Print Download Documentation Send Feedback

Previous

Next

Threat Extraction Inclusions

What can I do here?

Use this window to include email senders or recipients in the Threat Extraction scan.

Getting Here

Getting Here - Security Policies > Threat Prevention > Policy > Threat Tools > Profiles > Profile > Edit > Threat Extraction > Exclude/Include Users > Scan email only for specific users or groups > Configure.

Threat Extraction Inclusions

For more see Exclude/Include Users.