Video Tutorials
For relevant information, see Activating Office 365 Mail.
00:00:
00:05: This tutorial demonstrates how to activate protection for Office 365 Mail with
00:10: Check Point Email Security.
00:12: Log in to the Check Point Portal and access the Email Security Administration Portal.
00:18: If you already have a contract purchase from checkpoint, click already have a contract
00:22: and follow the on-screen instructions to add your user Center account.
00:26: Otherwise click Start free trial by default.
00:29: The trial is for 14 days and you can access all the features.
00:34: To start using Email Security,
00:36: click "Let's Get Started" on the Welcome page that appears.
00:40: Click Start for Office 365.
00:43: Select the mode of installation. Checkpoint recommends using
00:47: automatic mode, which provides better maintenance management and a
00:51: smoother user experience.
00:53: To limit the license consumption and protection to a specific group of users select
00:57: this checkbox. If you want to protect all users in your organization,
01:01: you can ignore this step.
01:05: Accept the terms of service and click okay.
01:08: You are now redirected to the Microsoft login page, follow the on-screen
01:12: instructions and sign in with Microsoft Global administrator credentials.
01:17: Review the permissions requested by checkpoint and click accept to Grant the
01:21: permissions.
01:22: To protect all the users in the organization.
01:24: Select all organization.
01:27: To protect a specific group of users, select specific group and enter
01:31: the group name and then click okay.
01:34: If you need to connect multiple Email Security tenants to the same Microsoft 365
01:39: account, select the checkbox and click OK.
01:41: If this option is not available, please contact Check Point Support.
01:46: After activating Office 365 Mail,
01:49: Email Security runs in Learning Mode and performs several calibration processes. By
01:54: default,
01:55: it takes up to 48 hours to learn the user behavior and adjust the phishing detection
02:01: security engines depending on the number of protected mailboxes and the volume of
02:05: their emails.
02:06: Please note that In Learning Mode, no email will be flagged as phishing or spam.
02:11: Email Security automatically exits Learning Mode after the calibration processes
02:16: are complete and you will immediately start seeing the detections. Note that at this
02:21: point, Email Security only monitors your emails for threats and does not quarantine
02:26: them.
02:27: To prevent threats, you must change the policy protection mode to do that.
02:31: Go to policy.
02:33: Expand Office 365, male and click the default threat protection
02:37: policy ru.
02:39: Select the policy protection mode as prevent inline.
02:43: Choose the desired workflows for the different types of detections.
02:47: Scroll down and click Save and Apply.
02:49: Now, that the policy protection mode is changed to Prevent (Inline), Email Security
02:54: starts taking preventive actions.
For relevant information, see Activating Microsoft Teams.
00:04: This tutorial demonstrates how to activate protection for Microsoft Teams with
00:09: Check Point Email Security.
00:12: Log in to the Check Point Portal and access the Email Security Administration
00:17: Portal. If Microsoft Teams is the first product you are onboarding to Email Security,
00:22: the Welcome page appears.
00:24: If you already have a contract purchase from checkpoint, click already have a contract
00:28: and follow the on-screen instructions to add your user Center account.
00:31: Otherwise click Start free trial by default.
00:35: The trial is for 14 days and you can access all the features.
00:39: If the "Welcome to Check Point" page appears, click "Let's Get
00:42: Started" and in the "SaaS Selection" page that appears, click "Start" for Microsoft
00:46: Teams. If you have already onboarded another SaaS application with Email Security,
00:51: the Overview page appears.
00:54: Click security settings and then click SAS applications.
00:58: Click Start for Microsoft teams.
01:00: In the confirmation pop-up that appears click Start to confirm
01:04: You are now redirected to the Microsoft login page, follow the on-screen
01:08: instructions and sign in with Microsoft Global administrator credentials.
01:13: Review the permissions requested by checkpoint and click accept to Grant the
01:17: permissions.
01:18: The Microsoft Teams SaaS is enabled, and Email Security starts monitoring for security
01:23: events. To prevent threats,
01:25: you must change the policy protection mode.
01:28: To do that. From the left navigation, panel, click policy.
