1. Home
  2. Docs
  3. Inbound Shield™
  4. Threat Response
  5. Performing the Threat Response process

Performing the Threat Response process

Step 1 – Selecting mailboxes and choosing the “Threat Response” action

To start, you will need to navigate to the “Mailbox Management” page and select which mailboxes you wish to perform the process for.

You have a choice of doing each of the following:

To run Threat Response on a single mailbox, simply click on the “Actions” menu next to it and select “Threat Response”To run Threat Response on multiple mailboxes, first select the mailboxes by clicking on the checkbox next to them. Then, click on the “Actions for X items” button and select “Threat Response”To run Threat Response on all mailboxes, first select all mailboxes by clicking on the “Select all” check box (top left). Then, click on the “Actions for X items” button and select “Threat Response”
Selecting the "Threat Response" action

Step 2 – Selecting an action and a result in the Threat Response wizard

You will now be presented with the Threat Response wizard window, which will guide you through the steps to complete the process.

In the first window, you will need to select an action (what you want to look for/scan) and a result (what you want to do with emails that match your search). You will also choose how many emails will be scanned from each mailbox.

Selecting the action and result

In the “Action” list you can choose from the following:

Rescan: performs a general scan to find all types of threats and spam.For this action you will not need to select a result, since the results are pre-determined by your existing threat prevention rules (which can be found under the “Inbound Shield” tab) and your black/white lists (which can be found under the “Configuration” tab)Search links: this will look for any specific URL(s) you provide. If found, the selected result will be applied to the emailSearch files: this will look for any specific file(s) you provide. If found, the selected result will be applied to the emailNote: this action requires uploading the file itself. If you do not have the file and wish to search by file name only, please use “Search keywords”Search sender: this will look for emails sent from specific senders. If found, the selected result will be applied to the emailSearch headers: this will look for emails containing specific headers (key and value). If found, the select result will be applied to the emailSearch keywords: this will look for emails containing specific keywords or phrases (in the body, subject and in attachment names). If found, the selected result will be applied to the email

 

In the “Result” list you can choose from the following:

Archive email: the email will be moved into the “Archive” folder.Delete email: the email will be permanently deleted.Review: the email content will only be displayed for your review.

 

Once you’ve selected an action(1), a result(2) and how many emails should be scanned in each mailbox(3), you can click on the “Next” to proceed.

Information! In each mailbox, emails will be scanned chronologically from latest to oldest and for each mailbox up to 1000 emails can be scanned.

Step 3 – Configuring the data

In this window, you will add the specific links, files, sender emails, headers, or keywords you want to search for.

For each of these, you can either enter the values manually or upload a csv file containing a list of values.

Configuring the data for Threat Response

Once you are ready to continue, click on the “Next” button.

Information! If you chose the “Rescan” action, this step will be skipped.

Step 4 – Summary

In this step you will be presented with a summary of the process, so that you may review the details before the process begins. If you wish to change any of the previous configurations, simply click on the “Back” button.

This process can take some time, depends on your choices, to receive a notification once the process is completed, click on the toggle that reads “Notify me by email when operation is finished”.

To begin the scan process, click on the “Apply” button.

Viewing the summary

Step 5 – Viewing results

Once the process was finished, you can navigate to the “Audit Log” tab under “Inbound Management” to view the results.

Finding the Threat Response results in the audit log

When you click on the Threat Response log, a new window will open which will show you a detailed list of:

Which mailboxes the Threat Response process was performed onWhich action and result were configured How many emails matched the search criteriaHow many matches were found for each link/file/keyword/header/sender
Threat Response results window

How can we help?