About Cloud Email Protection
Fortra Cloud Email Protection provides unprecedented insight into the email coming in to your organization, flowing out of your organization, and within your organization. Powered by Fortra Identity Intelligence – Fortra's unique machine learning techniques based on historical email traffic to your organization – Cloud Email Protection models the unique behavior of all legitimate email senders and allows you to quickly distinguish good messages from potentially bad messages. Coupled with Identity Intelligence, Fortra's platform of data – built from analyzing billions of email messages worldwide – provides you a risk overview of all messages in your organization and senders who send email into your organization.
Risky messages – such as phishing attempts or "business email compromise" (BEC) messages which may contain no malicious payload or questionable links – are delineated from known good messages.
Cloud Email Protection complements traditional secure email gateway (SEG) solutions by catching the spear phishing, targeted, low volume, and zero day attacks that typically are the weaknesses of traditional, reactive SEG security "layers."
Using the policy engine within Cloud Email Protection, you can configure alerts to be sent to your end users about bad messages in near-real-time, and you can even move potentially dangerous messages out of your end-users' inboxes altogether.
Cloud Email Protection Help
This help system provides information about how to configure and use Cloud Email Protection. You can use the links below or the navigation to the left to go directly to any section or topic, or use the search field above to find specific information.
- Sensors, including information on planning, prerequisites, installation, testing, deployment, and operation
- Configuring delivery to a sensor, including dual delivery for G Suite, Office 365, Cisco ESA, Symantec Brightmail, Symantec MessageLabs, and Proofpoint
- Configuring enforcement for G Suite, Office 365, and Microsoft Exchange
- Analyzing incoming email traffic and understanding attack classifications
- Viewing messages
- Viewing and tagging domains and viewing IP address details
- Address groups
- Policies
- Notifications
- Attachment and URI analysis
- Managing senders
- Organization settings
- User accounts, including user roles and single sign-on