01:33: Expand Microsoft teams and click the default threat protection ru.
01:37: Select the policy protection mode as detect and remed.
01:41: Click Save and Apply.
01:42: Now, that the policy protection mode is changed to Detect and Remediate, Email
01:47: Security starts taking remedy actions.
For relevant information, see Activating Office 365 OneDrive
00:04: This tutorial demonstrates how to activate protection for Office 365 OneDrive with
00:10: Check Point Email Security.
00:12: Log in to the Check Point Portal and access the Email Security Administration
00:17: Portal. If OneDrive is the first product you are onboarding to Email Security, the
00:22: Welcome page appears.
00:24: If you already have a contract purchase from checkpoint, click already have a contract
00:28: and follow the on-screen instructions to add your user Center account.
00:32: Otherwise click Start free trial by default.
00:35: The trial is for 14 days and you can access all the features.
00:39: If "Welcome to Check Point" page appears, click "Let's Get
00:42: Started" and in the "SaaS Selection" page that appears, click "Start" for Office 365 OneDrive.
00:48: If you have already onboarded another SaaS application with Email Security, the
00:53: Overview page appears.
00:55: Click security settings and then click SAS applications.
00:59: Click Start for Office 365 OneDrive.
01:02: In the confirmation pop-up that appears click Start to confirm
01:06: You are now redirected to the Microsoft login page, follow the onscreen
01:10: instructions and sign in with global administrator credentials.
01:14: Review the permissions requested by checkpoint and click accept to Grant the
01:18: permissions.
01:19: The Office 365 OneDrive SaaS is enabled, and Email
01:23: Security starts monitoring for security events. To prevent threats,
01:27: you must change the policy protection mode.
01:30: To do that. From the left navigation, panel, click policy.
01:35: Expand Office, 365, OneDrive and click the default threat protection ru.
01:40: Select the policy protection mode as detect and remed.
01:44: Scroll down and click Save and Apply.
01:46: Now, that the policy protection mode is changed to Detect and Remediate, Email
01:51: Securit starts taking remedy actions.
For relevant information, see Activating Office 365 SharePoint.
00:04: This tutorial demonstrates how to activate protection for Office 365 SharePoint
00:09: with Check Point Email Security.
00:12: Log in to the Check Point Portal and access the Email Security Administration
00:17: Portal. If Office 365 SharePoint is the first product you are onboarding to
00:22: Email Security, the Welcome page appears.
00:25: If you already have a contract purchase from checkpoint, click already have a contract
00:30: and follow the on-screen instructions to add your user Center account.
00:33: Otherwise click Start free trial by default.
00:36: The trial is for 14 days and you can access all the features.
00:40: If "Welcome to Check Point" page appears, click "Let's Get
00:43: Started" and in the "SaaS Selection" page that appears, click "Start" for Office
00:48: 365 SharePoint. If you have already onboarded another SaaS application with Email
00:53: Security, the Overview page appears.
00:56: Click security settings and then click SAS applications.
01:00: Click Start for Office 365. SharePoint
01:03: In the confirmation pop-up that appears click Start to confirm
01:07: You are now redirected to the Microsoft login page, follow the on-screen
01:11: instructions and sign in with Microsoft Global administrator credentials.
01:16: Review the permissions requested by checkpoint and click accept to Grant the
01:20: permissions.
01:21: The Office 365 SharePoint SaaS is enabled, and Email
01:25: Security starts monitoring for security events. To prevent threats,
01:29: you must change the policy protection mode.
01:32: To do that. From the left navigation, panel, click policy.
01:37: Expand Office 365, SharePoint, and click the default threat protection ru.
01:42: Select the policy protection mode as detect and remed.
01:46: Scroll down and click Save and Apply.
01:48: Now, that the policy protection mode is changed to Detect and Remediate, Email
01:53: Security starts taking remedy actions.
For relevant information, see Activating Gmail.
00:00:
00:05: This tutorial demonstrates how to activate protection for Gmail with Check
00:09: Point Email Security.
00:11: Log in to Check Point Portal and access the Email Security Administration
00:16: Portal. If Gmail is the first product you are onboarding to Email Security, the
00:21: Welcome page appears.
