.
Block potentially malicious macros
This feature looks for potentially malicious macros in common Microsoft Office
document formats. By changing the sensitivity, you can control how suspicious
Forcepoint ThreatSeeker Intelligence is when it carries out its analysis. We
recommend setting this to High initially. You may need to amend this setting if you
find that a lot of documents just over the threshold are being quarantined. Documents
containing known viruses are quarantined by the antivirus engines, regardless of this
setting.
Strict checks on message structure
This feature runs a set of structural checks on email messages to determine whether
they conform to an accepted structure. For example, one of the attachment checks
would quarantine a MIME attachment with a filename that ends in a period but has no
file extension (such as “attachment1.”). Messages with a malformed message
structure can be a potential attack vector.
This option is disabled by default. We recommend leaving it disabled unless you are
running an old mail client that may be vulnerable to malformed email messages, or if
you are performing penetration testing on your messages. Enabling this feature may
result in false positives.
Encrypted Messages
An encrypted email message must be decrypted before it can be analyzed for viruses.
Since the cloud service does not have access to the necessary decryption key, it cannot
analyze an encrypted message. Similarly, the contents of a password-protected archive
file attachment such as ZIP or RAR cannot be analyzed, because the password is
unknown. To protect against the possibility of virus infection, Forcepoint Email
Security Cloud allows such messages to be quarantined. Administrators can open
quarantined messages later in a secure environment.
Select the Quarantine all messages containing encrypted archive files checkbox to
quarantine emails with password-protected archive files attached (such as ZIP or RAR
files).
Select the Quarantine all encrypted messages checkbox to quarantine encrypted
email messages (such as those using PGP or S/MIME encryption). This setting also
quarantines emails with password-protected PDF files or Microsoft Office files (such
as DOC or DOCX) attached.
Executables
To protect against the possibility of virus infection, Forcepoint Email Security Cloud
allows you to quarantine messages whose contents appear to contain scripts or
executables, or with attachments with potentially dangerous file extensions.
Administrators can view quarantined messages later in a secure environment.
Select Quarantine messages containing scripts and executables to quarantine
emails containing scripts and executable file attachments (such as EXE or BAT files).
Select Deliver all containing scripts and executables to allow email messages
containing scripts and executable files.
To allow executables for certain users, domains, or groups, click Executable
Exceptions. See Antivirus exceptions, page 82.
Warning
Forcepoint Email Security Cloud uses commercial antivirus (AV) engines to identify
known viruses, and its own ThreatSeeker Intelligence technology to identify viruses
for which AV vendors have not yet released a patch. However, even with multiple
layers of protection, it is impossible to predict the types of exploit that may become
available to malicious actors. We recommend that, where possible, email containing
executable attachments be quarantined. If this is not appropriate for all users, best
practice is to enforce this policy globally and use the Executable Exceptions option
for specific users.
Antivirus exceptions
Related topics:
● Antivirus tab
Exceptions are available for the following options on the Antivirus tab:
● Phishing Exceptions
● Executable Exceptions
Phishing Exceptions
Click Phishing Exceptions to override the phishing settings for named users, groups,
or domains. Click the appropriate policy in the Apply to column of the Phishing
Exceptions screen. You can then change the way phishing messages are handled for
specific users, groups, or domains. For example, you can allow URLs to be replaced
in messages for certain groups (such as marketing), and quarantine messages for other
groups.
To create an exception:
1. Click Add phishing exception.
2. Choose an email address, domain name, or group from the list. In most cases,
particularly if you are synchronizing LDAP directories, you will make exceptions
based on group names, such as Dev. If you are making a user exception, be sure to
enter the user’s email address, not LDAP user name.
3. Define whether suspected phishing messages should be quarantined, or allowed
with suspicious URLs replaced by a link to a block page that you specify.
4. Click Submit.
Executable Exceptions
Click Executable Exceptions to override the executable settings for named users,
groups, or domains.
Click the appropriate policy in the Apply to column of the Executable Exceptions
screen. You can then change the way executables are handled for specific users,
groups, or domains. For example, you can deselect “Quarantine messages containing
scripts and executables” for developers receiving internal mail.
To create an exception:
1. Click Add executable attachment exception.
2. Choose an email address, domain name, or group from the list. In most cases,
particularly if you are synchronizing LDAP directories, you will make exceptions
based on group names, such as Dev. If you are making a user exception, be sure to
enter the user’s email address, not LDAP user name.
3. Clear the Quarantine messages containing scripts and executables box.
4. Click Submit.
Related topics:
● URL sandboxing exceptions
● URL Sandboxing utility
● File sandboxing
Use the URL Sandboxing tab in a policy to inspect uncategorized URLs in email by
tagging them for additional real-time advanced security analysis. Doing so helps
protect end users from accessing malicious websites.
Note
If a website is uncategorized, URL sandboxing changes (“wraps”) the URL in the
email delivered to users. To add an exception for specific URLs to prevent them
from being sandboxed, add a sandboxing exception. See URL sandboxing
exceptions, page 86.
With URL sandboxing, if users click on a link within an email and that link or
elements associated with that link are suspicious, they receive a warning that “The
link may not be safe.” The notification includes:
● The domain they are trying to access.
● The reasons the link is considered suspicious: for example, the sender email
address may be unknown to our service or the sending mail server may have a
suspicious reputation.
● The option to analyze the page further.
If they answer No to Analyze the page?, the suspicious link is not analyzed. They can
then close the notification window. For their protection, they cannot access the page.
If they answer Yes, the page is analyzed using Forcepoint Email Security Cloud real-
time advanced security analysis. They then receive one of the following messages.
The notification messages can be customized. See Configure block and notification
pages.
Notification Description
The link appears No malicious threats found. The notification lists the URL and
to be safe category or categories of the page. Users can proceed to view the
page if they choose to do so.
Access denied Malicious threats detected in the page. The notification lists any
matched categories along with the sites suspected of being infected
with a malicious link. Users cannot access the page.
Notification Description
Access denied Users may also receive an Access denied notification if their
organization does not permit them to browse uncategorized web
pages.
Unable to access The web server may be down or the link may be incorrect. They may
page want to try again later, or contact their administrator for more
information.
Unable to analyze The page could not be analyzed because its protocol is not
URL supported. Supported protocols are HTTP, HTTPS and FTP. If you
have selected the Allow the recipient to follow links with an
unsupported protocol option, the user can proceed to view the page
if they wish; otherwise, the user cannot access the page.
Important
Websites that rely on cookies are not supported. When analyzed, URLs that resolve
to sites that rely on cookies may return an error or an incorrectly rendered page. See
the article Embedded URL sent for analysis fails with an error or incorrectly
rendered page in the Knowledge Base.
Administrators can retrieve the original URL in the Cloud Portal using the URL
Sandboxing Utility located in Email > Toolbox.
Any administrator or end user can check any URL for malicious content by going to
the online Advanced Classification Engine (ACE) CSI Insight page (https://
csi.forcepoint.com) and entering the URL.
If a user must access a link that gets an error (or is otherwise blocked by the URL
sandbox), the user should work with Technical Support to resolve the issue.
Forcepoint Email Security on-premises administrators need to contact Technical
Support with the sandboxed URL and request the original URL.
Note
The options to whitelist domains and analyze suspicious URLs in signed messages
apply to all users and groups in a policy, and cannot be over-ridden by exceptions.
8. Click Submit.
Related topics:
● URL Sandboxing tab
● URL Sandboxing utility
Antispam tab
Related topics:
● Antispam exceptions
● Commercial bulk email detection
● Adding an entry to a whitelist or blacklist
● Uploading a whitelist or blacklist
Select the Antispam tab on the policy to view or modify rules for spam protection,
and to configure settings to detect commercial bulk mail in inbound messages.
By design, email is checked for spam under the following conditions:
● Email is inbound from the Internet.
● The email message is not stopped by some other rule, for example it contains a
virus or a barred attachment type.
● The Antispam service is enabled for the policy (i.e., you are licensed for the
service).
All such email is assigned a spam score (unless it is blocked by system-wide rules that
identify bulk spam). This is visible in the message header and message tracking
results. The higher the spam score, the more likely it is to be spam. Many rules are
used to generate the spam score, including analysis of the words within the message,
where it came from, its headers, and comparisons with other spam and non-spam
email.
Spam Options
Check Filter for Spam if you want inbound email filtered for spam.
There must be at least one spam rule defined. By default two rules are set up:
1. Quarantine all email with a spam score greater than 6.
2. Discard any email with a spam score greater than 15.
You can define multiple rules for different spam thresholds and associate actions with
each of these. For example, you can create a rule that forces all email with a spam
score greater than 6.0 to be forwarded to an administrator, all email with a score
greater than 7.0 to be quarantined, and all email with a score over 10.0 to be discarded.
Lower values detect more spam at the risk of false positives - email wrongly detected
as spam. Higher values reduce the risk of false positives but could miss some spam.
Forcepoint Email Security Cloud aims to ensure that no false positives occur with
spam scores over 6.0. This is the recommended default setting for quarantining email.
To define spam rules:
1. From the first Spam scoring more than drop-down list, select a spam threshold.
2. From the second Spam scoring more than drop-down list, select an action for
that threshold.
Action Description
Quarantine-Notify Messages are quarantined as above and a notification is sent to an
email address. This is not recommended, because you are simply
replacing one email with another. It is included for those that wish
to use notifications during an evaluation phase rather than the more
widely used “tag” option.
Quarantine Messages are kept in quarantine for up to 30 days. This is the normal
setting used for messages identified as spam. Note that no
notifications are sent for this action.
Forward Messages are forwarded to one or more email addresses in a comma-
separated list. You can use this setting to forward all spam to a single
account for management purposes.
Tag subject Message subjects are tagged with a prefix that you’ve assigned (in
the Tag subject prefix box under Existing Rules).
Bounce Messages are bounced back to the sender.
Discard Messages are discarded. This is often used to discard messages with
a very high spam score.
Note
If you wish to run a report that shows the number of commercial bulk email
messages you have received, these messages will only be counted if you have
selected Analyze for commercial bulk email.
Notes
Whitelists always take priority over blacklists. If you add an address to both the
whitelist and the blacklist, messages from that sender address are allowed.
Whitelists and blacklists are processed in the following order. The first match found
is applied:
● Policy IP address whitelists
● Policy IP address blacklists
● Per-user email address/domain whitelists (see Antispam exceptions, page 91)
● Policy email address/domain whitelists
● Per-user email address/domain blacklists (see Antispam exceptions, page 91)
● Policy email address/domain blacklists
If Forcepoint Technical Support has enabled a custom antispam rule for your
account, this may override any whitelisted addresses you have configured.
If you enable whitelisting, you can also configure the following options:
● Apply whitelist matching even if the message has a spoofed email addresses.
If the service detects a message is spoofed, whitelisting is not applied by default.
However, you may wish to allow some messages that are legitimately spoofed, for
example a message from an email distribution list that appears to come from a
specific person. Select this option if you want to allow spoofed addresses through
even if the address appears in your whitelist.
● Do not apply whitelist matching on From: headers. An email message has two
addresses associated with it: the envelope sender, and the From: header. The
envelope sender is used by mail servers to check where the message originates
and where to respond (for example, if there is an error or the message bounces);
the From: header is what the message recipient sees. The envelope sender and the
From: header often match, but not always. There are a number of legitimate
reasons why an envelope sender might not match the From: header, for example if
the message comes from a mailing list, or from an organization that has
implemented a specific address for bounced messages.
Email spammers can take advantage of this, by changing the From: header on a
spam email to be a domain that you recognize, while the envelope sender is
related to a domain under their control.
By default, the service performs email address/domain whitelisting on both the
From: header and the envelope sender. If you select this option, whitelist matching
applies only to the envelope sender.
To populate your whitelists and blacklists, click the links in Whitelist these addresses
or Blacklist these addresses. See Adding an entry to a whitelist or blacklist, page 93
for more information.
Use Forward messages with more than [N] recipients from specified domains to
forward messages with more than the specified number of recipients from the
specified domains.
When this rule is triggered, the intended recipients do not receive the message.
Example: To forward messages from example.com sent to more than 5 recipients,
enable the option, specify 5 for the number of recipients, specify a forwarding address,
and specify example.com for the domain. You can specify additional domains, if
desired.
Note
The Forward messages option is a limited-availability feature, and may not be
available in your account.
You can enable or disable the ability for users to populate and manage their own
individual blacklist and whitelist, and the option to release a copy of quarantined spam
to themselves. These settings can be set for the policy, and can also be set for
individual users, groups, or domains, using Antispam Exceptions. See Antispam
exceptions, page 91.
Note
A user can never prevent an email containing a virus from being quarantined and,
regardless of these settings, can never release one.
Whitelists always take priority over blacklists. If you have blacklisted an email
address for the policy, a user can whitelist it and, assuming it has no other issues, such
as containing a virus or contravening a Content rule, it is delivered. To prevent a user
receiving certain types of email, we recommend that you configure a content filtering
policy. See Content Filter tab, page 103).
Antispam exceptions
Related topics:
● Antispam tab
● Adding an entry to a whitelist or blacklist
● Uploading whitelist and blacklist exceptions in bulk
It is possible to tailor some antispam settings in the Forcepoint Email Security Cloud
service for individual users, groups, or domains. Antispam exceptions can control the
following settings:
● Spam Options and Commercial Bulk Email Detection: define per user, group, or
domain rules for spam and commercial message filtering
● White & Blacklists: enable or disable per-user, group, or domain whitelists and
blacklists
● End-Users settings: control user permissions for populating whitelist and
blacklists, and releasing quarantined messages.
