Email Gateway Defense provides customers with a default configuration as a starting point. While this configuration will block a majority of unwanted emails, it is important to make changes to other filters to get the best protection possible.
The table below illustrates the different Inbound settings found within Email Gateway Defense.
Use the table to adjust the default configurations according to your preference.
For a more detailed understanding of the Email Gateway Defense capabilities, download the Email Gateway Defense Best Practices Guide.
Setting | Default | Relaxed | Strict |
---|---|---|---|
Anti-Fraud Intelligence | Block | Quarantine | Block |
BRBL | Block | Quarantine | Block |
BRTS | Block | Quarantine | Block |
Bulk Mail | Off | Quarantine | Block |
Content Intent | Block | Quarantine | Block |
DKIM | Off | Quarantine | Block |
DMARC | Yes | Yes | Yes |
Email Cat: Corporate | Allow | Allow | Quarantine |
Email Cat: Mailing List | Off | Quarantine | Block |
Email Cat: Marketing | Off | Quarantine | Block |
Email Cat: Social Media | Allow | Quarantine | Block |
Email Cat: Transactional | Allow | Allow | Quarantine |
Enable ATP | Scan First, Then Deliver | Scan First, Then Deliver | Scan First, Then Deliver |
Intent Analysis | Block | Quarantine | Block |
Link Protection | On | On | On |
No PTR Record | Yes | Yes | Yes |
No SPF Record | Off | Quarantine | Block |
Password Protected Archive | Block | Block | Block |
Password Protected MS Office | Ignore | Quarantine | Block |
Password Protected PDF | Ignore | Quarantine | Block |
Spam: Block | 5 | 5 | 4 |
Spam: Quarantine | 0 (off) | 4 | 3 |
SPF - Hard Fail | Block | Block | Block |
SPF - Soft Fail | Off | Quarantine | Block |
Typosquatting Protection | On | On | On |