00:23: If you already have a contract purchase from checkpoint, click already have a contract
00:27: and follow the on-screen instructions to add your user Center account.
00:30: Otherwise click Start free trial by default.
00:34: The trial is for 14 days and you can access all the features.
00:38: If welcome to checkpoint page appears click, let's get started and in the SAS
00:42: selection page, that appears, click Start for Gmail.
00:45: If you have already onboarded another SaaS application with Email Security, the Overview
00:49: page appears. Click Security Settings and then click SaaS Applications.
00:55: Click Start for Gmail.
00:57: In the confirmation pop-up that appears click Start to confirm
01:01: Select the mode of installation, checkpoint recommends using automatic
01:05: mode, which provides better maintenance management and a smoother user
01:09: experience.
01:10: Click okay to confirm.
01:12: You are now redirected to the Google login page, follow the on-screen
01:16: instructions and sign in with Google Global administrator credentials.
01:20: After successful authentication to Google Workspace, you will be redirected to the
01:25: Email Security application installation page. Click "Admin Install".
01:30: In the confirmation pop-up that appears click continue.
01:34: Review the permissions and select everyone at your organization.
01:39: Select the terms of service and click next.
01:42: After successful installation of the application, a confirmation popup
01:46: appears, click done.
01:48: Now that the application is installed successfully Gmail group selection
01:52: pop-up, appears to protect all the users in the organization.
01:55: Select all organization to protect a specific group
01:59: of users, select specific group and enter the group name and then click
02:04: okay.
02:05: Gmail SaaS is enabled, and Email
02:07: Security starts monitoring for security events. To prevent threats,
02:11: you must change the policy protection mode.
02:15: To do that. From the left navigation, panel, click policy.
02:19: Expand Google mail and click the default threat protection.
02:23: Select the policy protection mode as prevent inline.
02:27: Scroll down and click Save and Apply.
02:28: Now, that the policy protection mode is changed to Prevent (Inline), Email Security
02:33: starts taking preventive actions.
02:36:
For relevant information, see Activating Google Drive.
00:03: This tutorial demonstrates how to activate protection for Google Drive with
00:07: Check Point Email Security.
00:09: Log in to Check Point Portal and access the Email Security Administrator
00:14: Portal. If Google Drive is the first product you are onboarding to Email Security,
00:19: the Welcome page appears.
00:21: If you already have a contract purchase from checkpoint, click already have a contract
00:25: and follow the on-screen instructions to add your user Center account.
00:29: Otherwise click Start free trial by default.
00:32: The trial is for 14 days and you can access all the features.
00:36: If the welcome to checkpoint page appears click, let's get started.
00:39: And in the SAS selection page, that appears, click Start for Google Drive.
00:44: If you have already onboarded another SaaS application with Email Security, the Overview
00:49: page appears. Click Security Settings and then click SaaS Applications.
00:55: Click Start for Google Drive.
00:57: In the confirmation pop-up that appears click Start to confirm
01:01: You are now redirected to the Google login page, follow the on-screen
01:05: instructions and sign in with Google Global administrator credentials.
01:09: After successful authentication to Google Workspace, you will be redirected to the
01:13: Email Security that is Harmony Email and Collaboration application installation
01:18: page. Click "Admin Install".
01:21: If the harmony email and collaboration application was already installed during
01:25: the Gmail, SAS application onboarding, the installation option
01:29: does not appear, then click the menu icon.
01:33: In the list that appears, scroll down to the end and select the harmony email
01:37: and collaboration application.
01:40: The Google Drive SaaS is enabled, and Email
01:43: Security starts monitoring for security events. To prevent threats,
01:47: you must change the policy protection mode.
01:50: To do that. From the left navigation, panel, click policy.
01:54: Expand Google Drive and click the default threat protection rule.
01:59: Select the policy protection mode as detect and remed.
02:03: Scroll down and click Save and Apply.
02:05: Now, that the policy protection mode is changed to Detect and Remediate, Email
02:10: Security starts taking remedy actions.