To add an antispam exception:
1. Click Antispam Exceptions.
2. Click Add.
3. Enter end-user email addresses, domains, or select the user groups to which the
exception applies.
Tip
If you are making a user exception, be sure to enter the user's email address, not
LDAP user name.
Note
Policy-wide whitelists and blacklists, if enabled, are always applied. Updates to the
whitelists and blacklists in the main policy are automatically applied.
4. Click Save.
Synchronization settings for spam options and end-user settings can be modified in
bulk for all exceptions using the Modify All button on the Antispam Exceptions
page.
Whitelist and blacklists can be imported for your account via CSV files, using the
Bulk Operations options on the Antispam Exceptions page. See Uploading whitelist
and blacklist exceptions in bulk, page 94 for more information.
The fields can be quoted or not. If a field contains a comma, it must be quoted. If 1
field is quoted, the rest of the line must be quoted. If a field contains a quotation mark,
this character must be surrounded by additional quotation marks. If a line contains
only 1 field, it is interpreted as the email address and the description is omitted. If a
line contains more than 2 fields, the file is rejected and an error message is displayed.
For example:
Address, Description
“[email protected]”, “Description of address1, containing
comma”
[email protected], Description of address1 without comma
“[email protected]”, “Description of address1, containing
““quotes””
“domain2.com”, “Description of domain2”
Action Description
Append to current list Elements imported from the file are added to the existing
elements. The resulting list is a union of all elements.
If any of the entries in the file is already included in the list,
it is not added again and a warning message is displayed.
This does not stop the processing of the file.
Replace current list Elements already existing in the list are deleted and
replaced by the elements in the file. You are asked to
confirm this action.
4. Click Upload. Note that large files take a while to transfer to the server. If the file
is empty, too large, or cannot be opened, an error results. An error also results if
any of the elements are invalid.
You can also download the current addresses into a CSV file for viewing in a
spreadsheet, or you can delete entries from the whitelist or blacklist by checking the
box next to the address and clicking Delete.
● An email address, domain name, or group that the whitelist or blacklist address
applies to (no wildcards permitted).
● An email address or domain name (wildcards permitted).
● An optional description (free text, up to 255 characters).
The fields can be quoted or not. If a field contains a comma, it must be quoted. If 1
field is quoted, the rest of the line must be quoted. If a field contains a quotation mark,
this character must be surrounded by additional quotation marks. If a line contains
more than 3 fields, the file is rejected and an error message is displayed.
For example:
Apply To, Address, Description
“UK Sales”, “[email protected]”, “Description of
address1, containing comma”
[email protected], [email protected], Description of
address1 without comma
“example.com”, “domain2.com”, “Description of domain2”
“Marketing”, “[email protected]”, “description of
address2”, “this field is not processed”
Action Description
Append to current list Elements imported from the file are added to the existing
elements. The resulting list is a union of all elements.
Replace current list Elements already existing in the list are deleted and
replaced by the elements in the file. You are asked to
confirm this action.
4. Click Upload. Note that large files take a while to transfer to the server. If the file
is empty, too large, or cannot be opened, an error results. An error also results if
any of the elements are invalid.
You can also download the current blacklist and whitelist into a CSV file for viewing
and editing in a spreadsheet.
Note that if no exceptions are created, the default spam policy will apply.
Antispoofing tab
Related topics:
● Spoofed Message Detection
● Internal Executive Spoofing
● DKIM Signing
● Antispoofing Checks
Use the Antispoofing tab to configure inbound and outbound spoofing protection for
the policy.
Inbound spoofing controls are used to detect when incoming messages are from
forged sender addresses, or when fake messages appear to come from named
executives in your organization (known as spear phishing). For inbound antispoofing
controls, see:
● Spoofed Message Detection, page 96
● Internal Executive Spoofing, page 99
Outbound spoofing controls help you to provide better protection for message
recipients against messages that forge your domains, by adding a DKIM signature to
validate your outbound messages, and applying strict outbound message authenticity
checks. For outbound antispoofing controls, see:
● DKIM Signing, page 100
● Antispoofing Checks, page 102
Tip
The envelope sender address is used by mail servers to check where the message
originates and where to respond (for example, if there is an error or the message
bounces) and often matches the From: address, but not always. For example, the
message might come from a mailing list, or from an organization authenticated to
send messages on your company’s behalf.
From the drop-down menu, select the action to perform when spoofed internal
messages are detected:
● Quarantine. This is the default option. Spoofed messages are kept in quarantine
for up to 30 days.
● Discard. Spoofed messages are discarded.
● Tag subject with. The subject line of detected spoofed messages are tagged with
“SPOOFED:” or a custom tag that you enter.
Messages detected as spoofing internal domains will be logged as “Spoofed”.
By default, if authentication checks fail to complete, the message is considered
spoofed and the selected action is applied. To specify an alternative action when
authentication checks fail to complete, select Apply alternative action when spoofed
message checks fail to complete. Available options depend upon the action selected
for spoofed messages:
● When the Action is Quarantine or Tag Subject, the alternative option is Tag
Subject.
● When the Action is Discard, the alternative options are Quarantine and Tag
Subject.
Select Allow spoofing from these sources to apply a whitelist of allowed domains or
IP addresses. Messages originating from these domains or IP addresses are allowed to
spoof addresses from domains in this policy. This may be useful if, for example, you
use a third-party provider who is allowed to send email messages to your users that
appear to come from an internal address.
To add whitelisted spoofing sources for a policy:
1. Select Allow spoofing from these sources, and click the these sources link.
2. In the panel that appears:
■ Select the Domains tab to add allowed sender domain names, for example
“forcepoint.com”.
■ Select the IP Addresses tab to add allowed sender IP addresses, either as a list
of individual addresses, or address blocks in CIDR notation (for example,
10.10.10.8/30). List entries are separated by a line break.
3. Click Add to enter a new domain or list of IP addresses. You can add multiple
domains or addresses, and you can add a combination of domain names and/or IP
addresses if required.
4. For IP addresses or ranges, enter a short description/name to identify the IP
addresses.
5. When you are finished, click Save.
Tip
Where executives may use various spellings of a first name (for example Elizabeth/
Liz, David/Dave), add multiple name entries for the user. Each entry should include
a duplicate set of allowed email addresses for the user.
DKIM Signing
DomainKeys Identified Mail (DKIM) is an authentication method designed to protect
recipients from spoofed messages. DKIM authenticates the message sender address
and message body to provide validation that the sender has not been forged and that
the message has not been altered.
When DKIM signing is enabled, the cloud service signs outgoing messages from
specified sender domains/subdomains with a private key, adding a DKIM-Signature
header. Recipient servers can use the information in this header to perform a DNS
lookup. The DNS response provides the Forcepoint public key, which can be used to
decrypt the signed header and authenticate the message.
A DKIM signing rule defines which of your sender domains/subdomains to protect
with a specified signing domain. Granular sender/recipient options can be applied, to
include or exclude specific sender addresses, or sender/recipient combinations.
Note: a single signing domain can be used by multiple rules to validate different
sender subdomains. A sender domain/subdomain can only be signed by one signing
domain, and consequently can only be added to one rule.
Important
Before enabling a signing rule, you must publish DNS CNAME records for your
signing domain. CNAME records enable the DNS lookup to Forcepoint in order to
provide the public key to recipient mail servers. Details of the CNAME records you
must publish can be found on the DNS Records and Service IPs page. See DNS
records and service IP addresses, page 46 for more information.
CNAME record, see DNS records and service IP addresses, page 46.
Once you have published the CNAME record, click Recheck to perform the
check again.
To disable a rule, toggle the State switch to OFF, then click Save.
Antispoofing Checks
The strict outbound message authenticity check performs additional tests on outbound
messages processed by the policy. With the option enabled, the service checks that
outbound messages originate from an IP address in the policy, or have a valid DKIM
signature. Messages that fail the test are quarantined, providing additional protection
to prevent your domains being spoofed by a third party.
Select Enable strict outbound message authenticity checks to apply strict checks to
all outbound messages for the policy.
With this option enabled, outbound messages must either:
● Originate from an IP address defined as an Outbound Route on the Connections
tab of the policy, OR:
● Have a valid DKIM signature applied by your email provider. (Required for
customers that use a hosted service provider such as Microsoft Office 365 or
Google Apps.)
Messages that do not meet these criteria will be quarantined as “Spoofed”.
Note
Do not enable this option if your policy is used to process messages that legitimately
spoof your domains. For example:
● If your users are likely to send mail from the networks of other companies (for example,
consultancy firms whose employees visit other customer sites).
● If your organization uses mailshot companies who are authorized to send email on your
behalf.
Related topics:
● Editing content rules
Content filtering rules are typically different for inbound and outbound email, because
the email usage policy that you want to enforce more than likely specifies different
sets of rules for email entering the organization than it does for email leaving the
organization.
Select the Content Filter tab on the policy to view or modify rules for filtering
content.
The majority of the content filtering functionality is the same for inbound and
outbound email.
Section Field
Attachments ● Masking attachments
● Quarantining messages with specific file types
● Parking attachments
● Attachment exceptions
● Image analysis and quarantining
● Securing suspicious attachments
Message Size ● Message Size
Content Filtering ● Filtering using lexical rules
● Quarantining messages where analysis does not
complete
Attachments
The following actions are available for email attachments:
● Masking attachments
● Quarantining messages with specific file types
● Image analysis and quarantining
● Parking attachments
● Securing suspicious attachments
● Attachment exceptions
Masking attachments
Related topics:
● Inverting the quarantine action
● Image analysis and quarantining
● Attachment exceptions
● Parking attachments
● Message Size
● Filtering using lexical rules
Related topics:
● Masking attachments
● Attachment exceptions
● Parking attachments
● Image analysis and quarantining
● Creating custom file types
● Message Size
● Filtering using lexical rules
You can quarantine messages containing attachments matching file types that you
specify.
File types are grouped together into file formats. For example, if you select the Sound
format, this quarantines anything related to sound files, including RealAudio,
Windows Media Audio, MPEG Audio, and MIDI files.
You can expand a file format to select or remove specific file types from the
quarantine list. For example, you can select the Standard Graphics format to block all
standard image attachments, but then choose to clear the JPEG file type within that
format to allow JPEGs to be delivered.
If the available file types do not meet your requirements, you can set up custom file
types containing one or more file extensions and MIME types. For more information,
see Creating custom file types, page 109. The custom file types you create are
available for all policies, and appear as part of a default custom file format on the
same page as the supplied file formats.
Note
Options on the Antivirus tab are the most effective way to block unsafe executables.
For more information, see Executables, page 82.
To quarantine attachments:
1. On the Content Filter tab, click the link in Quarantine messages containing files
with these types.
The page displays the file formats and types currently being quarantined.
2. Click Edit.
3. Check the boxes for file formats you wish to quarantine.
4. To select particular file types within a file format, click the + icon to expand the
format.
If you have selected the file format, all of the subsidiary file types are also
selected. You can select or clear as many file type options as you wish. The
information next to each file format tells you how many are currently selected
from that format.
5. Click Submit.
Attachment exceptions
You can override some of the attachment settings for users, groups, or domains. To do
this:
1. Click Attachment Exceptions for either inbound outbound attachments.
2. Click Add Exception.
3. In the Domain or address list field, enter the address(es), domain(s), or select the
appropriate group(s) to which this configuration applies. In most cases,
particularly if you are synchronizing LDAP directories, you will make exceptions
based on group names, such as Dev. If you are making a user exception, be sure to
enter the user’s email address, not LDAP user name.
4. Make whatever changes you want to the policy for this user, group, or domain.
5. Click Submit.
To edit an existing attachment exception, click the appropriate policy in the Apply to
column of the Attachment Exceptions page.
Parking attachments
Related topics:
● Masking attachments
● Image analysis and quarantining
● Park attachments by file type
● Unknown attachment types
● Filtering using lexical rules
Use the Policy > Content Filter > Park Attachment Rules page to park large
message attachments on the Forcepoint Email Security Cloud system. The file is
removed from the message and stored. An annotation is added to the message
including the filename, its size, and a Web link from where the file can be retrieved
over a secure HTTP (HTTPS) connection. The wording of the annotations is
completely configurable.
To create a park attachment rule:
1. Click Add Rule.
2. Define whether the rule should be initially enabled or disabled.
3. Enter a Rule name.
4. Select an Attachment size and a Message size from the drop-down lists. For
example, you might choose to park any attachment with a size of 2MB or larger in
messages that are 3MB or larger in size.
You can also select Ignore for either of these options, for example if you want all
attachments larger than a certain size to be parked regardless of the message size.
5. Choose how long the parked message should be stored for. The default is 7 days.
6. Define whether the system should keep a copy of the original message.
7. Under Apply To, define who the rule affects. By default, the rule applies to all the
senders (for an outbound rule) or recipients (for an inbound rule) in the policy.
Alternatively you can apply the rule to only the senders or recipients that you
specify. Enter the domains, addresses, or groups to include, separated by commas.
8. To excludes certain sender and recipients from your rule, select Exclude these
senders and recipients, then list the domains, addresses, or groups to exclude,
separated by commas. For example, you can specify that a rule does not apply if
an email is from [email protected] or is sent to
[email protected]. You can enter up to 65,535 characters.
