What is the anti-phishing Technique?
08/10/2021 1,051 People found this article helpful 196,921 Views
Phishing attacks are a form of fraud. They use email with fraudulent content to steal consumers' personal identity data and financial account credentials. According to a recent SonicWall Cyber Threat Report, more than 90% of cyber-attacks begin with a successful phishing campaign that often starts with malware. About 66% of malware installed in a computer comes from a malicious email attachment.
This anti-phishing technique allows administrative management of incoming email. To activate, control, or customize your anti-phishing technique, select the Anti-Phishing option found on ES UI to take action on messages that are phishing attacks or that are likely to contain phishing attacks.
Navigate to Manage | Security Services | Anti-Phishing
This option will help you take action against messages identified as phishing attacks or are likely to contain phishing attacks. Under the Action Settings option, you may specify different actions for messages identified as Definite Phishing" and those that are Likely Phishing:
- No Action -- Allows suspected emails to be delivered to all users.
- Permanently delete -- Use this option with caution. You cannot retrieve deleted emails.
- Reject with SMTP error code 550 -- Bounce the email back to the sender (return the email message) so that it does not appear in any inbox.
- Store in Junk Box -- Recommended for most configurations. It will store suspected phishing email messages in a "Junk Box" for a previously specified number of days
- Send to ____________ -- Forward suspicious email messages to a specified email address for review.
- Tag with _________ -- Tag suspicious email messages with text that will appear in the beginning of the subject line. The message is delivered to the addressed recipient.
- Add X-Header -- Add an X-Header with the key and value specified to the email message. This option will not take any protective action against the email; however, it will add a header to the email to help with other filtering. The first text field defines the X-Header, and the second text field is the value of the X-Header. For instance, you may add a header type "X-EMSJudgedThisEmail" with a value like "DefinitePhishing." The result will be that the message is delivered to the recipient with a header: "X-EMSJudgedThisEmail: DefinitePhishing."
- Allow users to unjunk phishing: Allow users to unjunk messages containing phishing attacks.
- Send copies of emails containing phishing attacks to the following email addresses: This option sends a copy of phishing emails to a number of email addresses. We can enter the email addresses of administrators or others in this text box- separate multiple email addresses with a comma.
Was This Article Helpful?