Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.

Page created by Crystal Santiago
 
CONTINUE READING
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Cisco Secure
Email Cloud Mailbox User Guide

             Cisco Systems, Inc.   www.cisco.com
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
2
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Contents
  Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

  Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

  Set Up Your Business. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
           Import Your Domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

  Policy Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
           Policy Settings with a Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
           Policy Settings for CES IMD Customers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

  Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
      Messages Page Icons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             17
      Retrospective Verdicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           17
          Retrospective Verdict Email Notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                     18
      Investigate Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           18
          Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     18
          Conversation (Beta) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            19
      Move and Reclassify Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                   20
          Audit Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       20
          Audit with Enforcement Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  20
              Delete Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             21
              About Hybrid Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                22
      Download Search Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              22
          Download History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           22

  Insights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
      Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   23
         About Timezones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             23
         Messages by Direction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .               24
         Malicious & Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            25
         Spam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      25
         Graymail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      25
      Impact Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      26

  Manage Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

                                            Cisco Systems, Inc.            www.cisco.com

                                                                     3
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
User Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .       29
    Create a New User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            29
    Edit a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      30
    Delete a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        30

Administration Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
    Account Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        31
    Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        31
       Notification Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .          31
       Audit Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        31
       Google Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .            31

User Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
    Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   33
    Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        33
       SecureX Ribbon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .             33
       Themes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .        33

SecureX Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
    SecureX Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .              35
       Authorize SecureX Dashboard for your Cloud Mailbox Business . . . . . . . . . . . . . . .                                         35
       Revoke SecureX Dashboard Authorization for your Cloud Mailbox Business . . . . . .                                                36
    SecureX Ribbon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .           36
       Authorize SecureX Ribbon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                  36
       Revoke SecureX Ribbon Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .                         37

Deactivate Cloud Mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
    Delete your Cloud Mailbox journal entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
    Delete the Cloud Mailbox application from Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Frequently Asked Questions (FAQ). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

                                                                        4
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Introduction
  Cisco Secure Email Cloud Mailbox (formerly Cloud Mailbox Defense (Cloud Mailbox)) is an integrated cloud-native
  security solution for Microsoft 365 that focuses on simple deployment, easy attack remediation, and superior visibility.

  A subset of Cloud Mailbox is available to Cisco CES customers as Internal Mailbox Defense (IMD). IMD allows CES
  customers to scan and remediate internal mail.

                                      Cisco Systems, Inc.      www.cisco.com

                                                          5
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Introduction

               6
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Requirements
  The following are required to successfully set up and use Cisco Secure Email Cloud Mailbox:

     You have purchased Cloud Mailbox and received a welcome email.

     The latest version of one of the following browsers:

      —   Google Chrome

      —   Microsoft Edge

      —   Mozilla Firefox

     A Microsoft 365 account with Global Admin rights.

     An email address in your Microsoft 365 environment capable of receiving undeliverable journal reports. The email
      address used will not be journaled; do not use an address you want Cloud Mailbox to analyze.

                                     Cisco Systems, Inc.         www.cisco.com

                                                             7
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Requirements

               8
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Set Up Your Business
  Complete the following steps to set up your Cloud Mailbox business. These steps assume you meet the Requirements,
  page 7.

   1. Follow the directions in the welcome email from Cisco to set up your account.

      Cloud Mailbox uses Cisco SecureX sign-on to manage user authentication. For information on SecureX sign-on, see
      https://cisco.com/go/securesignon. If you are an existing SecureX Threat Response, Cisco Secure Malware
      Analytics (formerly Threat Grid), or Cisco Secure Endpoint (formerly AMP) customer, be sure to sign in with your
      existing credentials. If you are not an existing user, you will be prompted to create a new SecureX sign-on account.

      You now have access to the Welcome to Cisco Cloud Mailbox Defense page.

   2. Select your Permission Mode.

      The Permission Mode defines the type of remediation policy you can apply. There are two Permission Mode options:

      —    Audit – Allows visibility only, no remediation. Read-only permissions will be requested from Microsoft 365.

      —    Audit with Enforcement – Allows visibility and on-demand or automated remediation (that is, move or delete
           suspect messages). Read/write permissions will be requested from Microsoft 365.

           Note: If you choose Audit with Enforcement, you will need to turn on Automated Remediation in your Policy
           Settings, page 13. To apply auto-remediation to all internal emails, ensure the Apply auto-remediation to
           domains not in the domain list toggle is set to On.

