Cloud App Security Administration Guide for Office 365
- Cloud App Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Managing Quarantine for Office 365 and Microsoft 365
- Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online)
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint
- Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online)
- Using the Quarantine Page
- Using the Quarantined File Creator Dashboard
- Using the User Dashboard for Office 365 and Microsoft 365
- Managing Restore Requests
- Using the SonicWall Cloud App Security Dashboard
- Managing Security Events
- Managing Policies
- Understanding Cloud App Security Policies
- Creating New Policy Rules
- Stopping Policy Rules
- Removing Policy Rules
- Managing Office 365 and Microsoft 365 (Exchange Online) Mail-Flow Rules
- Managing Spam and Anti-Phishing
- Managing Spam
- Managing User-Reported Phishing
- Customizing Warning Messages
- Managing Nickname Impersonation
- Managing the Anti-Phishing Exceptions
- Using the Mail Explorer
- Working with Office 365 and Microsoft 365 Email Encryption
- Configuring and Using Click-Time Protection
- Using Cloud App Security Analytics
- Configuring Cloud Applications in the Cloud App Store
- Managing Security Applications in the Security App Store
- Managing Anomaly Exceptions
- Managing Security Tool Exceptions
- Using the System Log
- Managing Cloud App Security Licenses
- SonicWall Support
Managing User-Reported Phishing
Email users in your organization are an important element in detecting and combating phishing attempts. Users can help identify undetected phishing attempts, allowing your administrators to block the those attacks as well as be prepared for future similar phishing attempts.
Users using Outlook can identify email messages as phishing attempts from within the application by choosing Mark as Phishing. Doing this notifies Microsoft of the suspected phishing attempt and Cloud App Security can capture those email messages and report them as suspected phishing attempts. Administrators can then quarantine the message, create a block list rule based on the email message, or disregard the report.
To enable user-reported phishing
- Make certain that Anti-phishing is running and enabled. (Refer to Starting Security Applications for more information.)
-
Options to manage user-reported phishing are available when you create threat detection policies. (Refer to Creating Threat Detection Policy Rules for detailed information about all of the available policy rule options.)
In the Advanced section, under Security Tools, click Configure Anti-Impersonation and Phishing Confidence-Level.
- For Import Office365 emails reported by users, select one of these options:
- Create an "Alert" event
- Create a "Phishing" event
- Click Ok.
Was This Article Helpful?
Help us to improve our support portal