9. Under Annotations, you can edit the annotation that appears in the original
message sent to the recipient. A default annotation like the one below is included.
The attachment attach1-2100.txt (2.1 MB) was parked. It can be
retrieved from here.
In addition, you can include the following variables:
Variables/tokens Description
_RECIPIENTS_ The intended recipients of the message.
_DATE_ The date Forcepoint Email Security Cloud received
the email that generated the annotation. This date is
based on the time zone set on the Notification Email
screen.
_SENDER_ The message originator.
_SUBJECT_ The subject line of the message that is being
annotated.
_ATTACH_TYPE_ The file type of the attachment parked.
_NAME_ The name of the attachment parked.
_RETRIEVE_END_ Used in HTML annotations surrounding some text
that displays as a link. For example, “It can be
retrieved
from_RETRIEVE_START_here_RETRIEVE
END.”
_RETRIEVE_START_ Used in HTML annotations surrounding some text
that displays as a link. For example, “It can be
retrieved from
_RETRIEVE_START_here_RETRIEVE_END.”
Variables/tokens Description
_RETRIEVE_LINK_ Used to include a link to download the attachment.
For example, “It can be retrieved from
_RETRIEVE_LINK_.”
_SIZE_ The size of the attachment parked.
3. In the Extensions field, enter the file extensions to include in the custom type,
separated by commas. For example, to block particular types of image file, you
might enter JPG, GIF, PNG.
4. Enter any MIME types in the format content type/content subtype. For example,
video/mpeg or text/csv.
5. Enter a description for your custom file type. This description appears in the
Custom File Type list when you are selecting file types and formats for
attachment quarantine.
6. Click Submit.
Note
Securing suspicious attachments is a limited-availability feature, and may not be
available in your account.
Even when analysis does not find malicious content in an attachment, some attributes
of an attachment can make it suspicious. Such attributes include sender and domain
reputation, attachment file type, attachment size, the spam score of the message, and
other attributes.
When a suspicious attachment is identified, you can choose to place the attachment in
a password protected zip file that is delivered to the recipient along with a report that
includes the message details, a preview of the attachment content, and a link to
retrieve the password to the secured zip file. When the Retrieve Password link is
clicked, a separate email is sent to the recipient that includes the password. Note that
only an original recipient can receive the password. If a message with secured file
attachments is forwarded, recipients of the forwarded message must ask the original
recipient for the password.
If you choose to secure suspicious file attachments, it’s very important that you
prepare users to receive them and to take appropriate action. Users should know that:
1. The email security service analyzes email attachments for malicious content.
When found, the attachment is not delivered.
2. The email security service also looks for suspicious file attachments. An
attachment can be suspicious for several reasons including the reputation of the
sender or sending domain, attachment file type, attachment size, the spam score of
the message, and other attributes.
3. When a suspicious attachment is found:
■ The attachment is placed in a password protected zip file and delivered, along
with the original message, to the intended recipients.
■ A Secured Attachment Report is also attached to the original message. The
report includes the message details, a preview of the attachment content, and
support for retrieving the password for the secured zip file.
4. Recipients should carefully examine the Secured Attachment Report to help
determine if the attachment is safe.
5. Opening a suspicious attachment could lead to the computer being compromised
or infected. Recipients should open the attachment only if they’re sure that it’s
safe. If in doubt, contact the IT team for assistance.
6. If a user receives a forwarded copy of a message with the secured zip file, they
need to ask to original recipient for the password. Only the original recipients can
retrieve the password.
To secure suspicious attachments:
1. In the Inbound Content Filter section of the Content Filter tab, select Secure
suspicious attachments.
2. Click Customize settings to:
a. Review and customize the message that is inserted into the original message
(annotates the message).
b. Add or remove sender addresses or domains to exclude from the secure
attachment rule.
c. Click Save or Cancel to return to the Content Filter page.
3. Click Save to save your settings.
Message Size
Related topics:
● Masking attachments
● Attachment exceptions
● Parking attachments
● Filtering using lexical rules
There are 3 predefined actions available for application to 3 configurable message size
thresholds:
1. You can set a global limit above which email should be discarded. By default this
cannot exceed 50 MB. (This is applicable only to inbound email.)
Note
When an email is discarded because it exceeds the maximum allowable size,
Forcepoint Email Security Cloud does not issue a notification (see Email
notifications, page 56 for more details). A failed delivery code is returned to the
sending email server.
Related topics:
● Managing dictionaries
● Creating a lexical rule in advanced mode
● Creating a lexical rule in simple mode
● Creating a compliance rule
● Phrase score and lexical rule thresholds
The lexical rules feature provides a powerful content filtering capability to mitigate
the risks associated with email. A lexical rule compares words in a dictionary to those
in an email and performs an action when there is a match.
You can use this feature to analyze messages for profanity and other undesirable
content entering or leaving your organization. This might be profanity or
inappropriate words but could also include company confidential information, or
communications that could cause loss of business, or loss of reputation.
Note
We do not recommend using this feature to attempt to block spam, because
generating ad-hoc rules is both time-consuming and prone to the introduction of
false positives.
To set up lexical filtering rules, select the Content Filter tab of your policy, then click
the link under Inbound or Outbound content: Filter using these lexical rules.
From this screen you can do the following:
● To add new lexical rules, click one of the buttons under Add Lexical Rule.
● To edit an existing rule, click the rule you want to edit.
Related topics:
● Filtering using lexical rules
● Creating a lexical rule in simple mode
● Creating a lexical rule in advanced mode
Each word or phrase in a dictionary is assigned a score that is used to determine the
disposition in a lexical rule. Typically a higher score indicates a worse contravention
of the rule. For example, a higher score would be assigned to the most obscene words
in a list of profane words.
A lexical rule specifies a set of thresholds and actions on each. When a message is
compared to the phrases, it accumulates scores for each of the phrases on which it
matches. The scores for the phrases within each dictionary are totaled. The greatest
threshold that is breached causes an action to be taken on the message.
Related topics:
● Filtering using lexical rules
● Creating a lexical rule in advanced mode
The simple mode for entering lexical rules enables you to set up a single action to take
when a message matches a phrase from the list you specify. If you want to set up
lexical rules to match against system or custom dictionaries, or want to include
multiple actions depending on the number of phrases matched, see Creating a lexical
rule in advanced mode, page 115.
1. On the main Lexical Rules screen, click Add Simple Rule.
2. Enter a name for the rule and a description if desired.
3. In the Apply To field, enter the domain(s) or individual email address(es) or select
the group to which this rule applies. Note that these must be domains or email
addresses associated with your account: for an outbound rule, this would apply to
senders, and for an inbound rule it would apply to recipients. If you do not enter
any information in this field, the rule applies to everyone.
4. Select the Exclude certain senders/recipients checkbox to specify domains,
email addresses, or groups to exclude from the rule. The Excluded recipients and
Excluded senders fields appear.
In the exclude fields, enter any domains or individual email addresses, or select
the group to be excluded from this rule. If you do not enter any exclusion
information, nobody is excluded from the rule.
Note
For inbound and outbound lexical rules, you can create a list that excludes certain
senders and a list that excludes certain recipients. For example, you can specify that
a lexical rule does not apply if an email is from [email protected] or is sent
to [email protected]. In all exclusion lists, you can enter up to 65,535
characters, consisting of domains, addresses, or groups, separated by commas.
Important
If the service detects an email’s sender address is spoofed, lexical rule exclusions are
not applied.
5. In the Phrases field, enter one or more phrases for the rule to match against.
6. Select an Action from the drop-down list. The following actions are available:
■ Quarantine the message.
Optionally:
○ Elect to notify recipients, the postmaster, and/or others, with the selected
notification messages.
○ Elect to give end users, in their Personal Email Subscription report, the
option to view or release messages that trigger the rule.
■ Encrypt the message (optionally notify the sender and/or others). This option
is only available for outbound lexical rules, and if you have the Email
Security Encryption Module (see Advanced encryption, page 132).
■ Forward message to a specific address.
■ Tag the subject, deliver it, and send a blind carbon copy to another address.
■ Blind carbon copy the message to another address.
■ Tag the subject with a specified phrase and deliver the message.
■ Deliver the message without any tags and keep a copy for checking.
Note
There is a quota for the number of messages that can be retained with the Keep Copy
action. When you select Keep Copy or manage a lexical rule that uses Keep Copy,
the used and available quota is displayed. If you exceed this quota, messages
matching the Keep Copy criteria are logged in the Message Center, but you cannot
read the message contents. To free space, delete some messages in the Message
Center and then contact Support to have the lexical rule(s) using Keep Copy
checked and re-enabled.
7. Define whether the rule should match against the message headers, or the whole
message body and subject.
8. Click Submit.
Related topics:
● Filtering using lexical rules
● Creating a lexical rule in simple mode
● Managing dictionaries
● Advanced dictionary configuration
● Creating a compliance rule
● Phrase score and lexical rule thresholds
The advanced mode for entering lexical rules enables you to match against system or
custom dictionaries, and include multiple actions depending on the number of phrases
matched. (If you want to specify a single action to take when a message matches a
phrase from a list, see Creating a lexical rule in simple mode, page 113.)
From this page, you can access the Dictionaries page to create or edit your custom
dictionaries.
Note
You can also access the dictionaries page by navigating to Email > Settings >
Dictionaries. Dictionaries can include simple phrases, complex multi-word
searches, or regular expressions. For more information, see Managing dictionaries,
page 118.
5. In the Excluded recipients and Excluded senders fields, enter any domains or
individual email addresses, or select the group to be excluded from this rule. If
you do not enter any exclusion information, nobody is excluded from the rule.
Note
For inbound and outbound lexical rules, you can create a list that excludes certain
senders and one that excludes certain recipients. For example, you can specify that a
lexical rule does not apply if an email is from [email protected] or is sent to
[email protected]. In all exclusion lists, you can enter up to 65,535
characters consisting of domains, addresses, or groups, separated by commas.
6. Click Submit.
The rule details are displayed. You can click Edit to change any of the details
entered in the steps above, or to disable the rule.
7. Click Add... to tell Forcepoint Email Security Cloud what to do when a message
matches entries in the dictionary. The Lexical Rule Action screen appears.
8. Specify a threshold, an action, and any notification options related to the selected
action, then click Add to save your changes. The rule is triggered when the
combined value of all matched words in the message is greater than or equal to
this threshold.
There are 7 different actions that can be performed on the email. You can therefore
configure up to 7 different thresholds, each with a separate action:
● Quarantine message (optionally notify sender, recipients, and/or others with the
selected notification messages).
Note
Once an email message is quarantined, no further actions can be performed on that
message. Therefore, if you set a quarantine action at a certain threshold, any other
action set at a higher threshold will fail.
● Encrypt the message (optionally notify the sender and/or others). This option is
only available for outbound lexical rules, and if you have the Email Security
Encryption Module (see Advanced encryption, page 132).
● Forward message to a specific address.
● Tag the subject with a specified phrase and deliver the message.
● Blind carbon copy the message to another address.
● Tag the subject, deliver it, and send a blind carbon copy to another address.
● Deliver the message without any tags and keep a copy for checking.
Note
There is a quota for the number of messages that can be retained with the Keep Copy
action. When you select Keep Copy or manage a lexical rule that uses Keep Copy,
the used and available quota is displayed. If you exceed this quota, messages
matching the Keep Copy criteria are logged in the Message Center, but you cannot
read the message contents. To free space, delete some messages in the Message
Center and then contact Support to have the lexical rule(s) using Keep Copy
checked and re-enabled.
For quarantined messages, you can also define whether end users can view or release
any messages caught by this lexical rule from their personal email report.
In the example above, inbound email is checked against a dictionary of offensive
phrases to protect the intended recipient. Those that score 1.5 or above are
quarantined. Email that scores 5 or above is likely to have matched multiple words or
matched against words that have been allocated a higher score.
To help you choose an appropriate threshold for the actions you require, click Show
dictionary statistics to display a statistical analysis of the selected dictionary. On the
left side is a graphical representation of the distribution of scores in the dictionary. On
the right side are a few statistics that may help you to choose a threshold.
Note
There is a limit on the number of regular expressions you can include in lexical rules
for each policy. If your dictionaries include a large number of regular expressions, it
might restrict the ability of the service to process your email. A warning appears
when you are nearing this limit, and once you exceed the limit, you cannot save the
lexical rule.
Related topics:
● Filtering using lexical rules
● Phrase score and lexical rule thresholds
Related topics:
● Filtering using lexical rules
● Phrase score and lexical rule thresholds
If lexical rule processing does not complete for a message, you can specify that it is
quarantined immediately. This might occur if you have set up a large amount of
lexical rules and regular expressions.
If you choose to quarantine a message of this type, you can examine it in the Message
Center by searching for messages labeled Lexical Rule, with the sub-reason Analysis
Failure. For more information, see Message Center, page 137.
You can select different settings for inbound and outbound messages.
1. On the Content Filter tab, click Edit under either Inbound or Outbound.
2. Check the Quarantine message if content analysis does not complete box. If
the box is not checked, any messages with incomplete lexical rule analysis are
allowed through for further processing.
3. Click Submit.
Managing dictionaries
Related topics:
● Excluding phrases from a dictionary
● Advanced dictionary configuration
● Phrase score and lexical rule thresholds
● Importing language packs
● Creating a lexical rule in advanced mode
Dictionaries are used to define phrases that are used in lexical rules, used for inbound
and outbound email content filtering. (See Content Filter tab, page 103).