   3. Connect to Microsoft 365.

      a.   Click Connect to Microsoft 365.

      b.   Log in to your Microsoft 365 account, as prompted. This account must have Global Admin rights so you can set
           up journaling in Microsoft 365; the account will not be stored or used by Cloud Mailbox. For information on why
           these rights are needed, see Cisco Secure Email Cloud Mailbox FAQ: Why are Microsoft 365 Global Admin rights
           required to set up Cloud Mailbox?.

      c.   Click Accept to accept the permissions for the Cloud Mailbox app. You are redirected to the Cloud Mailbox setup
           page.

                                      Cisco Systems, Inc.      www.cisco.com

                                                          9
Cisco Secure Email Cloud Mailbox User Guide - Cisco Systems, Inc.
Set Up Your Business

       4. For users with a secure email gateway: Add a connector in Microsoft 365.

          To insure journals are sent directly from Microsoft 365 to Cloud Mailbox without needing to pass through the secure
          email gateway, we recommend adding an outbound connector in Microsoft 365. The connector needs to be added
          before you set up journaling.

          From the Microsoft 365 Exchange Admin Center, create a new connector by using the following settings in the Add
          a connector wizard:

          —    Connection from: Office 365

          —    Connection to: Partner organization

          —    Connector name: Outbound to Cisco Secure Email Cloud Mailbox (select the Turn it on check box)

          —    Use of connector: Only when email messages are sent to these domains (add mail.cmd.cisco.com)

          —    Routing: Use the MX record associated with the partner’s domain

          —    Security restrictions:

               •   Always use Transport Layer Security (TLS) to secure the connection (recommended)

               •   Issued by a trusted certificate authority (CA)

          —    Validation email: Your journal address from the Cloud Mailbox setup page

       5. Set up journaling in Microsoft 365.

          You must configure Microsoft 365 to send journals to Cloud Mailbox. To do this, you add a journal rule.

          Note: Data starts flowing to the Cloud Mailbox back end as soon as you set up your journal rule. The default Cloud
          Mailbox policy settings are applied. You will start seeing data in the console within 10-60 minutes of enabling the
          journal rule.

          Note: A minimal Cisco Secure Malware Analytics (formerly Threat Grid) account will be created and you will receive
          a welcome email from them. The new account is not linked to any existing Malware Analytics/Threat Grid account
          you may have. You do not need to take any action on the Malware Analytics/Threat Grid account to set up Cloud
          Mailbox.

          a.   Copy your journal address from the Cloud Mailbox setup page. If you need to repeat this process later, you can
               also find your journal address on the Administration page.

          b.   Go to your Microsoft 365 Admin Center https://admin.microsoft.com/AdminPortal/Home#/homepage.

               Note: These instructions assume you are using the Classic Exchange Admin Center.

          c.   Navigate to Admin centers > Exchange > compliance management > journal rules.

          d.   Add an Exchange recipient to the Send undeliverable journal reports to field. The email address used will not
               be journaled; do not use an address you want Cloud Mailbox to analyze. If you do not have a recipient you want
               to use for this purpose, you will need to create one.

          e.   Click the + button to create a new journal rule.

          f.   Paste the journal address you copied from the Cloud Mailbox setup page into the Send journal reports to field.

          g.   Enter Cisco Cloud Mailbox in the Name field.

          h.   Select Apply to All Messages from the If the message is sent to or received from drop-down.

          i.   Select the appropriate option from the Journal the following messages drop-down:

                                                                    10
Set Up Your Business

          —    If you are a Cloud Mailbox customer, select All messages.

          —    If you are a CES Internal Mailbox Defense (IMD) customer, select Internal messages only.

          j.   Click Save.

       6. Return to the Cloud Mailbox setup page. Click enable policy enforcement.

      Note: You will start seeing data in the console within 10-60 minutes of enabling the journal rule. During this caching delay
      from the time of tenant integration to the time of journaling being fully enabled, you may receive undeliverable message
      reports from Microsoft 365. These messages will stop once the system integration is complete.

      For information on reviewing or changing your policy settings, see Policy Settings, page 13. If you have chosen Audit
      with Enforcement mode, you should verify your Automated Remediation settings now. To apply automated remediation
      to all internal emails, insure Apply auto-remediation to domains not in the domain list is selected.

Import Your Domains
      Import your domains so you can apply automated remediation to specific domains.

       1. Navigate to Settings (gear icon) > Policy.

       2. Click the Update Imported Domains button to import your domains into Cloud Mailbox.

       3. Use the check box next to each domain to adjust the automated remediation setting for that domain.

       4. Click Save and Apply.

                                                               11
Set Up Your Business

                       12
Policy Settings
      The settings on the Settings (gear icon) > Policy page determine how mail is handled by Cisco Secure Email Cloud
      Mailbox. Default settings are applied when you Set Up Your Business, page 9. To change your settings, make the change
      and then click the Save and Apply button.

