Print Download Complete help as Archive Send Feedback

Previous

Next

Threat Extraction - Configure Mail Signatures

What can I do here?

Use this window to configure mail signatures for Threat Extraction.

Getting Here

Getting Here - Manage & Settings > Blades > Threat Prevention > Advanced Settings > Threat Prevention Engine Settings window > Threat Extraction > Configure Mail Signatures

Configuring Mail Signatures

To configure mail signatures:

  1. In the Threat Prevention Engine Settings window > Threat Extraction, click Configure Mail Signatures.

    The Threat Extraction Mail Signatures window opens.

    Use this window to configure text for:

    • Mail signatures for attachments with potential threats extracted

      The first signature is always attached to an email that had threats extracted.

      The second signature is added to the first if the email recipient has access to the original file.

    • Mail signatures for unmodified attachments

      You can insert predefined field codes into the signature text, such as:

      • A link to the file before it was modified by the blade.

      The link opens the UserCheck Portal. The portal shows a list of attachments the recipient can download.

      • Reference ID.

      Use this ID to send the file to the recipient. You can also find the ID in the logs.

      On the gateway, run the command: scrub send_orig_email.

  2. Click OK.