Threat Extraction Exceptions

Threat Extraction (Attachment/File Cleaning) is a Content Disarm and Reconstruction (CDR) engine that serves as an additional layer of security for email attachments on top of the Anti-Malware engine. It supports defining Allow-Lists by Sender and File Hash.

Viewing Threat Extraction Exceptions

To view the Threat Extraction Allow-List rules:

  1. Access the Email Security Administrator Portal.

  2. From the left navigation panel, go to Security Settings > Exceptions > Threat Extraction.

    The Threat Extraction page displays all the exceptions and the defined criteria.

Adding a Threat Extraction Allow-List Exception

To add a Threat Extraction Allow-List exception:

  1. Click Security Settings > Exceptions > Threat Extraction.

  2. Click Create Allow-List.

    The Create Threat Extraction Allow-List pop-up appears.

  3. From the Allow-List Type dropdown, select the required option.

  4. Enter the required sender/recipient's email address or domain/file MD5.

    • Sender Address / Domain – Attachments in emails from these senders or domains are not cleaned before delivery to end users.

    • File Hash – Attachments that match the allow-listed file hashes are not cleaned before delivery to end users.

    Note - Attachments allow-listed here still undergo sandbox inspection. However, they just not be cleaned (CDR) before delivery to end users.

  5. In the Comment field, enter a comment for the allow-list rule.

  6. Click OK.

Deleting a Threat Extraction Allow-List Exceptions

To delete a Threat Extraction Allow-List exception:

  1. Click Security Settings > Exceptions > Threat Extraction.

  2. Select the exception(s) you want to delete (Sender or File Hash).

  3. Click Delete from the top-right corner.

  4. In the confirmation pop-up that appears, click OK.