Table 1    Policy Settings

 Setting                 Description                  Options                                  Default
 Permission Mode         Defines the type of             Audit - Allows visibility only, no   Selected when you set up your
                         remediation policy you can       remediation. Read-only               business.
                         apply.                           permissions will be requested
                                                          from Microsoft 365.                  If you change the Permission
                                                                                               Mode, you will be redirected to
                                                          If you select Audit, you need        reset your Microsoft 365
                                                          only set the Attachment              permissions.
                                                          Analysis and Message                 You may also be directed to set
                                                          Analysis directions. Other           up your journaling; you can skip
                                                          policy settings are not              this step if you have already set
                                                          applicable.                          up journaling.

                                                         Audit with Enforcement -             Note: When you choose Audit
                                                          Allows visibility and                with Enforcement mode, you
                                                          on-demand or automated               should also verify your
                                                          remediation (that is, move or        Automated Remediation
                                                          delete suspect messages).            settings.
                                                          Read/write permissions will be
                                                          requested from Microsoft 365.
 Message Analysis        Direction of messages to        Incoming                             All
                         be dynamically analyzed.
                                                         Outgoing

                                                         Internal
 Attachment Analysis     Direction of mail               Incoming                             Incoming
                         attachments to be
                         analyzed by Cisco Secure        Outgoing
                         Malware Analytics
                         (formerly Cisco Threat          Internal
                         Grid).
 Remediation Actions     Remediation actions for         Move to Trash                             Malicious - Move to Trash
                         messages found to be
                         containing Malicious,           Move to Junk                              Phishing - Move to Trash
                         Phishing, Spam, or
                         Graymail content.               No Action                                 Spam - Move to Junk

                                                      Note: If the sender address belongs           Graymail - No Action
                                                      to a sender allow list in Exchange or
                                                      if the message has already been
                                                      remediated by Microsoft 365,
                                                      remediation actions are not applied.

                                         Cisco Systems, Inc.      www.cisco.com

                                                             13
Policy Settings

Table 1      Policy Settings

 Setting                   Description                   Options                               Default
 Automated Remediation
 Domain-specific           Applies automated             Checked or Unchecked                  Unchecked. When you turn on
 auto-remediation          remediation to a specific                                           Audit with Enforcement mode,
                           domain.                                                             select these check boxes to
                                                                                               apply auto-remediation to
                                                                                               specific domains.
 Apply                     Applies when a domain is      Checked or Unchecked                  Unchecked. When you turn on
 auto-remediation to       not explicitly listed. For                                          Audit with Enforcement mode,
 domains not in the        example, if a new domain                                            select this check box to ensure
 domain list above         has been added to your                                              auto-remediation is applied to
                           Microsoft 365 account but                                           all internal emails.
                           not imported into Cloud
                           Mailbox.

Policy Settings with a Gateway
       If you have a Cisco Email Security appliance or similar gateway in place, consider using the following policy settings.

       Table 2      Suggested Policy Settings with Gateway

          Setting Name                                                Recommended Selection
          Message Analysis                                            Outgoing and Internal
          Attachment Analysis                                         None
          Remediation Actions                                            Malicious - Move to Trash

                                                                         Phishing - Move to Trash

                                                                         Spam - Move to Junk

       We also recommend bypassing your appliance so journals are sent directly to Cloud Mailbox. Depending on your
       appliance, this may involve adding an allow rule with your Cloud Mailbox journal address.

Policy Settings for CES IMD Customers
       If you are a CES Internal Mailbox Defense (IMD) customer, your Policy settings are slightly different than they are for
       standard Cloud Mailbox customers:

           Message Analysis is set to Internal and is not shown on the Policy page.

           Attachment Analysis can be set to Enabled or Disabled. If you set this to Enabled, internal attachments are
            scanned.

           All other Policy settings are as described in the previous sections.

                                                                    14
Messages
 The Messages page shows your messages and search results and allows you to look for possible compromises. You can
 display up to 100 messages per page.

 Use the drop-down menu to show data for a defined time period (Last 24 hours, Last 7 days, Last 30 days), or set a
 specific Day, Week, or Custom time frame within the last 90 days.

 Use the search field to search for strings or indicators of interest, such as hashes or URLs.

 Use the Refine Search filter panel to refine your search. For example, you may want to see all mail sent from a specific
 sender, mail with a specific verdict, mail with attachments or links, or mail that has been moved to Junk.

  1. Click the arrow to expand the filter panel.

                                     Cisco Systems, Inc.       www.cisco.com

                                                         15
Messages

      2. Make your selections, then click Apply. Note that you must have at least one verdict selected.

     Use the Reset Filters button to reset the filters to their defaults.