Forcepoint Email Security Cloud defines two types of dictionary: those that are
predefined and your custom dictionaries. The former are maintained by Forcepoint
and include common profanities; dictionaries relating to categories such as finance,
gambling, and shopping; and compliance rules for payment card information and
Social Security numbers. You can exclude phrases from these lists (see Excluding
phrases from a dictionary, page 121) but you cannot include additional words or
phrases; if you need to add phrases, system dictionaries can be embedded inside your
own dictionaries.
Once defined, a phrase is available for use with both inbound and outbound lexical
rules across all policies.
You can add 3 types of phrase to a custom dictionary:
● A simple string, for example “project rhine”.
● A complex multi-word search. This option searches on different variations of the
phrase you define; for example if you enter “confidential email”, a lexical rule
might match the exact phrase or any instances of the words “confidential” and
“email” appearing close to each other in a message. See Advanced dictionary
configuration, page 121 for more examples.
● A regular expression. See Including regular expressions, page 120.
Assign each phrase that you add a score. This is used to determine the disposition in a
lexical rule: typically a higher score indicates a worse contravention of the rule. When
the rule is used analyze a message, the scores of all matching phrases are summed and
the total is measured against the lexical rule threshold value.
Phrases can have positive values (meaning they increase the likelihood of the rule
being triggered), negative values (meaning they decrease this likelihood), or a zero
value (meaning they have no effect on the total value).
You can also select the following options instead of a numerical score:
● Always trap this phrase – assigns a score of +20 to the phrase, making it likely
that a message will exceed your configured threshold.
● Always let through – assigns a score of -20 to the phrase, making it unlikely that
a message will exceed your configured threshold.
● Ignore this phrase – assigns a score of 0 to the phrase, meaning that the phrase
will not influence whether a message exceeds your configured threshold.
For instructions on how to configure lexical rules and threshold values for your
policies, see Creating a lexical rule in advanced mode, page 115.
To add a new dictionary:
1. On the Dictionaries screen, click Add Custom Dictionary. (To view the contents
of an existing dictionary or to edit a custom dictionary, click the dictionary name.)
2. Enter a name for the dictionary and a description if desired; then click Add. (If
you are editing an existing name or description, click Submit.)
3. To include an existing dictionary:
a. Click Attach dictionary.
b. Select an existing dictionary from the drop-down list, then click Submit.
Note
Regular expressions are not case-sensitive.
There is a limit on the number of regular expressions that can be included in lexical
rules for each policy. If your dictionaries include a large number of regular
expressions, it might restrict the ability of the service to process your email. Lexical
rules that include a large number of regular expressions cannot be saved.
For syntax and some examples, see Standard Regular Expression Strings, page 221.
1. Click Attach phrase.
2. Click Regex view.
3. Enter the regular expression in the Regex field.
4. Enter a description for the regular expression. This description appears in the
dictionary items list with “regex” next to it to signify that a regular expression was
defined.
5. Assign a score to the phrase, and indicate which parts of the message you want to
apply it to.
6. In the Test against field, enter some text that can test whether your regular
expression is well-formed and meets your requirements, then click Test regex.
7. When you are happy with the regular expression, click Submit.
Note
To return to the simple substring search or complex multi-word search options, click
Simple phrase view.
Related topics:
● Managing dictionaries
● Phrase score and lexical rule thresholds
There are a number of techniques you can use for more advanced content filtering:
● If a pair of words must appear close to each other in the message, separate them
with the NEAR keyword, for example, dear NEAR sir. By default, NEAR allows
up to 8 words between the two phrases. To control the number of words allowed
(the nearness), specify it inside square brackets after the NEAR keyword, for
example, dear NEAR[2] sir.
● If the phrase consists of a set of words, on which any one can be matched, you can
use the OR keyword. However, a better way of dealing with this situation is to
create a separate phrase for each word. For example, you can use bow OR bough
but, more simply, you can create two phrases, one for bow and one for bough.
Related topics:
● Managing dictionaries
● Advanced dictionary configuration
By default, you have access to the English language dictionaries. You can add other
language dictionaries if you wish. Dictionaries are provided for the following
languages:
● Dutch
● French
● German
● Italian
● Japanese
● Korean
● Portuguese
● Russian
● Spanish
● Traditional Chinese
● Simplified Chinese
To import an additional language pack or remove existing packs:
1. On the Dictionaries screen, click Manage Language Packs.
2. Select the language packs you want to use.
3. Click Save.
Note
You cannot remove a language pack that is being used by a lexical rule. You must
first remove all dictionaries in that language from your lexical rules.
Encryption tab
Related topics:
● Standard encryption
● Advanced encryption
● Editing advanced encryption settings
Related topics:
● Configuring TLS for a connection or route
● Configuring TLS on your connections
● Configuring third-party TLS connections
● Testing an outbound connection
● When TLS fails
TLS provides a transport layer encrypted “tunnel” between email servers or mail
transfer agents (MTAs).
By default, Forcepoint Email Security Cloud always attempts to deliver or receive
email using opportunistic TLS if the sending or receiving MTA supports it. With
opportunistic TLS, if a connection attempt is made using the TLS protocol, the
connection recipient must provide appropriate TLS credentials for an encrypted data
transfer. If the TLS “handshake” fails, the data transfer is made via plain text, rather
than encrypted text. In either case, the data transfer is successfully accomplished.
Alternatively, you can enforce TLS connections. There are 2 stages to configuring
mandatory TLS:
1. Add security settings to the connections between your mail transfer agent (MTA)
and the Forcepoint Email Security Cloud relays. See Configuring TLS on your
connections, page 124.
2. Add routes to the third-party MTAs with whom you want to communicate using
TLS and add security settings to these.
When the conditions within the TLS policy are not met, Forcepoint Email Security
Cloud does not deliver the email.
See this article for a full list of trusted certificate authorities supported by Forcepoint
Email Security Cloud.
Note
Forcepoint Email Security Cloud can enforce TLS only on the immediate next
SMTP hop. Situations may exist where Forcepoint Email Security Cloud does not
deliver directly to recipients (e.g., they may be using a service similar to Forcepoint
Email Security Cloud). In such situations, it is your responsibility to ensure that all
intermediate SMTP hops support TLS. If this is outside of your control, we
recommend you use the Forcepoint Email Security Cloud standard or advanced
encryption functionality to provide secure delivery.
Related topics:
● Configuring TLS on your connections
● Configuring third-party TLS connections
● Testing an outbound connection
● When TLS fails
Similar configuration is required for both the connections between Forcepoint Email
Security Cloud and your MTAs, and between Forcepoint Email Security Cloud and
the third party MTAs that you wish to communicate with using TLS. These settings
and the options are described below.
Each rule relates to a specific inbound or outbound connection and specifies whether
TLS is enforced, a certificate is required and should be verified, and the encryption
strength. If an attempt is made to deliver an email and the specified criteria are not
met, the email delivery fails and the sending MTA is notified.
Related topics:
● Configuring TLS for a connection or route
● Configuring third-party TLS connections
● Testing an outbound connection
● When TLS fails
The first stage of setting up a TLS policy is to configure the security settings on the
connections between the Forcepoint Email Security Cloud relays and your email
gateways. To do this:
1. Select the Connections tab.
2. Click the server name of the inbound or outbound email gateway that you want to
configure.
3. Click Edit.
4. Add security and encryption strength settings to the connections on which you
wish to enforce TLS. Typically these are the same inbound and outbound.
Note
Inbound TLS settings apply to all inbound connections. If you have multiple MTAs
receiving email from Forcepoint Email Security Cloud, all must be configured to use
TLS.
Related topics:
● Configuring TLS for a connection or route
● Configuring TLS on your connections
● Testing an outbound connection
● When TLS fails
You must add the connections to and from the businesses with whom you wish to
communicate using TLS. To do so:
1. Select the Encryption tab.
2. Click Add in the Secure Transport section.
3. In the Domain/Server field, enter the IP address or fully qualified domain name
of the business with whom you are establishing connection. For outbound
connections, enter the recipient’s domain. For inbound connections, enter a server
name or IP address. Do not specify a server that is part of your MX records.
Click Check SMTP Connectivity to confirm that you can connect to the domain
name or IP address.
4. Select a direction for the connection: Inbound or Outbound.
We recommend that you use Verify + CN, but you may opt to use Encrypt + CN if
you want to use a self-signed certificate rather than paying for use of one from a
CA. This may be acceptable for the connections between your MTA and
Forcepoint Email Security Cloud.
6. Select a encryption strength:
Encryption Description
Strength
128 An encryption algorithm that supports a 128 bit key must be
negotiated between Forcepoint Email Security Cloud and the
MTA with which it is communicating.
256 An encryption algorithm that supports a 256 bit key must be
negotiated between Forcepoint Email Security Cloud and the
MTA with which it is communicating.
Note
You must ensure that the MTA supports the policy configured for its connections
(certificate and encryption strength) and it must support an algorithm also supported
by Forcepoint Email Security Cloud.
The companies with whom you want to communicate using TLS must ensure that
their MTAs support one of the encryption algorithms supported by Forcepoint Email
Security Cloud and the encryption strength that you configure in the policy. They must
also be able to present a certificate appropriate to the policy that you configure.
Note
The third-party MTA must support the required configuration on the inbound and
outbound connections or email delivery fails.
Related topics:
● Configuring TLS for a connection or route
● Configuring TLS on your connections
● Configuring third-party TLS connections
● When TLS fails
You can test an outbound TLS connection, because Forcepoint Email Security Cloud
is responsible for initiating the connection.
1. Click a connection you have added to the Secure Transport section of the
Encryption tab, then click Check TLS status of server. This brings up a test
message using TLS. (Alternatively, click Check in the TLS Status column on the
Encryption tab.)
2. Modify the test parameters if desired: the email address, the encryption strength,
the security level.
3. From the drop-down list, select a service cluster from which to perform the test.
4. Click Send. The test results appear.
The response indicates whether or not Forcepoint Email Security Cloud was able to
deliver the email in accordance with the configured policy. Note that if the service
finds 2 MX records, it sends 3 messages. Check that all have arrived.
If the TLS check fails, check that the mail transfer agent (MTA) supports the settings
in the policy.
Related topics:
● Configuring TLS for a connection or route
● Configuring TLS on your connections
● Configuring third-party TLS connections
● Testing an outbound connection
Forcepoint Email Security Cloud does not deliver a message in the clear if the policy
dictates that it should use TLS. If TLS cannot be used when dictated by the policy,
Forcepoint Email Security Cloud rejects the message. The report that is returned to the
sender is dependent upon their email server.
Standard encryption
Related topics:
● Password specification
● Notifications
● Accessing email
● Combining standard encryption with content filtering rules
● Advanced encryption
Standard encryption comprises rules that, when matched, trigger the standard
functionality process. This process is as follows:
1. Sender sends email that triggers the rule.
2. The email is saved to the Encryption service quarantine store.
3. The recipient is sent an email notification containing an encrypted link that when
clicked allows access to the Encryption service quarantine store by HTTPS.
4. The sender is sent one or more notifications, depending on the number of
recipients. Each notification contains a password that is required by a recipient to
access the email. The sender needs to notify the recipient(s) of their password.
The criteria for the “parking” rules can include:
● Sender addresses
● Recipient addresses
● Messages marked as “sensitive” in the email headers
● Messages including a pre-defined prefix (trigger word) in the subject line.
To set up standard encryption, click Add in the Encryption section of the Encryption
tab.
1. Enter a name for the encryption rule, and select Standard Encryption as the
encryption type.
2. Define the password generation criteria (see Password specification, page 130).
3. Optionally, enter one or more senders or recipients for the rule to apply to. These
can be individual email addresses, groups configured in Forcepoint Email
Security Cloud, or domain names. You can enter multiple senders or recipients,
separated by commas.
To edit an existing sender or recipient, click the item. Press Enter to save your
changes as a new entry in the sender or recipient list. To discard your changes,
press Esc.
To remove an item from a sender or recipient list, click the Delete icon next to the
item.
4. If you are including subject criteria in the encryption rule, select whether the
message should match any of the criteria, or all of the criteria you select to trigger
the rule.
5. To include messages with a sensitivity setting in the email headers for encryption,
mark The message contains a sensitivity header, and select an option from the
drop-down list. If you want the rule to match against all sensitivity headers, select
Any.
6. To define a trigger word that appears at the beginning of the subject line for
messages to be encrypted, mark The subject starts with box, and enter the trigger
word.
Note
A trigger word is not case sensitive and MUST be followed by a space.
7. If required, edit the notifications sent to sender and recipient (see Notifications,
page 131).
8. Click Submit.
When an outbound email meets all of the specified criteria, the email is subjected to
the standard encryption process.
MIME details
You can choose to include (default) or exclude the MIME details when a parked,
standard encryption message is retrieved and delivered to the recipient (end user). The
setting you select applies to all policies.
To change the setting, in the Encryption section click the Standard encryption
preferences link, move the slider to the desired setting, and click Save.
Password specification
The password can be automatically generated by the system or specified in the subject
of the email.
Automatic password generation: This occurs if Allow sender to specify a
password is not checked.
If Allow sender to specify a password is checked, the user must include the
password in the subject line of the email. There are two options for inclusion:
1. If the rule specifies a trigger word, the password follows this in the subject line.
2. If the rule does not specify a trigger word, you must add a prefix that is used to
identify the password in the subject prefix field. Note this is different from the
trigger in that it is not a criterion for rule execution.