00:03: This tutorial demonstrates how to access the documentation check, the
00:07: status of various Services contact checkpoint, support to resolve
00:11: issues and contact the incident response team in case of a security breach
00:16: Log in to the Check Point Portal and access the Email Security Administrator Portal.
00:22: Click the support icon from the top right corner.
00:25: The pop-up appears and shows the available options.
00:29: To view the Email Security product updates, click "What's New."
00:33: The system redirects you to the Check Point Email Security Product Updates
00:38: page. Click the relevant blog for more information.
00:41: To receive email notifications about product updates,
00:44: click "Subscribe." Enter your email address and then click Subscribe.
00:49: To view the administration guides related to Email Security, click "Admin guide".
00:54: The Infinity Portal Guide provides an overview of the host platform
00:58: and its features, while the Email Security Guide explains how to secure your cloud
01:03: email and collaboration
01:04: suites. Click the desired admin guide to access the relevant documentation.
01:10: To open a support ticket for technical issues related to Email Security,
01:14: click "Contact Support".
01:16: A system redirects you to the contact email security support page, enter
01:21: the relevant details and click save a checkpoint support representative
01:25: contacts you and provides the appropriate solution.
01:29: To view the downtime for a specific service, on a particular day or the
01:33: service status of all checkpoint Services, click service status,
01:37: To receive email notifications when an incident related to checkpoint Services
01:41: is created updated or resolved, click subscribe to updates,
01:46: Enter the required email address and click subscribe via email.
01:50: To connect with a checkpoint expert with in-depth knowledge of checkpoint products, click
01:54: contact an expert,
01:56: In the pop-up that appears enter your issue and click Send a
02:00: checkpoint expert contacts, you within 30 minutes of initial contact and provides
02:04: the appropriate solution.
02:06: If you are experiencing a data breach ransomware outbreak or active cyber
02:10: threat, you can contact the checkpoint incident response team to do that, click
02:15: call our incident Response Team. You can also contact this team to schedule
02:19: a proactive engagement session and our experts will help you create incident
02:23: response, plans, playbooks or tabletop scenario drills.
02:28: The system redirects you to the checkpoint incident response Services page.
02:31: If you're under a Cyber attack and need immediate assistance, send an
02:36: email to emergency-response at checkpoint.com or call the
02:40: toll-free number of your region. The checkpoint incident Response, Team investigates
02:44: the case where threat actors have already gained access and helps determine
02:48: how the breach occurred and the checkpoint Global forensics.
02:52: Experts assist with any cyber threat or data breach scenario.
For relevant information, see Phishing Protection.
For relevant information, see Password Protected Attachments Protection.
For relevant information, see Encrypting Outgoing Emails.
00:00: This video walks you through the steps the recipient must follow to view the encrypted emails through a secured web portal.
00:08: If the administrator configured an outgoing DLP policy to encrypt
00:12: sensitive emails with checkpoint Email encryption, these emails
00:16: will be delivered securely to the external.
00:18: Recipients
00:20: When such sensitive information is detected in an email sent outside your
00:24: organization, Check Point Email Security encrypts it and sends an
00:29: email notification to the recipient with information about the sender and the
00:33: email subject.
00:35: To read the encrypted email, the recipient must click the link provided in the email.
00:41: A secure web portal opens and requests for authentication.
00:45: Click "Send Authentication Code".
00:48: The recipient receives an email with the authentication code.
00:52: In the secured portal, enter the code and click "Go to the Email".
00:56: After successful authentication, the encrypted email opens in the secured web portal.
01:02: To reply to the email, click "Reply to Sender".
01:06: Type in the response and click "Send".
01:09: The response is sent as an email to the original sender, and the secured portal shows the email delivery status.
01:16: This is how the response sent from the secured web portal appears to the original sender within the organization.
01:23: Thanks for watching the video.
For relevant information, see Smart Banners.
00:00: Smart Banners allows you to add customized banners to non-malicious emails with
00:04: sensitive information.
00:05: These banners alert the user depending on the nature of the email and promote
00:10: compliance with your organization's policy.
00:12: This video shows how to enable Smart Banners in Email Security.
00:17: Log in to the Check Point Portal. Access the Email Security Administrator Portal
00:22: and click "Policy".
