{"id":31981,"date":"2018-01-04T10:17:09","date_gmt":"2018-01-04T14:17:09","guid":{"rendered":"https:\/\/www.retarus.com\/us\/glossary\/"},"modified":"2024-04-25T08:55:36","modified_gmt":"2024-04-25T12:55:36","slug":"glossary","status":"publish","type":"page","link":"https:\/\/www.retarus.com\/us\/glossary\/","title":{"rendered":"Glossary"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"
Retarus GlossaryEmail Security ReportAttachment-Type
\t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> For your protection, the message was moved to quarantine. Never reply to the email in question. When in doubt, contact the indicated sender by phone to verify the contents of the message.<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> Criminals use phishing links to access confidential data such as passwords or to spread malware. Phishing emails and the website links within them, are often created by scammers to look very much like the original (e.g. messages from banks, telecommunication providers, authorities, email servers, or online shops), down to the very last detail.<\/p>\n Never click on the links in such emails, even if they appear to be legitimate. Never, under any circumstances, reply to these emails and never disclose any personal data, even if requested.<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> Your administrator can define the \u201csensitivity\u201d of the spam identification feature. However, people have different perceptions and definitions of when an email should be categorized as spam. Users can use blocklists and allowlists to make personal email quarantine settings, block specific email senders, or remove them from the spam filter.<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span> \t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nBlocklist\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nCustom Rule\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nCxO Fraud\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nDKIM\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nDMARC\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nMessage Size\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nNDR Spam\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nNewsletter\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nPhishing\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nSandboxing\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nSpam\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nSPF\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\nVirus\n
\n\t\t\t\t<\/p>\n
\n\t\t\t\t\t<\/span><\/span><\/span>
\n\t\t\t\t<\/span>\n\t\t\t<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n* : 1 = lowest, 5 = highest<\/p>\n","protected":false},"author":3,"featured_media":37477,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"[loop type=glossary category=security orderby=name]\r\n[field title]<\/h4>\r\n[field excerpt]\r\n[\/loop]","_et_gb_content_width":"","footnotes":""},"dipi_cpt_category":[],"class_list":["post-31981","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"\n