Written By Marissa Fegan (Super Administrator)
VIPRE Integrated Email Security (IES) is a cutting-edge cloud email security solution designed to protect organizations from modern email threats and seamlessly enhance Microsoft 365 environments. Leveraging AI-driven threat detection and non-disruptive API integration, VIPRE IES provides comprehensive, real-time protection for both external and internal emails. This robust solution effectively combats sophisticated attacks like Business Email Compromise (BEC) and social engineering, ensuring your organization remains secure.
Step 2: Set up Action Rules
VIPRE Integrated Email Security (IES)'s Action Rules under the Settings menu allow you to enable powerful and customizable rules for your email.
The Anatomy of an Action Rule
Before we discuss how to configure an action rule, let's first examine its different parts.
| Action Rule |
An action rule has multiple parts including:
|
| Rule Expression |
A rule expression is created within the greater action rule, giving specific instructions for the action rule to follow |
| Action |
An action tells the action rule what to do with the emails that it finds based on the rule expression |
In the example shown in the screenshot below, you can see what makes up the body of a VIPRE IES Action Rule.
- Name of the action rule
- Description of the action rule
- Rule Expression: any(analysis.detections, .engine == "Vipre Spam" && .severity != "CRITICAL") This shows that this particular action applies to emails that are detected by the VIPRE AntiSpam engine with a Critical severity
- Actions: Quarantine, Notify Recipient
- Option to stop evaluating other action rules on match is checked
- Option to enable this action rule is checked
- Edit: Make changes to your action rule
- Trash: Delete your action rule
Default Action Rule
There is one action rule included in VIPRE IES by default.
- Quarantine Malicious Email: This action rule includes a rule expression that will quarantine all emails that are deemed to be malicious and will send an email notification to the end-user or recipient of the email; applies to Inline Mode only
To verify that the existing action rule will meet the needs of your organization:
- From within the VIPRE IES web console, navigate to Settings > Action Rules
- On the Action Rules screen, you'll see the Quarantine Malicious Email action rule; using the example above as a reference guide, determine if this existing rule meets the needs or your organization
Does the existing default action rule meet the needs of your organization?
Next: Yes, the default action rule meet our needs as-is. No changes are needed.
Help: No, the default action rule won't work for us. We'll need to create new action rules.
Carlos Rios
Comments