00:24: Select the email service for which you need to enable Smart Banners. For example, "Office three sixty five Mail".
00:32: Create a new Threat Detection policy or open the existing policy.
00:37: Set the policy mode as "Prevent (Inline)".
00:41: Scroll down to the "Clean Emails" section and select "Deliver with Smart Banners" for "Clean Workflow"
00:47: Click "Save and Apply". Now that you have enabled Smart Banners, you must select the banners required for your organization.
00:55: To do that, navigate to "User Interaction" and then click "Smart Banners".
01:00: Select the banners required for your organization.
01:04: To change the default text used in the banner, click the edit icon and make the required changes.
01:10: Select a severity for the banner.
01:13: Finally, click "Save and Apply".
01:16: Thanks for watching the video.
For relevant information, see End-User Daily Quarantine Report (Digest).
00:05: This tutorial demonstrates, how to configure the daily quarantine report digest
00:09: for end-users and explains the end user experience when the administrator
00:14: configures to send an email report for quarantined junk and spam
00:18: emails from the past 24 hours.
00:21: Log in to the Check Point Portal and access the Email Security Administration Portal.
00:26: From the left navigation panel, go to security settings and in the user
00:30: interaction section, click quarantine
00:34: You can send a daily quarantine report to end users to do that.
00:38: Go to the end user, quarantine report digest section and enable
00:42: the send daily quarantine report to end users toggle button.
00:46: To configure the required Time and Time Zone to send the daily quarantine report,
00:50: go to the scheduling section and select the desired options to
00:55: send the report multiple times a day. Click plus add more if required.
00:59: You can configure the report to be sent every hour up to 24
01:03: times per day
01:05: You can select the users to send the daily quarantine report to do that.
01:09: Go to the recipient section and select the required options to
01:13: send the report to all Office 365 and Google users in your organization
01:17: select all Office 365 and Google users.
01:38: To stop sending alerts for individual quarantined emails for Office 365
01:43: users, select the Office 365 users.
01:46: Stop alerts on individual. Quarantined emails recommended To
01:51: stop. Sending alerts for individual. Quarantined emails for Google users,
01:55: select the Google users.
01:57: Stop alerts on individual. Quarantined emails.
02:00: Recommended
02:02: You can configure the required sender. Email address for the daily quarantine
02:06: report to do that. Go to the sender section and select the required
02:10: options.
02:12: To configure the daily quarantine report content.
02:14: For end users, go to the content section and select the desired options
02:19: to include spam emails sent to the junk folder in the report.
02:22: Select the include spam emails that are sent to the junk folder checkbox.
02:27: To allow and users to generate a new quarantine report.
02:30: For the last 24 hours, select the allow end users to generate
02:35: a quarantine report on demand checkbox.
02:38: You can customize the subject and the body of the daily quarantine report email
02:42: as required in the email subject and body section.
02:57: To specify the actions end users can perform on emails, quarantined
03:01: by Microsoft select the supported actions in the end user permitted
03:05: action section.
03:07: To include block listed emails in the daily.
03:09: Quarantine report select the include block listed emails checkbox
03:13: in the block listed emails section.
03:16: Click save and apply.
03:18: When the administrator configures, the daily quarantine report for end users,
03:22: they receive a detailed report containing information about emails sent
03:26: to them and quarantined as junk or spam in the last 24 hours.
03:31: To generate a new quarantine report of the last 24 hours, the end
03:35: user must scroll down to the end of the report and click the link provided in
03:39: the email.
03:47: Email Security will send a verification code to your email. Copy the code from the
03:52: email notification.
03:54: Enter the code and click submit to authenticate once authenticated,
03:58: Harmony email and collaboration stores a cookie in your browser, which
04:03: remains valid for 30 days, or until deleted whichever occurs
04:07: earlier, during this period, you won't need to authenticate again, when using
04:11: the same browser,
04:13: The system displays the request confirmation message and the end user
04:17: receives a new report for the last 24 hours.
For relevant information, see Security Awareness Training.
00:04: The Security Awareness Training feature in Email Security helps organizations
00:09: create awareness among employees on essential security skills.
