Home email Email Threat Scan

Email Threat Scan

81
0
How To Scan And Attach To Email?

Email Threat Scan

You’ll be asked to link Office 365 to ETS when you sign up for a scan. A Microsoft web page will prompt you through this procedure.

  • You must give permission for ETS to use your data.
  • gain access to your account
  • The cloud-based service will ask for your consent once you’ve given it.
  • The scan will run in the background and will not interrupt your work. in any way tamper with your account

What information is available to the Email Threat Scanner?

• Your Office 365 credentials are never shared with ETS.
• To authenticate with Office 365, ETS employs the standard OAuth protocol.

• ETS only has access to the information it requires to identify and address cybersecurity concerns.

Emails and attachments are not kept indefinitely and are deleted as soon as they are received.

systems as soon as the analysis is finished – usually in a fraction of a second.

• ETS will extract information about users, mail folders, and emails, and will only save data that is relevant to any of them.

threats discovered solely to display the facts in your threat report

  • When you sign up for a scan, you will be asked to provide some information about yourself.
  • It was requested that Office 365 be connected to ETS. During this time
  • During this procedure, a Microsoft online page will ask you a series of questions.
  • You must give permission for ETS to use your data.
  • gain access to your account
  • The cloud-based service will ask for your consent once you’ve given it.
  • The scan will run in the background and will not interrupt your work.

in any way tamper with your account

How Do We Keep Your Information Safe? Confidentiality

• Emails and attachments will only be accessed by ETS for the sole purpose of identifying threats in your account. Information about threats

This information will only be used to create your tailored threat report and will not be shared with anyone else.

Threat analysis is carried out on secure servers housed by Amazon Web Services and Barracuda’s data centers.

All storage systems are encrypted, and all servers are closely monitored and audited to ensure that they meet high-security requirements.

• No humans are engaged in the process, and your data is not accessible to them. In the unlikely event that troubleshooting or maintenance is required,

If work is required, only a small number of Barracuda engineers will be given access to the data required.

• More information about our policies and policies can be found on our Privacy Policy page.

What is the purpose of ETS requesting write access to my mailboxes?

  • We require to write access because ETS allows consumers to mitigate threats: ETS will notify you once you have received your report.

With a single click, you can remove threats from your account.

• ETS will not make any modifications to your account unless you specifically request them through the ETS UI. Changes to Office 365 are called operations.

clearly marked, and user confirmation is required.

What is the purpose of ETS requesting site collection permissions?

We’re requesting site collection rights because we’re working on threat scanning features for Sharepoint that will be available soon.

Barracuda Networks, Inc. • 3175 S. Winchester Blvd., Campbell, CA 95008 • 408-342-5400/888-268-4772 (US & Canada) • barracuda.com Copyright 2016-2017 Barracuda Networks, Inc.

In the United States, Barracuda Networks and the Barracuda Networks logo are registered trademarks of Barracuda Networks, Inc. All other names are trademarks or registered trademarks of their respective owners.

LEAVE A REPLY

Please enter your comment!
Please enter your name here