                                                                   16
Messages

Messages Page Icons

Messages Page Icons
     The following table shows icons used on the Messages page and their meanings.

     Table 1     Messages Page Icons

       Icon         Name                          Description
                    Links                         Message contains link(s).

                    Attachments                   Message contains attachment(s).

                    Auto-remediated               Message was auto-remediated by
                                                  Cloud Mailbox.
                    Retrospective Verdict         A Retrospective Verdict was
                                                  applied. A Retrospective Verdict is
                                                  one that was applied after the
                                                  message was first scanned by
                                                  Cloud Mailbox.
                    MS Allow List                 Cloud Mailbox honored your
                                                  Microsoft 365 spam filter allow lists.
                    Neutral                       Message has been marked as
                                                  Neutral.
                    Spam                          Message has been marked as
                                                  Spam, either manually or through
                                                  auto-remediation.
                    Phishing                      Message has been marked as
                                                  Phishing, either manually or through
                                                  auto-remediation.
                    Malicious                     Message has been marked as
                                                  Malicious, either manually or
                                                  through auto-remediation.
                    Graymail                      Message has been marked as
                                                  Graymail. Graymail is mail that has
                                                  been determined to be marketing,
                                                  social, or junk.

Retrospective Verdicts
     A retrospective verdict is one that was applied to a message sometime after the message was first scanned by Cloud
     Mailbox.

     A retrospective verdict in Cloud Mailbox is slightly different that in other Cisco Security products. Although Cloud Mailbox
     is not an inline mail processor, it does have a fixed time range for completing its initial analysis of a message. Newer
     content engines that have longer analysis times, such as Talos’ Deep URL Analysis, are treated as a retrospective verdict.
     As the verdict is delayed, so is the remediation. Thus, Cloud Mailbox tags these convictions distinctly.

                                                                17
Messages

Investigate Messages

      Retrospective verdicts are indicated on the Messages page as shown here.

Retrospective Verdict Email Notifications
      To turn email notifications for retrospective verdicts on or off:

       1. Select Settings (gear icon) > Administration > Business.

       2. Under Notification Email Address, select or deselect Send Notifications for Retrospective Verdicts.

      Email notifications for retrospective verdicts are sent to the specified notification email address if the check box is
      selected. These notifications are turned on by default.

Investigate Messages
      To investigate a message within your Messages page search results, select the > icon to expand a message and see
      more details including Sender IP, Microsoft Message ID, Attachments, Links, and more.

Timeline
      Select More (vertical ellipses) > Timeline to see the events timeline for a specific message.

      The events timeline shows:

          Received: when a message was received and details about the message

          Verdict: information about any verdict that was rendered

                                                                    18
Messages

Investigate Messages

          Action: information about any action that was taken on the message

Conversation (Beta)
      Note: This feature is currently in Beta. You may encounter some issues as we work to make it better. Known issues
      include:

          The + symbols don’t disappear until you click them, even if there are no additional messages

          There is a limit of 9 horizontal nodes

      Conversation view provides a holistic view of a conversation. Use the conversation view to track the messages in a
      conversation and gain a complete understanding of the mail flow. This can be useful in determining where a threat
      originated and how it spread within your organization.

      Select More (vertical ellipses) > Conversation to see messages that are connected to a specific email.

      The node filled in blue represents the message you started with. Click the + icons to expand nodes of the conversation
      so you can see messages that came earlier or later in the conversation. Nodes that are expanded are added to the
      message grid. shown below the nodes. Nodes and messages are color-coded to indicate Incoming, Outgoing, Mixed,
      or Internal.

                                                             19
Messages

Move and Reclassify Messages

      The number within the node circle indicates how many addresses the message was sent to. An icon within a node
      indicates if a threat was detected. When you select a node, the corresponding message in the grid is highlighted.

Move and Reclassify Messages
      Use the Messages page to move or reclassify messages if you think they have been incorrectly classified. You can move
      or reclassify up to 100 messages at a time by changing the number of messages displayed per page.

      Note: Reclassifying only affects the verdict on the selected message(s). It does not indicate any change to future
      messages from the selected sender or based on the message content. The message will be queued for review by Cisco
      Talos. Talos may use the feedback to influence future classifications.

Audit Mode
      If you are in Audit mode, you can reclassify (apply a different verdict to) messages.

       1. Select the message(s) you want to reclassify.

       2. Select a verdict from the drop-down menu. You can reclassify the messages as Malicious, Phishing, Spam,
          Graymail, or Neutral.

