1. Home
  2. Docs
  3. Inbound Shield™
  4. Configuration & Customization
  5. Introduction

Introduction

This document we will go over the different ways in which the Trustifi admins can configure Inbound Shield™ to work in a way that’s optimal for your organization.

Please read the following section of the document to see how Trustifi allows control over how threats are handled, handling reviewer permissions, customizing inbound rules, scheduling notifications, and many more.

How can we help?