Cloud App Security Administration Guide for Office 365
- Cloud App Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Managing Quarantine for Office 365 and Microsoft 365
- Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online)
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint
- Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online)
- Using the Quarantine Page
- Using the Quarantined File Creator Dashboard
- Using the User Dashboard for Office 365 and Microsoft 365
- Managing Restore Requests
- Using the SonicWall Cloud App Security Dashboard
- Managing Security Events
- Managing Policies
- Understanding Cloud App Security Policies
- Creating New Policy Rules
- Stopping Policy Rules
- Removing Policy Rules
- Managing Office 365 and Microsoft 365 (Exchange Online) Mail-Flow Rules
- Managing Spam and Anti-Phishing
- Managing Spam
- Managing User-Reported Phishing
- Customizing Warning Messages
- Managing Nickname Impersonation
- Managing the Anti-Phishing Exceptions
- Using the Mail Explorer
- Working with Office 365 and Microsoft 365 Email Encryption
- Configuring and Using Click-Time Protection
- Using Cloud App Security Analytics
- Configuring Cloud Applications in the Cloud App Store
- Managing Security Applications in the Security App Store
- Managing Anomaly Exceptions
- Managing Security Tool Exceptions
- Using the System Log
- Managing Cloud App Security Licenses
- SonicWall Support
Understanding Email Security
The widespread adoption of Office 365 and Microsoft 365 makes it an easy target for every hacker. Never have they given so many mailboxes with identical security. Hackers also leverage the fact these cloud accounts are sources of authentication to other enterprise SaaS apps. This is the real and present danger of the cloud security monoculture. What bypasses one, bypasses all. Unfortunately, native cloud security is not enough. Secure Email Gateways (SEGs) are not built for the cloud, only secure inbound and outbound email, and broadcast themselves to hackers.
Given the many limitations of securing cloud email with traditional SEGs and security shortfalls within Office 365 and Microsoft 365 filters, a best-practice solution must be cloud-native and designed to augment, not replace, existing security layers. This ensures that the basic filtering as well as new attack signatures are constantly updated, while advanced threat analyses address modern targeted phishing and evolving zero-day attacks.
A best practice solution must:
- Block harmful messages, URLs, and attachments from reaching the inbox
- Scan all emails preventing insider threats from compromised or trusted internal accounts
- Synchronous threat management via Capture Cloud Platform
Cloud App Security complements the default security of Office 365 and Microsoft 365 by connecting within the Office 365 and Microsoft 365 environment via API and scanning emails after the email provider’s built-in security scan. This has several advantages over the proxy method utilized by SEGs.
By scanning after the default security of Office 365 and Microsoft 365, Cloud App Security utilizes the built-in security features as opposed to scanning before default security in the case of SEGs. This allows Cloud App Security to focus on more sophisticated phishing attacks that are designed to bypass the filters in place by Office 365 and Microsoft 365.
By connecting to the cloud environment via the Office 365 and Microsoft 365 API, Cloud App Security can extend their security beyond just inbound and outbound emails to scan internal emails as well for account compromised and data leakage.
- Before You Set Email Policies
- Using the Mail Explorer
- Managing Spam and Anti-Phishing
- Understanding Post-Delivery Email Recheck
- Working with Office 365 and Microsoft 365 Email Encryption
Was This Article Helpful?
Help us to improve our support portal