Prerequisites
Summary
This article will showcase how to quickly and effectively setup and start using Encrypted Mail Services
|
Access & Manage Encrypted Email Services
1. All aspects of Encrypted Mail services are handled through the Secure Email Gateway (SEG). The SEG may be accessed via any web browser at the following address: https://securemail.myhostedservice.com// |
2. Login using the administrative credentials supplied for the mail encryption services. The credentials were supplied in the service welcome letter, and are unique to the SEG. |
![]() |
Encrypt Email
1. Email by default, is not encrypted with secure email services. Mail filtering and encryption is defined through the policy, or rule creation, established in the SEG. This means that all email (incoming/outgoing) is compared against active policy to determine what specific actions are taken. The policies themselves are conditional based that match email content against three list types:
When a policy has a conditional triggered the resultant action taken against the email is predicated upon the action defined within the policy. If no action is taken against the email, it is then compared against the next defined policy until either all policies are exhausted, or an action is taken. Once an action is taken against an email, no further policy comparisons will be made. It is important, mainly for analytical purposes, to arrange policy in a manner that emphasizes filtering on the severity of flagged content (see: Prioritize Mail Policies). For more information on policy creation please review the article; Create Mail Policies. |
2. In some cases a user from the initial composition of a message acknowledges the need for a message to be encrypted. A message can be encrypted at the user's discretion by installing the Outlook Encryption Add-In. After the add-in is installed, encryption can be implemented on message-by-message basis. However for the SEG to recognize the presence of the plug-in request for encryption, the following policy must be added:
|
||||||||
Analyze Mail Activity
With email encryption, all email activity for encrypted accounts is monitored and can be reviewed by accessing the reporting section of the SEG. In the process of creating mail policies (Create Mail Policies) certain metrics are defined to help differentiate and emphasize email infringement of policy. Those metrics ultimately determine the precedence of the information displayed in the reports, and the admin's ability to extrapolate any useful assessment. There are two primary report types Summary Reports, and Detailed Reports, that provide different reporting views as their names imply. View either article for more information. |
Example Policy
Email policies are designed to cater to the security needs of an organization. The policy examples provided are intended to represent general policies, and are not necessarily well suited for use in an organization. When creating policy carefully review the requirements, and daily email use of a company. |
|
0 Comments