       3. Click Update to apply the new classification.

Audit with Enforcement Mode
      If you are in Audit with Enforcement mode, you can move suspicious messages out of user Inboxes and into their Junk
      or Trash. Similarly, if you determine a message that was moved to Junk or Trash is not suspicious, you can move it back
      to user Inboxes. You can also Delete messages entirely. This process also allows you to reclassify (apply a different
      verdict to) messages.

       1. Select the message(s) you want to move or reclassify.

                                                                  20
Messages

Move and Reclassify Messages

       2. Select a verdict from the Reclassify drop-down menu. You can reclassify the messages as Malicious, Phishing,
          Spam, Graymail, or Neutral, or you can Keep verdict.

       3. Select an action from the Request Action drop-down menu. You can Move to Junk, Move to Trash, Move to Inbox,
          Delete, or Do Not Move.

       4. Click Update to apply the new classification and take action on the messages.

      If a message has been moved, it is indicated in the Last Action column.

Delete Messages
      Super-admin and admin users can use the Delete action in the Reclassify/Remediate workflow to permanently delete
      messages from mailboxes. Deleted messages are moved to the recoverableitemspurges folder. This folder is not
      accessible to users and Cloud Mailbox cannot restore deleted messages to inboxes.

       1. Select the message(s) you want to delete.

       2. Select a verdict from the Reclassify drop-down menu. You can reclassify the messages as Malicious, Phishing,
          Spam, Graymail, or Neutral, or you can Keep verdict.

       3. Select Delete from the Request Action drop-down menu.

       4. Click Update to delete the message(s).

       5. A Confirm Deletion dialog indicates that messages cannot be recovered and verifies that you want to continue. Click
          Delete to continue.

      Delete is indicated in the Last Action column. The item cannot be selected or acted upon.

                                                             21
Messages

Download Search Results

About Hybrid Accounts
      Cloud Mailbox can act only on mailboxes located in Exchange Online (O365). If you are in the process of migrating your
      mailboxes from on-premises Exchange to Exchange Online (O365), remediation (move or deletion) will only work for
      mailboxes located in Exchange Online (O365). You will not be notified that the remediation for on-premises Exchange
      mailboxes has failed.

Download Search Results
      You can download a CSV file of the data for messages in your search results. Downloads are limited to 10,000 messages.
      Complete the following steps to download your data:

       1. Click the Download button and select Create Download (.csv).

       2. A banner indicating that your request is in progress appears. Click the text to be taken to the Download History:
          Messages page.

       3. When your download is ready, download your file by clicking the Download icon under the Actions column.

Download History
      Your download history is kept for 90 days. Click the Download button and select View Download History to go to the
      Download History: Messages page.

      This page shows you the date range, who requested the download, the date it was initiated, and the status. Download
      your file by selecting the Download icon under the Actions column.

                                                                22
Insights
Trends
   The Trends page shows graphical information about your email data.

      Use the drop-down menu to show data for the last 24 hours, the last 30 days, or a specific day within the last 90
       days.

      Click data of interest in the graphs to be taken to the data details on the Messages page.

      Click legend items to be taken to the relevant data on the Messages page. For example, click Incoming to see all
       Incoming messages that are currently showing on the chart.

      Download your trend data by clicking the download          button. The results are exported as a CSV file that
       includes:

       —   an hourly roll-up of the past 90 days of data if you are viewing the last 24 hours or a specific day

       —   24-hour roll-ups of the past 90 days of data if you are viewing the last 30 days

      Print your Trends charts or save as PDF by clicking the print       button.

About Timezones
   Each bar on a Last 24 Hours or specific Day chart shows the data for one hour. These charts are based in your bowser’s
   local timezone.

   Each bar on a Last 30 Days chart shows the data for one 24-hour day. The day is based on UTC 00:00 through 11:59
   p.m. and then converted to your browser’s local time.

                                       Cisco Systems, Inc.      www.cisco.com

                                                           23
Insights

Trends

         For example, if you are in Pacific Daylight Time (PDT) UTC−07:00, a bar on a Last 30 Days chart would show from
         March 24 5:00 p.m. through March 25 4:59 p.m. Pacific.

Messages by Direction
         The Messages by Direction graph shows your total email traffic. Mail is divided into the following categories:

            Outgoing: mail sent to recipients outside of your business

            Mixed: mail with internal and external recipients

            Internal: mail sent within your business

            Incoming: mail received from outside your business

         The legend shows the number of messages in each category.

                                                                    24
Insights

Trends

Malicious & Phishing
         The Malicious & Phishing graph shows a snapshot of messages that were determined to be Malicious or Phishing. The
         legend shows the number of messages in each category. When you click the data to be taken to the Messages page,
         you will be shown either malicious or phishing messages, depending on where your pointer is on the graph.

