What can I do here?
Use this window to configure mail signatures for Threat Extraction.
Getting Here - Manage & Settings > Blades > Threat Prevention > Advanced Settings > Threat Prevention Engine Settings window > Threat Extraction > Configure Mail Signatures |
To configure mail signatures:
The Threat Extraction Mail Signatures window opens.
Use this window to configure text for:
The first signature is always attached to an email that had threats extracted.
The second signature is added to the first if the email recipient has access to the original file.
You can insert predefined field codes into the signature text, such as:
The link opens the UserCheck Portal. The portal shows a list of attachments the recipient can download.
Use this ID to send the file to the recipient. You can also find the ID in the logs.
On the gateway, run the command: scrub send_orig_email
.