The password must consist of alphanumeric characters only. Both the prefix and
password must be followed by a space and the password must be enclosed in
parentheses ( ). Both are stripped from the email by Forcepoint Email Security Cloud.
For example, to trigger standard encryption with a specified password from a message
with the following subject:
Forcepoint Email Security Cloud test of standard encryption
Note
The subject prefix field is available only when the Where the subject begins with
box is not checked.
Notifications
When an email is “parked,” the sender and recipient(s) are notified by email. The
notification sent to the recipient(s) includes a link to the cloud service portal from
where the message can be retrieved. The notification(s) sent to the sender includes a
password that the sender must communicate to the recipient(s). The recipient(s) needs
this password in order to retrieve the message. To set up notifications, open the
standard encryption rule (click the name of the rule in the Encryption section of the
Encryption tab), then edit the Sender or Recipient text under Notifications.
Both sender and recipient notifications can be fully customized on a per-rule basis, in
both plain text and HTML format.
Accessing email
To access a parked message, the recipient clicks the link, accesses the cloud service
portal using HTTPS, and is prompted to enter a password.
Once recipients enter a password, a message is shown. They can access each part of
the message and download any attachments. The message itself can be downloaded
and viewed by an email client that supports a MIME type message/rfc822.
Advanced encryption
Related topics:
● Editing advanced encryption settings
If you have the Email Security Encryption Module, you can send messages that use
identity-based encryption, with no need for users to manually exchange passwords.
You can also customize the email notification that the recipient sees before decrypting
the message.
● Prerequisites for advanced encryption
● How advanced encryption works
● Adding an advanced encryption rule
● If you have outbound aliases, the aliases will be applied before the message is
encrypted. The resulting encrypted message will always show the external
address.
Note
A trigger word is not case sensitive and MUST be followed by a space.
■ Romanian
■ Slovak
■ Spanish
■ Swedish
7. Click Submit.
Related topics:
● Understanding your results
● Performing actions on the results
● Viewing message details
The Forcepoint Email Security Cloud Message Center is a powerful message tracking
and management tool that provides access to all quarantined messages and message
logs for your account.
To access the Message Center, select Email > Messages > Message Center. You are
presented with a search form.
The search form lets you search for messages based on several layers of search
criteria, such as the From, To, or Subject fields, the date sent, whether the message
contained spam or a virus, and much more. The check box controls allow a granular
search for clean email and/or those with an issue that caused Forcepoint Email
Security Cloud to perform an action.
Note
Enter as much detail as possible to minimize the data returned and so reduce the
time that the search takes. This is especially important for large accounts.
Search
Select the type of message for which you are looking. If you search for accepted
messages, only clean messages are returned; if you search for quarantined messages,
only quarantined messages are returned. You can also search for messages that have
had certain actions performed on them, for example messages that have been released,
forwarded, or deleted from quarantine. Information on deleted messages still appears
in the search results, even though they have been deleted from the quarantine itself
and cannot be viewed.
Note
To display deleted messages you must search for them specifically from the search
drop-down list, or check the Show deleted messages box.
Show
Once a message it is viewed by an end user or administrator, it is marked as reviewed.
If an end user has viewed a multi-recipient message, it is shown as partially reviewed.
If an administrator views a multi-recipient message, it is shown as reviewed for all
recipients.
Date sent
You must specify a date range to search. The more exact the date range, the faster a
search completes. The default drop-down list allows you to choose common ranges;
for more exact time ranges, click more and use the calendar picker.
Clicking more reveals the date range. From here you can specify exact dates and
times (by the hour) to search. Click the calendar icon to open the calendar picker.
Choose the date of interest by clicking the relevant date link. This closes the pop up
and populates the appropriate field with the date. You can select the To and From hour
from the drop-down lists. The default is to search all hours in the selected day.
From
The sender of the email; you can include a wildcard in the search by entering an
asterisk (*) character to denote multiple characters.
To
The recipient of the email; you can include a wildcard in the search by entering an
asterisk (*) character.
Subject
The email subject; you can include a wildcard in the search by entering an asterisk (*)
character.
Email direction
Select the direction to search: Inbound, Outbound, or Both.
When you select Outbound, the Delivery status drop-down appears if TLS reporting is
enabled for your account.
Delivery status
Select the delivery status for outbound messages. The default is to search for all
messages; you can filter on messages delivered with TLS, delivered without TLS,
pending delivery, or delivery failed.
This option only appears if TLS reporting is enabled for your account and you select
Outbound for the email direction.
Clean
Indicate whether you want uninfected, non-spam messages to be included in the
search results.
General
Access control Messages blocked by an access control policy. This applies only
to customers that have been asked to implement access controls by
Forcepoint Email Security Cloud operations.
Operational Messages blocked by controls set up by Forcepoint Email Security
Cloud operations in response to a virus outbreak.
Message loop Messages stopped automatically because they are part of a
message loop caused by auto-forwarding or auto-replying.
System Messages that could not be processed, for example, messages that
contravene email protocols.
Antivirus
Virus Messages that contain known viruses as identified by one of the
commercial antivirus engines used in the Forcepoint Email
Security Cloud service.
Macro Messages that contain highly suspicious Microsoft Office
document macros that operate outside the document, that you have
chosen to quarantine under your policy.
Blocked Messages that contain an executable file attachment that you have
executable chosen to quarantine under your policy.
Phishing Messages that are suspected to be phishing emails.
ThreatSeeker Intelligence
Format Messages that deliberately attempt to expose vulnerabilities in
email software with unusually formatted headers or body.
Dangerous Messages that contain potentially dangerous content.
content
Greylisted Messages that contain executable content that is temporarily
quarantined awaiting confirmation that it is safe for automatic
release.
Potential viruses Messages that contain potential viruses, identified by Forcepoint
ThreatSeeker Intelligence but not yet identified by one of the
commercial antivirus analyzers used within the Forcepoint Email
Security Cloud service.
Confirmed Messages that contain a virus, identified by Forcepoint
viruses ThreatSeeker Intelligence and subsequently confirmed by one
of the commercial antivirus analyzers.
File Sandboxing Messages that have been analyzed by the File Sandbox. You can
refine this further by selecting a File Sandboxing status from the
drop-down list: choose from All, Clean, Malicious attachment(s),
Malicious and pending further analysis, and Pending analysis.
Antispam
Spam Unsolicited bulk messages. You can select a maximum and
minimum spam score range to narrow this search further.
Blacklisted Messages that have been blacklisted by the default or per-user
policy.
Whitelisted Messages that have been whitelisted by the default or per-user
policy.
Bulk Outbound messages that have been classified as bulk messages.
Commercial Inbound messages that have been classified as commercial bulk
bulk email email by the default or per-user policy.
Content Filter
Too large Messages that exceed any size limits defined by the policy.
Extension Delivered messages that contain an attachment whose file
masked extension was masked as specified in the content filtering policy.
You can restrict searches to one or more specific extensions by
listing them in the associated field, separated by commas.
Blocked Messages that have been quarantined due to their file type being
attachment specified in the content filtering policy. You can restrict searches
to one or more specific extensions by listing them in the associated
field, separated by commas.
Lexical rule Messages that have contravened a lexical rule in the content
filtering policy. You can restrict searches to specific sub-
reasons—either messages caught by the lexical filter or messages
that have experienced analysis failure—by selecting the relevant
option from the drop-down list.
Blocked images Messages that contain an image attachment that has been analyzed
and is considered inappropriate. Messages with this status may
also have been quarantined because the image could not be
analyzed, for example because it was too large. This option only
appears if you are licensed for the Forcepoint Email Security
Image Analysis Module.
Copy kept Messages marked as available for delivery, but with a copy kept
for review by administrators. If you have exceeded your quota for
this type of message, the message delivery is logged, but you
cannot view the content. To free quota space, delete some
messages. Note that messages with this status may also have been
caught by the lexical filter and quarantined for other reasons.
Encryption
TLS Messages that policy dictates should be delivered using TLS
whose delivery failed because the sender attempted to send them
in the clear.
Ad hoc Messages that triggered a standard encryption policy rule.
Advanced Messages that triggered an advanced encryption policy rule. This
option only appears if you have enabled advanced encryption.
The query is hidden once a search has returned results. To show the query again, click
Show Query near the top left of the page. The search results are explained below:
Field Description
From The sender of the email.
To The recipient of the email. If there is more than one recipient, the number
of recipients is shown and, if you hover your mouse over the area, a popup
appears listing up to 10 recipients. Open the message to see all the
recipients.
Subject The subject of the email. If the subject is long, it is truncated by ellipses
(…). If you hover your cursor over the area, a pop-up appears. Click the
subject to view a detailed log for the message.
Date / Time The date and time of the email in your local time zone. If you hover your
cursor over the area, a pop-up shows you the time in UTC.
Spam Score The score assigned by Forcepoint Email Security Cloud.
Field Description
Issue The issues applicable to the email. If you hover your cursor over the area,
a pop-up gives more information on the issues.
Action The action(s) applied to the message. If you click the Action link for a
message, you can view other actions that may have been applied to the
message. Possible actions are listed below this table.
Possible Actions
● Accepted - The email was accepted and delivered.
● Quarantined - The email was quarantined for the reason described by the issue.
● Released - The email was quarantined, but a copy of the email has since been
released to the recipients.
● Release-pending - The email was quarantined and a copy of the email has been
requested to be released to the recipients.
● Release-failed - The email was quarantined and a release action was requested
but it has failed.
● Forwarded - The email was quarantined, but a copy has since been forward to a
specified email address.
● Forward-pending - The email was quarantined and a copy has been requested to
be forwarded to a specified email address.
● Forward-failed - The email was quarantined and a forward action was requested
but it has failed.
● Multiple - The email was quarantined and has had multiple actions performed on
it; to see a description of these actions, hover your mouse over the multiple text
and a pop-up appears. Multiple actions might include “released” and “forwarded”.
● Deleted - The email was quarantined and has now been deleted. It still appears in
the search results, but the message itself has been deleted from the system.
Clicking the message reveals the message log, rather than the message itself.
● Discarded - Forcepoint Email Security Cloud discarded the message but did not
report this to the sending email server which believes the message was delivered.
● Rejected - Forcepoint Email Security Cloud rejected the message and reported
this to the sending email server.
Note
CSV downloads are limited to 50,000 lines.
If you have permission, you may perform actions on the messages. The message
center allows you to review, release, forward, and delete one or more messages.
To select a message, select the checkbox next to the envelope icon for that message.
To select all messages on the page, click Select All in the header bar of the search
results. Messages on other pages of the result set are not affected.
Having selected a set of messages, you can select the required action from the action
bar drop-down list and click Go. When the operation is complete, the “Action”
column for the message is updated; and if the message was previously marked as “Not
Reviewed.” its status changes to “Reviewed.” If any errors occur during the action,
they are displayed at the top of the page.
You can also perform actions on a message from the message’s details page. For more
information, see Viewing message details.
The available actions are explained below.
Action Description
Release Releases a copy of the message to continue processing.
Release (no further Releases a copy of the message directly to the intended
processing) recipient, bypassing any further rules that you have set up
for your inbound or outbound mail. We recommend that
you review the message carefully before selecting this
action.
Forward To Forwards a copy of the message to the email address you
specify. Note that this sends the message for further
processing before delivery.
Forward (no further Forwards a copy of the message to the email address you
processing) specify, bypassing any further rules that you have set up
for your inbound or outbound mail.
Mark as Reviewed Indicates this message has been reviewed.
Mark as Not Reviewed Use this to indicate that you have not yet read this
message.
Delete Message Deletes the message from the message center.
Note
Actions can be performed only on messages that are in quarantine and have not been
marked as deleted.
Action limitations
You cannot request a new forward action on a specific message until the previous
forward action has completed. Similarly, you cannot request a release action for a
specific message until the previous release action has completed.
In order to check for successful completion of an action, you must perform a fresh
search.
This page explains why a quarantined message was blocked or if a message was
classified as commercial bulk email and includes the message headers, message text,
and details of any attachments. If the message has been analyzed by the File Sandbox
and found to be suspicious, the page includes a link to the File Sandbox report. From
this page you can perform the actions described in Performing actions on the results.
To download the quarantined message, click Download Message. (Administrators
must have the View Quarantine policy permission to download quarantined
messages.)
Important
Quarantined messages may contain malicious content. Exercise caution when
downloading and viewing message contents.
If you want to release or forward a message from this page, clicking Release or
Forward to sends the message for any further processing before delivery. If you want
to bypass any other processing rules that you have set up and deliver the message
directly to its recipient, check the No further processing box before releasing or
forwarding. We recommend that you review the message carefully before doing this.
For quarantined messages, you can also choose to whitelist or blacklist the sender’s
email address or domain. When you do this, the black- or whitelisted item becomes a
per-user antispam policy within the email policy that applies to the intended message
recipient. For more information, see Antispam exceptions, page 91.
Viewing logs
Click View log to see full details of the message processing and results. The log
appears at the bottom of the message details page.
For a quarantined message, the log details provide the exact reasons for the
quarantine. For example:
● For messages quarantined due to a virus, the log lists the virus name.
● For blocked attachments, the log includes the file type or class that matched
against the attachment.
● For blocked images, the log includes a thumbnail of the image. See Managing
quarantined images, page 146.
● For lexical rule failures, the log lists the phrase that triggered the quarantine.