Spam
         The Spam graph shows a snapshot of messages that were determined to be Spam. The legend shows the total number
         of messages determined to be Spam.

Graymail
         The Graymail graph shows a snapshot of messages that were determined to be Graymail. The legend shows the total
         number of messages determined to be Graymail.

                                                             25
Insights

Impact Report

Impact Report
       The Impact Report shows the benefits Cloud Mailbox provided to your business over the last 30 days. Click data of
       interest in the report to be taken to the data details on the Messages page.

       Data shown includes:

          Malicious, Phishing, Spam, and Graymail messages caught by Cloud Mailbox in the last 30 days, and a 1-year
           projection of this data. The 1-year projection is calculated as the daily average multiplied by 365.

          Traffic Volumes by Conviction. This chart shows the distribution of convictions over the past 30 days. You can filter
           this chart by direction.

          Added Protection by Cloud Mailbox. This chart shows convictions added by Cloud Mailbox over-and-above those
           provided by Microsoft. The data in this chart is based on what was known at the time journals were received.
           Depending on your Microsoft license, you may have added protection that could convict additional messages over
           time. Any such convictions are not included in this chart’s calculation because they occur post gateway processing.

           The values for this chart are calculated as follows:

           —    Recipients - The number of times Cloud Mailbox stopped the delivery of a convicted message to a recipient
                address. A recipient is counted each time they would have received a message.

                                                                  26
Insights

Impact Report

           —    Messages - The number of messages convicted by Cloud Mailbox that were not convicted by the Exchange
                gateway.

          Top Ten Targets of Malicious and Phishing Messages. This chart shows the top ten internal targets of malicious and
           phishing messages.

                                                             27
Insights

Impact Report

          Top Internal Threats. This chart shows the top ten internal senders of malicious or phishing messages.

                                                                 28
Manage Users
   Manage your user accounts from the Settings > Administration page.

   Cloud Mailbox uses Cisco’s SecureX sign-on SSO solution for user authentication management. For information on
   SecureX sign-on, see https://cisco.com/go/securesignon.

   Note: If you are an existing SecureX Threat Response, Cisco Secure Malware Analytics (formerly Threat Grid), or Cisco
   Secure Endpoint (formerly AMP) customer, be sure to sign in with your existing credentials. If you are not an existing user,
   you must create a new SecureX sign-on account

   Although SecureX sign-on allows you to sign on with other types of accounts, we recommend using a SecureX sign-on
   account to keep your Cisco security product accounts connected.

User Roles
   Role-based access control (RBAC) allows you to have users with different levels of control or access within the
   application. Cloud Mailbox users can be created in the roles described in the following table.

   Table 1      User Roles

    Role                 Description
    super-admin          These users have access to all features in Cloud Mailbox. They can alter settings and
                         policies, and reclassify and remediate messages.
    admin                These users have all the capabilities of super-admins, except they cannot create, edit, or
                         delete super-admin or admin users.
    analyst              These users can use the search and insight capabilities. They can reclassify and remediate
                         messages, but cannot delete messages from user mailboxes. They cannot make changes
                         to the business setup or policies or create new users.
    read-only            These users can use the search and insight capabilities. They cannot reclassify or remediate
                         messages, make changes to the business setup or policies, or create new users.

   Note: You cannot edit an existing user’s role. If you wish change a user’s role, delete the existing user then create a new
   user with the same email address and the desired role.

Create a New User
   Complete the following steps to create a new user:

    1. Select Settings (gear icon) > Administration > Users.

    2. Click Add New User.

    3. Enter the user's credentials, select a role, then click Create.

       Note: The user’s email address must match the one they use for their SecureX sign-on account.

                                        Cisco Systems, Inc.       www.cisco.com

                                                            29
Manage Users

Edit a User

      The user receives an email with the subject Welcome to Cisco Cisco Secure Email Cloud Mailbox. They must follow
      the directions in the email to set up a SecureX sign-on account (if they do not already have one) and log in.

Edit a User
      If a user changes their name you can edit it inline on the Administration page. You cannot edit a user's email address or
      role.

      To edit a user’s information:

        1. Select Settings (gear icon) > Administration > Users.

        2. Hover over the name you want to change and click the pencil icon to edit the name.

        3. Enter your updated text, then click the check mark to save the change.

Delete a User
      Complete the following steps to delete a user:

        1. Select Settings (gear icon) > Administration > Users.

        2. Click the trash can icon next to the user's name.

        3. Click Delete in the Confirm Deletion dialog to complete the action.

      A status message shows the deletion is complete. This deletes the user’s account from Cloud Mailbox, but does not
      delete their SecureX sign-on account.