00:13: The Security Awareness Training is supported only for Microsoft 365 cloud mailboxes.
00:21: To configure the policy for Security Awareness training, access the Email Security
00:26: Administration Portal.
00:28: From the left navigation panel, go to security training, and then click
00:32: policy.
00:33: To configure a security awareness, training policy, click create
00:37: new policy, ru
00:39: In the rule name field, enter a name from the rule state list, select running.
00:44: In the users and groups section select, the users to apply the policy
00:48: to apply the policy to all users and groups in your organization.
00:52: Select all Office 365 users.
00:56: To apply the policy to specific users or groups select the required
01:00: users and groups and then click add to selected.
01:04: To view the phishing, simulation templates, that will be sent to the users.
01:08: Click phishing simulation. This opens, a new web page
01:12: and shows the phishing simulation templates that are available.
01:16: From phishing, simulation strategy, select the strategy for users
01:20: with phishing simulation emails, that reflect recent attack types
01:24: detected in your organization to avoid sending phishing, simulation
01:28: emails to users select,
01:31: From the new user training schedule list select the training procedure for newly-joined
01:35: users.
01:37: From the training modules list, select the training modules, you want to apply to
01:41: view the preview of a training module, click the preview icon next to the
01:45: module name. The system opens, a new web page and shows the contents
01:49: of the training module.
01:51: To configure settings for the training and reminders for the email notifications,
01:55: click advanced settings.
01:57: In the training, reminder interval field.
01:59: Enter the number of days after which the system sends a reminder.
02:03: For example, if you enter three the system, sends a
02:07: reminder, after every three days until the training is completed,
02:11: In the simulation Max frequency field, enter the number of days after
02:15: which the system sends a simulation email.
02:18: In the training Max frequency field, enter the number of days after
02:22: which the system initiates, a new training session.
02:25: Customize, the email notifications for the training and reminders and then click
02:29: save.
02:30: Click save to save the changes to the policy.
02:33: Now that you have configured the policy, the system sends phishing
02:37: simulation, emails, training, invitations and reminder emails at 7
02:42: a.m. coordinated universal time.
02:44: By default, the training module interface and phishing simulation web pages
02:48: show Check
02:49: Point branding. You can customize the Email Security administration portal to
02:54: reflect your organization's branding.
02:56: To do that,
02:56: click "Configuration".
02:59: In The Branding of user interaction section Select Auto brand pages, with
03:03: AI for my domain. You can also use checkpoint branding, which is
03:07: selected by default finally click save.
For relevant information, see Appendix L: Outlook Add-In.
00:03: This tutorial demonstrates how to configure the Outlook Add-in in the Email Security
00:07: Administrator portal.
00:10: Log in to Check Point Portal and access the Email Security Administration Portal.
00:16: From the left navigation panel, click User Interaction and then click Misdirected Emails. The portal shows all the supported on-screen warnings for misdirected emails.
00:27: To configure the Outlook Add-in, click Add-In Configuration.
00:31: The "Outlook Add-In Configuration" pop-up appears. In the Add-In name field, enter a name for the add-in. This appears as the name of the add-in in the Outlook application. To use the default name of the add-in, click "Default Label".
00:44: In the "Select Outlook version" section, select your Outlook version.
00:49: To enable on-screen warnings before sending an email, when a misdirected recipient is detected select the misdirected. Recipients checkbox.
00:57: To show checkpoint branding in the warning dialogue. Enable the display powered by checkpoint, toggle to allow users to bypass the warning if needed enable, the allow and users to ignore warnings tog.
01:10: To add a "Report Phishing" button to the Outlook ribbon, select the "Report Phishing" checkbox. In the "Label Name" field, enter a name for the button. This appears as the name of the button in the Outlook application.
01:23: To add a button that opens the End User Portal directly from Outlook, select the Email security portal checkbox. It allows users to manage quarantined emails and restore requests without re-authentication.
01:36: Now, that the add-in configuration is complete, you must download these configuration settings XML file and upload it to Microsoft 365 Admin Center. To do that, click "Save and Download .xml" and then upload the xml file to the Microsoft 365 Admin Center to deploy the add-in.