● For spoofed messages, the log details the outcome of the spoofing detection
checks used to validate the message. The log entry may include the following
items:
■ DMARC: pass or fail, based on DKIM and SPF checks
■ DKIM: checks the digital signature of the sender’s domain
■ SPF: checks the SPF record for the envelope sender address
■ SPF_HELO: checks the SPF record for the SMTP HELO name
■ SPF_P2: checks the SPF record for the content sender (“from”) address.
If email is classified as commercial bulk email, the message details page may also
contain log lines indicating the action taken:
● Commercial bulk message subject tag added for <recipient>.
● Commercial bulk message quarantined for <recipient>.
● Commercial bulk message detected and allowed due to policy settings for
<recipient>.
Note
You cannot view logs for discarded messages.
Note
We recommend that you only add images to the whitelist that are likely to cause the
repeated quarantining of messages.
The image whitelist can contain a maximum of 200 images; if you have already
reached this limit, the Add to white list option is greyed out.
For more information on the image whitelist, see Image whitelist, page 62.
Related topics:
● Requesting a message report
● Understanding the report
● Accessing quarantined email
● Changing subscription details
● Consolidating email report data
Forcepoint Email Security Cloud allows end users to review personal lists of
suspicious and clean email based on criteria that the user chooses, see details about
each message, and decide whether to release a message, whitelist it, or blacklist it. The
service does this by providing a personal email report. As an administrator, you can
configure what the report contains, how it is sorted, and whether or not you want end
users to be able to customize certain aspects of the report. You also specify the default
language, time zone, and schedule for the report. This is all done by clicking Email >
Messages > Personal Email Subscriptions. (See Personal Email Subscriptions, page
49 for specifics.)
You can choose to subscribe your end users to the personal email report via the cloud
portal. In this case, users receive a single report in the format that you configure as
described above, and the report contains a link that a user must click to receive the
report on a weekly basis.
Otherwise, end users are not set up to receive the message report by default. To
receive a personal email report, users must request it from a cloud service website.
The Forcepoint Email Security Cloud End User’s Guide and the Forcepoint Email
Security Cloud End User’s Quick Start Guide provide instructions for your users.
Users can request a personal email report by going to the following website and
entering their email address.
www.websense.com/content/messagereport.aspx
The report is emailed to the email address entered. This normally takes no longer than
a few seconds depending on the amount of data included.
Section Contents
A The date range for which the report was processed
B Your email address. Note that if you have consolidated message report data from
multiple email accounts into one report, you will see all the email addresses
included in that subscription.
C The number of suspicious and clean messages that were processed for you
during the period
D An option to change the number of days shown in the report
E A link to receive this report by email on a regular basis
F The ability to select all quarantined and/or spam message and take actions on
them, such as delete or release
G A link to change your report subscription
H A link to manage your personal whitelist and blacklist
I A list of your email arranged in the following order (list depends on user and
account configuration):
● Suspicious messages you received or sent
● Clean messages you received or sent
If you area viewing the online version of your report, you can change the order
of the messages by clicking a column heading link. For example, you can sort
by the From or To column, the Date/Time column, or the Status column.
J An indication of whether a message has been received or sent.
K The actions you can take action on a message. (Select a message by clicking in
the check box on the left.) Options include:
● Details - Access details about the message
● Release - Release the message from quarantine. (Inbound messages only.
This is not possible for all messages, such as those containing known
viruses.) If the message to be released was originally sent to a distribution
list address that is included in a consolidated report, you are given the option
to release the message to the whole list or a specific email address.
● Whitelist - Send this message or domain to your personal whitelist. This
tells the cloud-based service to always allow messages from this sender or
domain.
● Blacklist - Send this message or domain to your personal blacklist. This
tells the cloud-based service to never allow messages from this sender or
domain.
If users want to view the content of a particular quarantined message, they select the
message (by clicking in the check box on the left), then click Details. They then have
options of what to do with the message.
The details of a message may look something like this:
In this example a message was quarantined because it exceeded the maximum size
specified in the policy. (The message is over 1 GB.) Note that the user can add the
sender or sending domain to the antispam whitelist or blacklist. These lists bypass
antispam processing; they do not bypass the policy’s message size restrictions. If the
antispam whitelist and blacklist options are not enabled on the policy, the buttons do
not display.
If, in the report, the user clicks a link to a message that was accepted, only the message
log entries are shown, because the message is no longer available to Forcepoint Email
Security Cloud.
If you have selected the Allow end users to modify report content option when
setting up your Personal Email Subscriptions, end users can configure the system to
send themselves message reports at any time interval. To define subscription details,
they click the link Change Subscription.
On the Change Subscription screen, users can specify the following subscription:
● Manage Accounts
■ Do they want to consolidate the report data for multiple aliases or email
accounts into one report? (See Consolidating email report data, page 153.)
● Report Options
■ What time period do they want reported: the last 1, 2, 7, 14, or 30 days?
■ How often should the report be delivered: daily, weekdays, weekly, biweekly,
or monthly?
■ How many rows do they want on each page in the report: 20, 50, 100, 200, or
500?
■ What sections do they want included in the report: quarantined suspicious
messages received or sent, non-quarantined suspicious messages received or
sent, clean messages received or sent?
■ In what order do they want the information about quarantined and non-
quarantined messages to appear: status, date/time, subject, from, or to?
Ascending or descending?
Note
Subscriptions to the message report lapse after 93 days. 62 days after subscribing,
each time users receive a report, they are reminded that they should renew their
subscription.
End users who are allowed to modify settings in their personal email report can
consolidate data from their other email accounts or aliases into one report. They can
also consolidate another person’s email addresses, such as an assistant consolidating a
manager’s addresses into one report. Reviewing and managing one report versus
several reports may help save time.
Note that if LDAP synchronization is enabled for the account, all aliases associated
with an end user will be automatically listed on the Change Subscription screen under
Manage subscription addresses. The end user can then add one or more of them into
one consolidated report.
End users who want to consolidate addresses can do the following:
● From the personal email report, click Change Subscription.
● Under Manage Accounts, check the box for the email address or addresses to be
added if a list is given, or enter the email address. The address must be from one
of the domains owned by your company. For example, company xyz might have
these domains: xyz.com, xyz.co.uk, or xyz.com.au.
● Click Add Address.
● To add a new email address, the end user must receive approval from the owner of
that address. Clicking Add Address sends an email request for approval to the
address owner. Until the owner approves the request, the email is marked
“pending approval by owner.” If the owner approves the request, the requestor is
notified by email and the “pending” status is removed. The owner may choose to
decline the request in which case the user may not add the email address to their
personal email report.
● To remove an address from the report, clear the check box next to the email
address that they want to remove. Clearing the box reveals a “Remove” link. End
users who click on this link are asked to confirm they want to remove the address.
Note that after they have created a consolidated personal email report, end users who
then order a message report, or are set up to automatically receive a report, receive the
consolidated report. If the end user wishes to receive reports from more than one
subscription (for example, an individual and a consolidated subscription), you, the
administrator, must create these subscriptions in the Security Portal portal.
Related topics:
● Email Report Center
● Legacy Email Reporting
● Service reports
● Account Reports
Email protection reporting provides many tools for profiling and investigating email
security and usage. On the toolbar, select Reporting to see all available reporting
options.
Reporting allows you to:
● Monitor service performance
● Monitor traffic volumes and patterns for capacity planning purposes
● Enforce your email acceptable use policy
● Isolate and resolve problems
Reporting tools include:
● The Email Dashboard charts provide threat, risk, usage, and system
information. For most charts, the time period, chart style, and set of results shown
can be customized. You can also select columns or sections on a chart to drill
down to the relevant report in the Report Builder.
● The Report Center menu–Report Catalog, Report Builder, Message Details, and
Scheduler–offers a set of predefined reports, the ability to create custom reports, a
method for digging into message details, and a facility for report scheduling.
● The Legacy Email Reports menu includes reports that were available before
Report Center was released, and remain available to support existing customers.
This section allows you to generate a set of standard reports, organized by
Address, Content, Inbound, Outbound, Virus, Volumes, and Spam. See Legacy
Email Reporting, page 165.
Related topics:
● Using the Report Catalog
● Using the Report Builder
● Viewing detailed reports
● Scheduling reports
● Email predefined reports
● Email report attributes
● Email report metrics
The Report Catalog contains a number of predefined reports that cover common
scenarios, available in bar chart, trend chart, and tabular formats. You can copy any
predefined report to apply your own filters to create a custom report, and share your
reports with other administrators. See Using the Report Catalog.
Use Report Builder to create multi-level, flexible reports that allow you to analyze
information from different perspectives and gain insight into your organization’s
email message trends. If a high-level summary shows areas of potential concern, you
can drill down to find more details. See Using the Report Builder.
Advanced reports
Security reports
Spam reports
TLS reports
The Legacy Email Reporting menu provides reports that were available before the
Report Center was released, and remain available to support existing customers. Use
this menu to generate a set of standard reports organized by Address, Content,
Inbound, Outbound, Virus, Volumes, and Spam. These reports can be generated using
a range of filters, and can be downloaded as PDF or XLS files.
To access legacy email reporting features, go to Reporting > Legacy Email Reports.
For more information on these reports, refer to Categorized reports, page 167. To see
what a specific email report contains, see Email report list, page 170.
All reports are generated in real time. Most include charts and tables that are presented
in an easy to read, printable format.
Note
For larger accounts, where a lot of data is to be retrieved, the reports may take some
time to generate. As soon as the relevant data has been retrieved it is displayed
while the remainder of the report is being compiled.
Commonly-used report criteria can be saved for easy access. For more information,
see Saving reports, page 168. Saved reports can be scheduled for regular delivery to
one or more recipients as described in Scheduling categorized reports, page 168.
Reporting periods
Reports can be generated for periods of hours to years. When accessing a report, you
can drill down from within the report to a shorter time period. For example, an email
volumes report for 7 days returns a table of volumes by day and a corresponding bar
chart. By clicking a link on the relevant day on the table or chart, the report drills
down and provides an hourly table and chart for that day. This allows not only the
creation of management reports, but also reactive tracking of day-to-day issues.
You can select the reporting period from the drop-down list or you can click more to
select absolute From and To dates and times. The available dates and times are
dependent on the type of report and the availability of the data.
Note
You can also download charts as image files or in PDF format. To download a chart,
right-click the chart and select the format to download (PDF, PNG, or JPEG).
Note
For some email reports, the totals in the CSV file might be higher than the totals in
the report on screen. This is because the generated reports contain 1 line per email
message, whereas the CSV version contains 1 line per recipient which means that a
single email message might appear several times.
Categorized reports
Related topics:
● Saving reports
● Scheduling categorized reports
● Email report list
Note
If your account is enabled for filtered reporting, you may only be able to view reports
that filter on certain policies. See Configuring permissions, page 12.
When you select a report, you are shown a list of the time periods for which the report
is available. Alternatively you can select a specific time period (from and to) for the
report by clicking more next to the period list.
To make selection from some criteria lists easier, you can expand the list to appear in a
larger window by repeatedly clicking on the Grow list link.
Once you have decided on the report and the appropriate criteria, click Generate
report. You may receive feedback at this point advising that the report might take
some time to generate. Typically this is due to the amount of data that must be
searched. You can often avoid this by adding more criteria to narrow the search. Click
Back if you want to cancel the report.
Report results
Most report results are displayed in chart and table format in the relevant screen. Note
that not all reports are available in both formats.
Drilling down
Many of the reports contain links to more detailed reports. For example, for time-
based reports, clicking the chart column or data table entry for a day generally
displays the hourly report for that day, using any filtering criteria that applied to the
original report.
Some reports allow you to drill down into the data in a more flexible way. If this is the
case, there is a drop-down list above the chart and data table listing the available
views. Select the view required from the list and then click the chart or table to display
the new report.
Saving reports
Related topics:
● Scheduling categorized reports
You can choose to save any categorized report. Use this option to identify the reports
you generate most frequently and want to be able to locate quickly.
To see the list of reports that you have saved, select Reporting > Account Reports >
Saved Reports.
To save a report:
1. Select the email report you want.
2. Use the Selection screen to enter your report criteria as described in Categorized
reports, page 167.
3. Click Save report.
4. Enter a name for the report, and click Save.
The Saved Reports list is displayed, and the report you entered is now listed.
As well as accessing the report from this screen, you now have the option to delete the
saved report or schedule it for regular delivery.
Related topics:
● Saving reports
You can run reports as they are needed, or you can define a schedule for running one
or more saved reports.
Reports generated by scheduled jobs are distributed to one or more recipients via
email. The reports can be in HTML, PDF, or CSV format. There is a limit on the
number of reports you can schedule for delivery: the Saved Reports list displays the
remaining number you can schedule in addition to any existing deliveries.
Note
You cannot schedule reports that have defined start and end dates, or that span
periods of less than 24 hours.
To schedule a report:
1. Select Reporting > Account Reports > Saved Reports.
2. You can schedule an existing saved report by clicking the report you want to
schedule on the Saved Reports list. If you do this, skip to step 5 below.
Otherwise, to create a new report for scheduling, click the Generate a new report
link. The page that appears includes only reports that are eligible for scheduling.
3. Create and save your report as described in Saving reports, page 168.
4. On the Saved Reports list, click the name of your new report.
5. Click Schedule email report.
6. Enter the email address of the report recipient. Multiple email addresses should be
separated by commas or spaces.
If you enter an address with a domain not registered to the account, a warning
appears when you save the schedule. Click OK on the warning to accept the
address.
