Upload
mithi-skyconnect
View
24
Download
0
Embed Size (px)
Citation preview
Are you using Mail Policies effectively to secure your mail setup?
www.mithi.com
How Underutilization of Mail Security Policies Can Affect You!!!
• There have been instances in corporate world where a disgruntled ex-employee had sent a
malicious email to all the top management people before leaving an organization and the
question has always remained…
• ..How was such a mail allowed to be sent to the entire top management group??
• Unfortunately, sometimes even in a robust security framework (including mail policies), security
framework for mail flow control stays underutilized.
• But best part is that such situations and more can be prevented before they occur with effective
use of mail security policies.
The Effective Use Of Mail Security Policies Can Actually Help To…
Secure the flow of information to/from the organization and to/from
groups of people
Control usage of email for functional
groups or departments in the
organization
Optimization of Mail traffic which help in
reducing the resource consumption
Improve efficiency since it allows
automate corporate mail usage policies
www.mithi.com
Access Control: Possible With Mail Security Policies In Mithi Connect XF.
Block the set of users from using the web
client (http).
Block the set of users from using IMAP.
Allow web access (http) to the set of users, only
from the IP ranges (clients).
Allow POP use to the set of users, only from within the
organization.
Access Control
www.mithi.com
Allow only POPS access to all users.
Allow both POPS and POP access to all users (optional).
Force HTTPS for all web client access by all users.
Secure Access: Possible With Mail Security Policies In Mithi Connect XF.
www.mithi.com
Block all mail meant for remote domains. This means, allow only local mailing.
Block a user or a group of users from sending attachments.
Block mail with certain attachment types from being sent or received.
Allow only pdf files as attachments in mail meant for a certain group of users.
Policies
Controlled Mail Flow: Possible With Mail Security Policies In Mithi Connect XF.
www.mithi.com
How Do You Put These To Use?
- Divide the users into functional groups, and decide what that group of users should be allowed/ disallowed.
- Review this policy documentagainst your corporate securitypolicies.
- Configure the mail system todeliver on these requirements.
www.mithi.com
Image Credits…
• http://file.answcdn.com/answ-cld/image/upload/w_688,h_298,c_fill,g_face:center,q_60,f_jpg/v1/tk/view/getty/email/e0413cd8/130876371.jpg
• http://tapnet.com/blog/wp-content/uploads/2014/05/t-are-the-Best-Email-Security-Tips-300x196.jpg
• http://www.servernoobs.com/wp-content/uploads/2014/04/email.jpg
• https://buydatamotion.com/sites/default/files/icon4.jpg
• https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcRdm4DRHNVK3VNqGgETWkCIWzED6iiTn_PT1uy37RzsVb5yrCUh
www.mithi.com