01:55: Select the notifications that you want the users to be alerted about.
01:59: When the maximum number of alerts is reached, based on the prioritized list, the system displays only the highest priority alerts to users. To configure this setting, select the required number from the "Max alerts shown to end users" dropdown and click "Save Changes".
02:15: Once the Outlook add-in is deployed, it performs real-time checks with the user actions such as Send, Reply, Reply All, and Forward. When a potential risk is detected, the system displays an on-screen warning to the user before the email is sent.
02:30: Thank You for Watching.
For relevant information, see User Interaction Dashboard
00:00:
00:05: This video explains the options available to administrators under
00:09: user interaction.
00:11: To view the user interaction, log in to Check Point Portal and access the
00:16: Email Security Administration Portal.
00:18: Click user interaction. A drop-down appears showing various options.
00:23: To view the user. Interaction dashboard, click dashboard, the dashboard provides,
00:28: an overview of the most common day-to-day tasks such as quarantine restore
00:32: requests and phishing emails, reported by end users.
00:35: By default the dashboard shows analytics for the last day to view
00:39: analytics for extended time periods, select a time frame from the top of
00:43: the dashboard.
00:44: If you have purchased incident response as a service add-on, you can click activate
00:49: incident response as a service and the dashboard will show the workings
00:53: of the incident response team.
00:55: The fishing reports, widget shows the number of phishing emails, reported by end
01:00: users along with their statuses
01:02: The quarantine restore requests widget shows the number of quarantine restore
01:06: requests received from the end users,
01:09: The top users, widget shows the list of top requesting or reporting users
01:13: in your organization.
01:15: The SLA Trend, widget shows the SLA trend line for the amount of time.
01:19: It took for the help desk to handle requests or reports on a daily basis.
01:24: The user Trend, widget shows the trend line of different requests or reports and
01:28: how they are handled.
01:30: To view quarantined emails and cleaned attachments, click restore requests.
01:35: This page displays all the end user requests to restore the quarantined and
01:39: cleaned emails.
01:40: The quarantined emails tab shows details of all the end user restore
01:44: requests for quarantined emails if Allowed by your policies.
01:48: The default view displays. All pending requests that haven't been addressed yet from the
01:52: state list. You can filter to view requests that are restored declined or see
01:56: all requests combined.
01:58: The clean detachments tab shows all emails with cleaned, attachments, also known
02:02: as the threat extraction. Here, you'll find a list of all pending requests for
02:06: original attachments. If end, users are allowed to request Restore for cleaned
02:11: emails.
02:13: To view all fishing reports submitted by the end users.
02:16: Click fishing reports. Note that reports will only appear here
02:20: if phishing emails are sent to a scoped mailbox or through the Office 365,
02:25: phishing reporting system.
02:27: If you want to customize your workflows and settings for fishing reports, click settings.
02:32: You can also configure notifications for phishing, simulation, emails
02:37: and sender addresses here. Once done click save.
02:41: To view all the quarantined items per protected.
02:44: Application click quarantine items
02:46: To view the quarantined items for a specific application, click here and
02:50: then select the application.
02:52: To restore an email, select the email and click restore.
02:56: To restore multiple emails at a time.
02:58: Select the emails and then click restore.
03:01: In the confirmation pop-up that appears click, okay.
03:05: To investigate an email, click the email subject line, the email profile
03:10: page appears and you can take necessary actions.
03:13: To change the quarantine settings. Click settings.
03:17: Make the required changes and click save.
03:20: To view emails with attachments where the links and Active Components were removed.
03:24: Click modified attachments.
03:28: To send the original email, click the more icon for the email from the last
03:32: column of the request table, select send original and then click
03:36: okay.
03:37: Smart Banners are contextual warnings applied to inbound emails to alert,
03:41: end users to view the available banners, click smart banners, From
03:46: the smart banners page, you can enable or disable specific banners
03:50: and settings for managing smart banners.
03:53: To customize smart, banners, click settings,
03:56: Select your preferred options for new smart banners and create exceptions for specific
04:00: domains and then click okay.
04:03: Thank you for watching the video.