7. Enter a subject for the report email, and the text you want to appear in the body of
the email.
8. Select the report format.
9. Set one of the following delivery periods for your reports:
■ daily
■ weekdays
■ weekly
■ every other week (biweekly)
■ monthly (the default option)
If you want to stop the a scheduled report temporarily, select suspend delivery.
10. Click Save.
You are returned to the Saved Reports list. Reports that have been scheduled display
the recipient list in the Email to column. Click an item in this column to open the
schedule, where you have the option to edit or delete the report delivery.
Note
You may not see all of the reports listed here, depending on the features enabled in
your account.
● Address reports
● Content reports
● Inbound reports
● Outbound reports
● Spam reports
● Virus reports
● Volume reports
Address reports
Content reports
Inbound reports
Outbound reports
Spam reports
Virus reports
Volume reports
Related topics:
● Using the Report Catalog
● Using the Report Builder
● Scheduling reports
● Email: Using Message Details
● Email report attributes
● Email report metrics
● Email predefined reports
● Legacy Email Reporting
● Service reports
● Account Reports
Web and email cloud protection solutions include many tools for reporting on service
activity and security events. For information specific to email reporting, see Email
Reporting Tools, page 155. The following sections describe the Report Center.
Report Center features include:
● Report Catalog offers predefined reports. You can copy a predefined report to
apply your own filters to create a custom report. See Using the Report Catalog,
page 182.
● Report Builder supports the definition and creation of custom reports. See Using
the Report Builder, page 188.
● Scheduler allows reports to be generated on a schedule that you define.
Optionally, reports are sent to recipients that you specify. See Scheduling reports,
page 193.
● The Transaction Viewer supports flexible, detailed display of web transactions
and requests. See Using the Transaction Viewer, page 220.
● The email Message Center supports flexible, detailed display of email
transactions. See Viewing detailed reports, page 156.
Related topics:
● Managing reports
● Managing folders
● Web predefined reports
● Email predefined reports
Use the Reporting > Report Center > Report Catalog page to access predefined
reports for common scenarios.
The Report Catalog includes the following elements:
● The Toolbar, at the top, contains buttons for returning to the previous page,
creating new reports and folders, copying, sharing, and deleting items. Hover the
mouse over a button to see a description of its function.
● The folder list, in the left-hand pane, contains the following top-level folders:
■ The Favorites folder enables you to easily locate your most frequently-used
reports. You can mark a report or report folder as a favorite in the following
ways:
○ Click the star to the left of the report or folder name in the Report Catalog.
The star turns yellow when selected.
○ Click the star to the right of the report name in the Report Builder or
Transaction View. You do not need to save your changes.
To remove a report from Favorites, click the star again to turn it gray.
When viewing the Favorites folder, note that you are essentially viewing a list
of shortcuts to the reports. Choose View in folder from a favorite report’s
drop-down menu to see the report in its original folder.
■ My Reports contains all of the reports and folders that you create.
■ Standard Reports contains the predefined reports provided in the cloud
service. If you have more than one service, separate subfolders contain the
predefined reports for each service.
For information about email protection predefined reports, see Email
predefined reports, page 162.
■ Shared by Others contains items that have been shared for use by all
administrators in your account. Each folder has the user name of another
administrator, and contains the reports shared by that administrator.
If a folder contains one or more subfolders, click the arrow to see those subfolders
in the left-hand page. Click a folder name to see its contents in the right-hand
pane.
● The table in the right-hand pane displays the contents of the folder you select in
the folder list. This can be one or more subfolders, or a list of reports. To see a
description of a particular report, hover the mouse over the report name.
From this pane, you can perform actions on one or more reports and folders, such
as copying, renaming, and deleting folders, or editing, running, or sharing a
report. The actions available to you depend on the permissions configured. For
example, you cannot delete reports in the Standard Reports folder. See Managing
reports, page 183, and Managing folders, page 186.
● The Search field, in the top right corner, enables you to search for specific words
or phrases in report titles. Search results list the report name, its location, and if
applicable, the report owner and the last time it was edited. You can manage a
report directly from the search results list. For example you can run it, or if you
have suitable permissions, share or delete it.
Managing reports
The Report Catalog offers the options to run, edit, share, copy, schedule, and delete
reports. You can also access the Report Builder to create and save new reports.
The actions available to you depend on the permissions configured – for example, you
cannot delete reports in the Standard Reports folder.
Select a link below for further instructions.
● Run a report
● Add a new report
● Copy a report
● Edit an existing report
● Share a report
● Schedule a report
● Delete a report
Run a report
1. In the left-hand pane, navigate through the folder structure and select the
subfolder containing the report you want. The reports appear in the table on the
right of the screen.
2. Click the report you want to run. Alternatively, click the down arrow next to the
report, and select Run from the menu.
3. The results are displayed in the Report Builder. See Viewing report results and
Viewing detailed reports.
2. Define attributes (for a grouped report), filters, and date ranges for your report as
described in Creating a report.
3. To save your new report to the Report Catalog, click the Save button in the
toolbar.
4. Enter a name and optionally a description for the report. The name can be a
maximum of 200 characters, and the description a maximum of 400 characters.
5. Select the folder to store the report in. By default this is the My Reports folder; if
you have created subfolders, you can use the Folder drop-down to choose one of
those.
6. Click Save Report.
Copy a report
1. Navigate through the Report Catalog to find the report you want to copy. This can
be a standard report, one created by you, or a report shared by someone else.
2. Click the down arrow next to the report you want, and select Copy from the menu.
Note
To copy multiple reports, mark the check box to the left of each report, then click the
Copy button in the toolbar.
3. If you are copying a standard or shared report, select the folder where you want to
store the copied report. By default this is the My Reports folder; if you have
created subfolders, you can use the Folder drop-down to choose one of those.
If you are copying one of your own reports, it is automatically saved to the same
folder as the original. You can move it to a different location later if required; see
Move items between folders.
4. Click Copy.
The report is saved to the selected location. If you are copying a report that you
own, “Copy” is appended to the report name. You can now rename the report by
clicking its down arrow and selecting Rename from the menu. You can also edit it
as required.
4. If you are editing a report that you created, or a shared report for which you have
editing permissions, you can save your changes by clicking the Save button in the
toolbar. The report is saved with the same name and in the same location,
overwriting the previous version.
If you are editing a standard report, or a shared report for which you do not have
editing permissions, click the Save As button in the toolbar to save the edited
report to one of your folders.
Share a report
1. In My Reports, click the down arrow next to the report you want, and select
Sharing from the menu. Alternatively, mark the check box next to one or more
reports, and click the Share button in the toolbar.
Note
You can also share a report after running it in the Report Builder.
Note
If a shared report is set to automatically detect the time zone, a user accessing the
report will always get the report in their local time zone.
Schedule a report
In My Reports, click the down arrow next to the report you want, and select Schedule
from the menu. Alternatively, mark the check box next to one or more reports, and
click the Schedule button in the toolbar. You can select a maximum of 5 reports for
each scheduling job.
Note
You can also share a report after running it in the Report Builder.
The Add Job scheduler window opens. For more information, see Scheduling reports.
Delete a report
1. In My Reports, click the down arrow next to the report you want to delete, and
select Delete from the menu. Alternatively, mark the check box next to one or
more reports, and click the Delete button in the toolbar.
2. In the popup window, click Delete to confirm.
Managing folders
The Report Catalog offers the options to create, copy, share, delete, and move items
between folders. The actions available to you depend on the permissions configured.
For example, you can only move and share your own folders.
Select a link below for further instructions.
● Create a new folder
● Copy a folder
● Move items between folders
● Share a folder
● Delete a folder
Copy a folder
When you copy a folder, you also copy all of the contents in that folder, including
subfolders and their contents.
To copy a folder:
1. Navigate through the Report Catalog to find the folder you want to copy. This can
be a folder containing standard reports, one created by you, or a folder shared by
someone else.
2. Click the down arrow next to the folder you want, and select Copy from the menu.
Note
To copy multiple folders, mark the check box to the left of each folder, then click the
Copy button in the toolbar.
3. If you are copying a standard or shared folder, select the location where you want
to store the copied folder. By default this is the My Reports folder; if you have
created further subfolders, you can use the Folder drop-down to choose one of
those.
If you are copying one of your own folders, it is automatically saved to the same
location as the original.
4. Click Copy.
The folder is saved to the selected location. If you are copying a folder that you
own, “Copy” is appended to the folder name. You can now rename the folder by
clicking its down arrow and selecting Rename from the menu. You can also edit
the reports in the folder as required.
Note
If a report is shared, moving it to a folder that is not shared does not change the
sharing permission assigned to the report. If you move a report to a shared folder, the
report inherits the folder’s sharing permissions.
Share a folder
When you share a folder, you also share the reports in that folder with the same
permissions. You can then edit the sharing permissions for individual reports within
the folder, although note that changes will remove the sharing permission from the
folder. See Share a report for more information.
To share a folder:
1. Navigate through My Reports until the folder you want to share is shown in the
right-hand pane.
2. Click the down arrow next to the folder, and select Sharing from the menu.
Alternatively, mark the check box next to one or more folders, and click the Share
button in the toolbar.
3. In the popup window, select one of these options:
■ Not shared means you are the only person who can access the folder. Select it
if you want to remove sharing from a folder.
■ View only allows others to run the reports in this folder, but not save any
changes to them.
■ Allow editing enables others to both run and save changes to the reports in
this folder.
4. Click OK.
The folder now has the sharing icon next to it in the list. Hover the mouse over the
icon to see the sharing permissions allocated to the folder.
Delete a folder
Deleting a folder also deletes all reports and subfolders contained within it.
To delete a folder:
1. Navigate through My Reports until the folder you want to delete is shown in the
right-hand pane.
2. Click the down arrow next to the folder you want to delete, and select Delete from
the menu. Alternatively, mark the check box next to one or more folders, and click
the Delete button in the toolbar.
3. In the popup window, click Delete to confirm.
Related topics:
● Creating a report
● Viewing report results
● Viewing detailed reports
● Report attributes: Web and Data Security
● Email report attributes
The Reporting > Report Center > Report Builder page offers an enhanced model
for creating multi-level, flexible reports that allow you to analyze information from
different perspectives. If a high-level summary shows areas of potential concern, you
can drill down to find more details.
When you select the Report Builder, you may be asked which type of report you want
to create: web, data, or email.
The Report Builder has the following elements:
● The Toolbar contains buttons for starting a new report, saving, scheduling,
sharing, and updating the current report. There are also buttons for exporting
reports in PDF or CSV format.
● The Attributes list, in the left pane, contains the data types that you can use to
create reports.
■ For information about email report attributes, see Email report attributes,
page 157.
Use the Search box at the top of the list to filter the Attribute list further.
● The Metrics list, in the left pane, contains options that you can add as columns to
the report. Drag metrics into and out of the report results area to add them to or
remove them from the report. The available metrics change depending on the
attributes that are selected.
■ For information about email protection metrics, see Email report metrics.
● In the right pane, the Grouping field can contain up to 2 attributes to define the
data grouping that appears in the report. For example, in a web report, if you drag
the Category attribute followed by the Action attribute into this field, this creates a
summary report on hits by category, and also displays the data broken down by
action within those categories. In an email report, if you drag the Policy attribute
followed by the Recipient Address attribute into this field, this creates a summary
report on messages by policy, and also displays the data broken down by recipient
addresses within those policies. For more information about defining grouping
data, see Creating a report.
● The Filters field can contain attributes to filter the report results further. For more
information about defining filters, see Creating a report.
● The Date range defines the time period covered by the report. This can be a
standard period (between 1 hour and 8 months) or a specific date and time range.
You can also choose whether to automatically detect the time zone for the report,
or choose a specific time zone from the drop-down list.
● Next to the date range, the display options enable you to select how many rows
appear in your report. Once a report has been generated, this section also includes
options to page through longer reports, and to display the report results in different
table and graph formats. For more information, see Viewing report results.
● The report results appear in the right pane when you click Update Report, and
by default are in a table format. You can choose to display the results in different
formats as described above, and to select report elements to drill down further. For
more information, see Viewing detailed reports.
Creating a report
To create a report:
1. Drag up to 2 attributes from the Attributes list to the Grouping field.
■ The Report Builder does not allow you to add more than 2 attributes, nor can
you add the same attribute more than once.
■ By default, the report shows the top 10 matches by number of hits. Click an
attribute box in the Grouping field to change the grouping data to show a
specified number of top results, a specified number of bottom results, or all
results.
Note
Choosing to view all results may mean the report takes a long time to generate.
■ To remove an attribute from the Grouping field, click the “x” icon on the
attribute box.
2. To add filters to the report, drag an attribute to the Filters field.
a. On the popup that appears, use the drop-down list to define how the filter
handles the values that you specify. The options available depend on the
attribute that you have selected. For example, you may be able to include or
exclude values, or state that search terms equal or do not equal your text.
b. Enter or select the search terms or values that you want to filter on. Depending
on the filter, you can:
○ Select one or more check boxes
○ Start typing text that will autocomplete based on data in the system
○ Enter the exact text that you want to use
For filters where you are including or excluding values already stored in the
system, start typing to see a list of potential matches. Then select the option
you want from the list. You can add multiple values to the filter.
Note
A Use free text entry check box is available for filters that use autocompleted text.