                                                                 30
Administration Settings
    The administration settings described in this section are accessible from Settings (gear icon) > Administration >
    Business.

Account Details
    The Account Details section shows the following identifiers for your business:

       Microsoft 365 tenant ID

       journal address

       business ID

       support subscription ID

    It also includes the license information table that shows your license type, subscription ID, seat count, and the start and
    end dates of your license.

Preferences
    The Preferences section includes your notification email address, access to audit logs, and your Google Analytics setting.

Notification Email
    The notification email address is the address Cisco sends emails about Cloud Mailbox to. For example, we may send
    notifications about updates to the system, new features, scheduled maintenance, and so on. This is initially set to the
    email address of your business’s initial user.

    You can choose whether or not to send notifications for retrospective verdicts to your notification email address. An email
    will be sent when a retrospective verdict is applied to messages.

Audit Logs
    You can download audit logs for the previous 3 months as CSV files. Select a date range from the drop-down, then click
    Download CSV.

Google Analytics
    Google Analytics is initially enabled or disabled when you set up Cloud Mailbox and accept the Terms and Conditions.
    When enabled, Cisco collects non-personally-identifiable usage data, including but not limited to sender, recipient,
    subject, and URLs, and may share that data with Google Analytics. This data allows us to better understand the way Cloud
    Mailbox meets your needs.

                                         Cisco Systems, Inc.      www.cisco.com

                                                             31
Administration Settings

Preferences

                          32
User Settings
   Settings for individual user profiles are accessible from User (profile icon) > User Settings.

Details
   The Details section includes your user name, role, and organization.

Preferences
   The Preferences section includes your SecureX Ribbon authorization and theme appearance settings.

SecureX Ribbon
   Cloud Mailbox is integrated with SecureX ribbon. The ribbon allows you to navigate between Cisco security products,
   access casebook, search observables, and view incidents. SecureX ribbon is authorized per user. For more information,
   see SecureX Integration, page 35.

Themes
   You can choose to view Cloud Mailbox with a light or dark background. To switch the mode, go to User (profile icon)>
   User Settings > Preferences > Theme. Images in this guide are usually shown in the light theme. The dark background,
   dusk, is shown below.

                                        Cisco Systems, Inc.      www.cisco.com

                                                           33
User Settings

Preferences

                34
SecureX Integration
   Cisco SecureX connects Cisco security products into an integrated platform. Cloud Mailbox is integrated with SecureX
   dashboard and SecureX ribbon.

      SecureX dashboard allows you to see Cloud Mailbox information alongside data from your other Cisco security
       products.

      SecureX ribbon allows you to navigate between Cisco security products, access casebook, search observables, and
       view incidents.

   For details on SecureX not provided in this document, see the SecureX documentation:
   https://securex.us.security.cisco.com/help/securex/topic/introduction

SecureX Dashboard
   Cloud Mailbox provides the following tiles that can be viewed in the SecureX dashboard:

      Messages by direction: Shows your total email traffic by direction. Mail is divided into Outgoing, Mixed, Internal, and
       Incoming.

      Malicious and Phishing: Shows a snapshot of messages that were determined to be Malicious or Phishing.

      Spam: Shows a snapshot of messages that were determined to be Spam.

      Graymail: Shows a snapshot of messages that were determined to be Graymail.

   For information on SecureX dashboard, see the SecureX documentation:
   https://securex.us.security.cisco.com/help/securex/topic/dashboard

Authorize SecureX Dashboard for your Cloud Mailbox Business
   Before you can authorize SecureX for Cloud Mailbox, you must have a SecureX account and be part of a SecureX
   organization. For more information, see the SecureX documentation:
   https://securex.us.security.cisco.com/help/securex/topic/introduction

   Cloud Mailbox super-admin and admin users can authorize the SecureX module for their Cloud Mailbox business:

    1. Select Settings (gear icon) > Administration > Business.

    2. Under Preferences > SecureX Dashboard, click Authorize SecureX Integration.

    3. Complete the authorization flow.

   A banner appears, stating that SecureX configuration was successful.

   You can now add Cloud Mailbox tiles to your SecureX dashboard. For information on how to do this, see the SecureX
   documentation: https://securex.us.security.cisco.com/help/securex/topic/configure-tiles

                                       Cisco Systems, Inc.       www.cisco.com

                                                           35
SecureX Integration

SecureX Ribbon

Revoke SecureX Dashboard Authorization for your Cloud Mailbox Business
      Note: Any super-admin or admin user can perform this task. It does not have to be performed by the user who authorized
      SecureX Dashboard for the business.