For relevant information, see Requesting a Restore from Quarantine - End-User Experience.
00:03: This tutorial explains the user experience when your organization's
00:07: policy is set to quarantine phishing emails, send notifications
00:11: and allow you to request their restoration.
00:14: When a phishing email is detected, the system quarantines it and sends
00:19: a notification about the quarantined email If you think the email
00:23: is legitimate, you can click the link in the email notification to
00:27: request to restore the email.
00:29: On the User Verification page, enter your organization's email address and click
00:34: Submit. Email Security will send a verification code to your email.
00:39: Enter the code and click Submit to authenticate.
00:42: Once authenticated, Email security stores a cookie in your browser, which remains
00:47: valid for 30 days or until deleted, whichever occurs earlier. During this period,
00:52: you won’t need to authenticate again when using the same browser.
00:57: In the male recover pop-up that appears enter the reason for the request
01:01: to restore the email from quarantine and click submit.
01:04: The system displays the request confirmation.
01:06: If the administrator approves the request, the system, removes the notification,
01:11: email from your mailbox and delivers the restored, email as a new
01:15: email. If the restore request is approved for a quarantined
01:19: email sent to a group with multiple users, The system, removes
01:23: the notification emails from all group members mailboxes and delivers the restored,
01:28: email as a new message.
01:29: The email received time is the restore time of the email by the administrator,
01:33: not the original email sent.
01:36: If the administrator declines the request, you will receive an email with
01:40: the reason for declining the request.
01:42: Thank you for watching the video.
For relevant information, see Data Loss Prevention (DLP) Policy.
00:03: This tutorial guides you through how to respond to Misdirected Email warnings in the Outlook application.
00:09: Open the Outlook application, enter the required recipient details and email content, and click Send to send the email.
00:16: If an administrator has configured Misdirected Email notifications in the Outlook Add-In, it performs real-time checks when you click Send, Reply, Reply All, or Forward.
00:27: If a potential risk is detected, such as a mistyped recipient address or lookalike domains, the system displays an on-screen warning before the email is sent.
00:36: When the warning Banner appears click review issues to view the details of the detected risk.
00:42: If the entered information is correct, click, send any way to send the email.
00:47: To review and apply suggested corrections to the email details shown in the alert.
00:51: Examine the email details displayed in the alert. If the suggested correction is correct, select Replace and Verified to apply the change.
01:00: Once the correction is applied and reflected in the recipient field, click Send to successfully deliver the email.
01:07: Thanks for watching the video.
For relevant information, see Check Point Report Phishing Button.
00:03: This guide explains how to report phishing emails from Outlook.
00:07: Once you're in your inbox, if you encounter a suspicious email that you believe might
00:11: be phishing, find the report message icon or click the ellipses
00:15: icon and locate the report option in the menu.
00:18: If you're using the Outlook mobile app on iOS or Android tap the
00:22: ellipses icon at the very top of the message view, do not click on any
00:26: links or download any attachments from the email.
00:28: If you believe the message is fraudulent reported as phishing if
00:33: the message is just unwanted marketing or bulk mail reported as junk
00:37: Outlook may prompt you to confirm your submission.
00:39: Select report and block or okay, this submission
00:43: will report the email to your organization's Microsoft and checkpoint email
00:47: security administrators.
00:49: That's it. You've successfully reported a phishing email.
00:52: Depending on your organization settings,
00:54: you may receive an automated follow-up mail regarding your submission.
00:59: Thank you for watching the video.
For relevant information, see End-User Portal (Email Security Portal).
00:03: This tutorial guides you through how to access the Email Security Portal from Outlook
00:08: Open the Outlook application and locate the checkpoint email security portal in the add-ins.
00:14: If an administrator has enabled, the email security portal option in the Outlook, add in the Outlook application, displays the ad in name, as configured by the administrator, allowing secure access without reauthentication
00:27: Click, email security, portal to proceed.
00:29: The email security portal opens in a left side panel within Outlook.
00:34: From here, you can review and manage portal features.
00:37: To expand your view, click pop out.
00:40: The portal will open in a new window for easier, navigation and full screen access.