Selecting this allows you to copy and paste multiple values into the text box rather
then entering each one individually. Any autocompleted values already added are
converted to free text when the check box is selected, and if the check box is cleared,
any free text values are converted to autocompleted values.
For filters where you enter free text, enter the terms you want separated by
commas.
c. Click OK when done.
To edit a filter, click its attribute box. To remove an attribute from the Filters field,
click the “x” icon on the attribute box.
3. Click in the Date range field to define the report period.
■ To specify a set period in hours, days, or months, select an option from the
Last drop-down list.
■ To specify a particular date range, select the From radio button and use the
calendars to choose the required dates. Date ranges include the whole 24-hour
period, unless you mark Specify start and end time to enable and edit the
times for the report as well as the dates.
Note that reports are run using your local time zone unless you specify otherwise.
Click Done when you are finished.
4. Click the Update Report button to generate the report.
Note
The Update Report button turns yellow when you enter or change valid report
content, signifying that you can generate a report with the selected criteria.
Each item in the report has a check box. Select one or more check boxes to open a
popup window that enables you to:
● Drill down into more detailed information. See Drilling into report items.
Exporting a report
You can export your report results as either a PDF or CSV file.
To export a CSV file, click the Export to CSV button in the top right corner.
To export a PDF:
1. Click the Export to PDF button in the top right corner.
2. On the popup window that appears, enter a name, and optionally a description, for
the report.
3. Choose a page size and orientation for the PDF.
4. Click Export.
Scheduling reports
The Reporting > Report Center > Scheduler page lists the scheduled jobs created
for reports. The list gives basic information about the job, such as how frequently it
runs and which administrator owns it. From this page, you can add and delete
scheduled jobs, and edit the content and frequency of jobs.
The list provides the following information for each job.
Column Description
Job Name The name assigned when the job was created.
Recurrence The recurrence pattern (Once, Daily, Weekly, Monthly) set
for this job. For daily, weekly, and monthly reports, the
recurrence includes further options for the days the report is
run.
Starting The defined start date for the job.
Ending The end date for the job. If no end date is set, the column
displays Never.
Owner The user name of the administrator who scheduled the job.
● Once you have run a report in the Report Builder, click the Schedule button in the
toolbar.
● Click Add Job on the Scheduler page to create a new job.
To access the Edit Job page:
● Click the job name link on the Scheduler page.
The Add Job or Edit Job page contains several tabs for selecting the reports to run and
the schedule for running them. For detailed instructions, see:
● Selecting reports to schedule, page 194
● Setting the schedule, page 194
● Selecting report recipients, page 195
● Selecting delivery options, page 196
You can cancel the job creation or editing at any time by clicking Cancel. If you are
editing a job, you can click Save once you have made the required changes, without
needing to work through all the tabs.
After creating jobs, use the job list on the Schedule page to review job summaries and
find other helpful information (see Scheduling reports, page 193).
Note
Reports saved with a static date range (for example, from 1 May to 1 June) cannot be
scheduled. If you move a report with a static date range to the Selected reports list,
a warning appears, and you can change the date range for the scheduled version of
the report using the drop-down in the Date Range column.
4. Repeat steps 1 and 2 until all reports for this job appear in the Selected reports
list, to a maximum of 5 reports.
5. Click Next to open the Scheduling Options tab.
1. Select a Frequency for the job. The specific options available depend on the
frequency selected.
Frequency Options
Once No additional recurrence options are available.
Daily Select whether the job is run every weekday, or on a certain
number of days in the month – for example every 3 days.
Weekly Click each day of the week the job is to run.
Monthly Either:
Select how frequently the job should run, in a range of every
month to every 12 months, then click each date the job is to
run.
Or:
Select how frequently the job should run, in a range of every
month to every 12 months, then select a frequency and a day
of the week. For example, you could run the report every 2
months on the 2nd Tuesday of the month.
2. Under Starting, set the start date for running the job.
3. Under Ending, select an option for ending the job.
Option Description
Never The job continues to run according to the established
schedule, indefinitely.
To discontinue the job at some time in the future, either edit
or delete the job.
On Set the date when the job stops running. It does not run on or
after this date.
After Select the number of times to run the job. After that number
of occurrences, the job does not run again, but it stays in the
Job Queue until you delete it.
4. Select a Timezone for the report. The reports in the scheduled job will be
delivered by 6am in the selected time zone on the days you define.
5. Click Next to open the Recipients tab.
You can also enter additional email addresses if you want the job results to go to
people who are not cloud service administrators. Enter each address on a separate line.
Click Next to open the Delivery Options tab.
Format Description
PDF Portable Document Format. Recipients must have Adobe
Reader v7.0 or later to view the PDF reports.
CSV Comma Separated Variable file. This can be opened in
Microsoft Excel or another spreadsheet program.
Related topics:
● Account Summary report
● Service reports
● Downloading report results
● Saving reports
● Scheduling reports
Go to Reporting > Account Reports to see the account-level reports available to you.
● For cloud email, the account summary report provides a summary of the email
traffic that has been processed for your account during a defined time period.
● If you have directory synchronization enabled for your account, you can generate
synchronization statistics for the service.
● With cloud email, you can report on the end users who are subscribed to Personal
Email Subscriptions.
All reports are generated in real time using the cloud manager. Most include charts
and tables that are presented in an easy to read, printable format.
Note
For larger accounts, where a lot of data is to be retrieved, the reports may take some
time to generate. As soon as the relevant data has been retrieved it is displayed
while the remainder of the report is being compiled.
Commonly-used report criteria can be saved for easy access. For more information,
see Saving reports, page 202. Saved reports can be scheduled for regular delivery to
one or more recipients as described in Scheduling reports, page 202.
Related topics:
● Scheduling Account Summary reports
Note
You must renew your subscription to the Account Summary report every 3 months or
your subscription expires.
You can expand each section in the Account Summary report in this manner.
Service reports
The Service reports provide data that relates to directory synchronization and to end
user message report subscriptions.
Report Description
Synchronization History The history log provides a connection history for the
Log specified period, up to 1000 rows.
Synchronization Time The time summary provides a list of the 20 longest
Summary synchronization times.
3. From the during drop-down list, select the time period for the report. Click more
to select a specific date or time.
Note
The ‘last 6 full hours’ period does not include a synchronization just performed. You
must wait for the hour to pass for it to appear in this report. You can view the very
latest synchronization history in the Manage Directory Synchronization page on the
Setup tab.
You can download the report to a CSV or PDF file. You can also print the report.
Subscriptions report
The Personal Email Subscriptions report lists the end users who are subscribed to
personal email subscriptions for the criteria you specify.
1. Select Reporting > Account Reports > Services.
2. From the Show drop-down list, select Personal Email Subscriptions -
Subscriptions.
3. From the during drop-down list, select the time period for the report. Click more
to select a specific date or time.
4. Select the policy or policies for the report.
Note
You can use the Shift and/or Ctrl keys to select multiple domains and policies.
Note
You can see the expiration date of each subscription, as well as subscriber and
recipient addresses, in the report that is generated. The latter may be useful for
consolidated end user message reports (one report for multiple email accounts).
On each report, you have the option to download the data as a PDF or CSV file.
Note
You can also download charts as image files or in PDF format. To download a chart,
right-click the chart and select the format to download (PDF, PNG, or JPEG).
Note
For some email reports, the totals in the CSV file might be higher than the totals in
the report on screen. This is because the generated reports contain 1 line per email
message, whereas the CSV version contains 1 line per recipient which means that a
single email message might appear several times.
Saving reports
Related topics:
● Scheduling reports
You can choose to save any Services report. Use this option to identify the reports you
generate most frequently and want to be able to locate quickly.
To see the list of reports that you have saved, select Reporting > Account Reports >
Saved Reports.
To save a report:
1. Under Reporting > Account Reports > Services, select the report you want.
2. Use the Selection screen to enter your report criteria.
3. Click Save Report.
4. Enter a name for the report, and click Save.
The Saved Reports list is displayed, and the report you entered is now listed.
As well as accessing the report from this screen, you now have the option to delete the
saved report or schedule it for regular delivery.
Scheduling reports
Related topics:
● Saving reports
You can run reports as they are needed, or you can define a schedule for running one
or more saved reports.
Reports generated by scheduled jobs are distributed to one or more recipients via
email. The reports can be in HTML, PDF, or CSV format. There is a limit on the
number of reports you can schedule for delivery: the Saved Reports list displays the
remaining number you can schedule in addition to any existing deliveries.
Note
You cannot schedule reports that have defined start and end dates, or that span
periods of less than 24 hours.
To schedule a report:
Use the Account > Settings > Audit Trail page to find information about
administrator actions and configuration changes.
To run the default search, which shows results for all users, actions, descriptions, and
SQL queries that have occurred so far today, click View Results without making any
changes on the page.
To perform a more targeted search, use the fields and selectors on the screen to specify
the type or range of data that you want to see. You can enter:
● All or part of an administrative User name, or * (default) to specify any user
● An Action type, like “Login” or “Delete,” or All (default) to specify all actions
● All or part of a Description of the action that occurred, like an IP address or
policy number, or * (default) to specify any description text
● All or part of the specific SQL query used to perform the action, or * (default) to
specify any SQL query
● A Date range (today’s date, by default) for the query
By default, when you enter a string in any field, the search looks for an exact match.
To configure the search to look for any string that contains the value you specify,
precede your entry with an asterisk (*) character (for example, *DELETE or *admin).
When you click View Results, any audit trail information that matches your search
parameters is displayed in a table. All results include the date and time that the action
occurred, a description of the action, the action type, and the user who performed the
action. If the action resulted in a change to the configuration database, the SQL query
used to make the change is also displayed.
Paging controls are displayed just above the results table. Use the controls to
configure how many results to display on the page, and to move through the results.
Click the back arrow above the table to return to the Audit Trail page where you can
enter new search parameters.
Click Export to CSV on either the Audit Trail page or the Search Results page to
export the results of your audit trail search to a file named audit_trail.csv. You can
open the file, save the file with the default name, or save the file with a new name.
The Forcepoint Email Security Cloud service provides a standard configuration for all
email accounts. The settings for the standard configuration are described below, as
well as the reasoning behind the settings. As an administrator, you can customize
policy settings to suit your needs. Do this by clicking Email, then following the
instructions in Defining Email Policies, page 67.
Each table in this section represents a section in email configuration settings. Column
4 suggests various use cases for changing the standard setting.
Whether you are a new or existing customer, you should plan your approach before
performing your first synchronization. This section provides checklists for setting up
directory synchronization in various use cases. Find yours to determine the best course
of action.
● New Web and/or email customers
● New and existing email customers
● Existing Web and/or email customers
● Considerations for existing customers
For existing cloud web and/or email customers, see the following:
● Wanting to manage users/groups from an LDAP directory, page 217
● Wanting to manage users/groups from an LDAP directory but Web policy
assignment from the portal, page 219
If you have already set up users, groups, passwords, policies, and exceptions in the
cloud manager and you want to switch to LDAP synchronization, consider the
following:
● You can minimize the impact by carefully matching your LDAP group names and
membership to the existing setup. Matching LDAP group names and membership
to those already in the cloud service allows existing policy selections and settings
to be maintained, as well as existing usernames/passwords where applicable.
● You are responsible for avoiding ambiguous configurations, for example, users
belonging to multiple groups which are assigned to different policies. It is up to
you to set up groups in the LDAP directories in such a way that ambiguities don't
occur. (When there are ambiguities, the service selects the closest group-to-policy
assignment for each individual user, taking the first group in alphabetical order
where there are multiple assignments at the same hierarchical level.)
● Existing users can retain their passwords and whether you manage users through
the portal, LDAP synchronization, or both is completely transparent to them.
Expression Description
[] may also be used on a range of characters separated by a – character.
[0-9] matches any digit.
[a-z] matches any alpha character
[a-z0-9] matches any alphanumeric character
^ is the “not” character, so [^0-9] matches against any character that is
not a digit.
Although you can use ranges to specify a group of characters, you can also use the
following shortcuts:
Expression Description
. matches against any character
\d matches against a digit [0-9]
\D matches against a non-digit [^0-9]
\s matches against a whitespace character (such as a tab, space, or line
feed character)
\S matches against a non-whitespace character
\w matches against an alphanumeric character [a-zA-Z_0-9]
\W matches against a non-alphanumeric character
\xhh matches against a control character (for the hexadecimal character hh)
\uhhhh matches against a Unicode character (for the hexadecimal character
hhhh)
To match against occurrences of a character or expression, you can use the following:
Expression Description
* matches against zero or more occurrences of the previous character or
expression
+ matches against one or more occurrences of the previous character or
expression
? matches zero or one occurrences of the previous character or expression
{n} matches n occurrences of the previous character or expression
{n,m} matches from n to m occurrences of the previous character or
expression
{n,} matches at least n occurrences of the previous character or expression
You can provide text to replace all or part of your search string. To do this, you need to
group together matches by enclosing them in parentheses so they can be referenced in
the replacement. To reference a matched parameter, use $n where n is the parameter
starting from 1.
Example 1: IP address
The following regular expression matches against any IP address:
\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\b
You can test this regex with any phrase including a standard IP address, for example
192.23.44.1.
Example 2: Dates
The following regular expression matches against dates in the format DD-MMM-
YYYY:
\b\d\d?-\w\w\w-\d\d\d\d\b
To test this regex, enter a sentence similar to “The project completes on 14-Feb-2009”.
This appendix provides a list of all the file formats and types supported for email
attachment blocking and parking.