      To revoke SecureX authorization for your Cloud Mailbox business:

       1. Select Settings (gear icon) > Administration > Business.

       2. Under Preferences > SecureX Dashboard, click Revoke Authorization.

      A banner appears, stating that SecureX configuration was successfully updated.

SecureX Ribbon
      The SecureX ribbon is located in the lower portion of the page, and persists as you move between Cloud Mailbox and
      other Cisco security products in your environment. Any Cloud Mailbox user can authorize the SecureX Ribbon for their
      use. Use the ribbon to navigate between your Cisco security applications, access casebook, search observables, and
      view incidents.

      For information on SecureX Ribbon, see the SecureX documentation:
      https://securex.us.security.cisco.com/help/securex/topic/ribbon

      When you authorize the ribbon, SecureX pivot menus are added within the Cloud Mailbox expanded message view.
      These menus give you a central point of access to additional information about each observable, depending on which
      Cisco security products you have purchased.

      For information on SecureX pivot menus, see the SecureX documentation:
      https://securex.us.security.cisco.com/help/securex/topic/pivot-menu

Authorize SecureX Ribbon
      SecureX ribbon is authorized at the user level. You can authorize the ribbon from within the ribbon or from the User
      Preferences menu.

      Note: Your SecureX account needs to be activated before you can authorize ribbon. You can do this by following the
      instructions in Authorize SecureX Dashboard for your Cloud Mailbox Business, page 35 or by integrating any other
      modules in SecureX.

                                                                 36
SecureX Integration

SecureX Ribbon

Authorize from within Secure X Ribbon
      To authorize your SecureX ribbon from within the ribbon:

       1. Click Get SecureX in the SecureX ribbon.

       2. In the Grant Application Access dialog, click Authorize Cisco Secure Email Cloud Mailbox Ribbon.

      Your SecureX ribbon is now authorized. A banner appears, stating that SecureX configuration was successfully updated.

Authorize from Cloud Mailbox User Settings
      To authorize your SecureX ribbon from the User Settings menu:

       1. Select User (profile icon) > User Settings.

       2. Under Preferences > SecureX Ribbon, click Authorize SecureX Ribbon.

       3. In the Grant Application Access dialog, click Authorize Cisco Secure Email Cloud Mailbox Ribbon.

      Your SecureX ribbon is now authorized. A banner appears, stating that SecureX configuration was successfully updated.

Revoke SecureX Ribbon Authorization
      SecureX ribbon is authorized at the user level. You can revoke authorization from within the ribbon or from the User
      Preferences menu.

Revoke Authorization from within Secure X Ribbon
      To revoke your SecureX ribbon authorization from within the ribbon,

       1. Select Settings > Authorization > Revoke in the SecureX ribbon.

       2. In the Revoke dialog, click Confirm.

      SecureX ribbon is no longer authorized for your Cloud Mailbox account.

Revoke Authorization from Cloud Mailbox User Settings
      To revoke your SecureX ribbon authorization from the User Settings menu:

       1. Select User (profile icon) > User Settings.

       2. Under Preferences > SecureX Ribbon, click Revoke Authorization.

      SecureX ribbon is no longer authorized for your Cloud Mailbox account. A banner appears, stating that SecureX
      configuration was successfully updated.

                                                             37
SecureX Integration

SecureX Ribbon

                      38
Deactivate Cloud Mailbox
   To deactivate Cloud Mailbox, there are two main tasks:

      Delete your Cloud Mailbox journal entry from Microsoft Exchange Admin Center

      Delete the Cloud Mailbox application from your Microsoft Azure tenant

Delete your Cloud Mailbox journal entry
    1. Go to your Microsoft 365 Admin Center https://admin.microsoft.com/AdminPortal/Home#/homepage

    2. Navigate to Admin centers > Exchange > compliance management > journal rules.

    3. Select the Cloud Mailbox journal rule, then click Delete. Select Yes to confirm you want to delete the journal rule.

Delete the Cloud Mailbox application from Azure
    1. Go to portal.azure.com.

    2. Search for and select Enterprise applications.

       Note: If you are using an older view in Azure, this may be called App registrations.

    3. Locate and select the CMD and/or CMD (Read Only) application.

    4. In the left pane, select Properties.

    5. Click the Delete button, then select Yes to confirm you want to delete the CMD app.

                                       Cisco Systems, Inc.       www.cisco.com

                                                            39
Deactivate Cloud Mailbox

Delete the Cloud Mailbox application from Azure

                                                  40
Frequently Asked Questions (FAQ)
  Frequently asked questions are available in the Cisco Secure Email Cloud Mailbox FAQ.

                                     Cisco Systems, Inc.    www.cisco.com

                                                       41
Frequently Asked Questions (FAQ)

                                   42
You can also read