Manage Email Files

Use this operation to manage email file allowances and blocks within Defender for Email.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Security

Handbook Reference

Package: Email Security

Domain: TBD

Modifies: TBD

2024-12-17_9-49-52

When to Perform this Operation

As Needed: Proactive or in Response to User/Security

Technical Description and Importance

Managing sanctioned and unsanctioned email files ensures that email file handling policies align with organizational needs and reduce the risk of malicious file distribution. Allowing files as needed facilitates business continuity, while blocking files limits the potential spread of harmful content. Routine updates to email file policies minimize operational disruptions and enhance protection against emerging threats. This process supports both operational requirements and helps maintain a proactive posture against potential vulnerabilities.

Management Options

2024-12-17_10-15-21

Allow a File:

Purpose
Permit a specific email file type or attachment by adding it to the sanctioned files list.
Use Case
A legitimate business file attachment flagged as unsafe needs to be allowed to ensure the recipient can access critical content.

Block a File:

Purpose
Restrict a specific email file type or attachment by adding it to the unsanctioned files list.
Use Case
A suspicious or malicious file type is identified and must be blocked to prevent further exposure.

2024-12-17_10-15-21-1

Operation Action Target
Allow a File Addition

Sanctioned Email Files

Block a File Removal Unsanctioned Emai Files 

Allow a File

This operation enables a flagged email file to be added to the sanctioned files list, allowing its distribution within the organization.

       1. Defender for Email File Submit and Allow Action

Block a File

This operation restricts a file by adding it to the unsanctioned files list, preventing its distribution within the organization.

       1. Defender for Email File Block

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.