Table of Contents |
---|
2023-0910-2110
Status | |
---|---|
|
...
Status | ||||
---|---|---|---|---|
|
...
|
...
INKY Email Signatures is an optional product offering that allows teams to easily configure company-wide signatures and footers on outbound mail. The signatures can also be personalized for each user, based on user-provided data or tenant directory information via API.
We are thrilled to announce the soft launch of INKY's new Email Signatures, available from September 25th to October 27th. If you’d like to trial out Email Signatures during the soft launch period, please reach out to support@inky.com! During this period, you're invited to try our new offering at no cost to experience how it can help your organization maintain consistent branding across all email signatures. We welcome your feedback on this new product, so please feel free to share your thoughts with us at feedback@inky.com.
Note |
---|
Possible Changes throughout Soft Launch period We're hard at work perfecting our new Email Signatures product, and that means we'll be making updates until it's fully launched. While we'll do our very best to make sure all updates are compatible with previous releases, sometimes we have to make changes that may need a little extra attention from your end. Rest assured, we'll only do this when absolutely necessary and we truly appreciate your understanding as we fine-tune this exciting new offering. |
|
Status | ||||
---|---|---|---|---|
|
Since the start of 2023, INKY has incorporated QR Code detection methods into our processing. Due to a recent surge in QR Code-related threats, we've now introduced a distinct QR Code threat category, rather than keeping it as a behind-the-scenes flag. This category is enabled by default. However, it can be toggled on/off at: https://app.inkyphishfence.com/settings/analysis.
If INKY identifies a QR code in a message, that message will be marked with a "QR Code" result and assigned a "Caution" or "Danger" threat level, based on other suspicious content found.
Admins also have the flexibility to customize the QR code policy text and its associated URL. By default, emails with detected QR Codes will include the specific notification text below.
Beware of unexpected QR codes from unknown senders.
Status | ||||
---|---|---|---|---|
|
...
Note: This setting currently only applies to Microsoft Office 365 customers, as the location is determined by Microsoft based on the connecting IP address.
...
Status | ||||
---|---|---|---|---|
|
In addition to the current blocked sender location functionality, we’ve added the ability to block top level domains (TLDs) and public suffixes (e.g., co.uk
). This blocking mechanism is enforced against the following mail properties.
MAIL FROM envelope address
From or Reply-To header address
Link URLs
Image URLs
...
Additionally, there's a new feature to "Automatically block ccTLDs (Country Code Top-Level Domains) based on the chosen Blocked Sender Location." For instance, if Montenegro (.me) is selected, its country code will also be considered a Blocked Top-Level Domain, alongside the Blocked Sender Location.
...
Configure these new settings at the bottom of this page: https://app.inkyphishfence.com/settings/analysis page you’ll find the new section named Additional Analysis. There you’ll use a multi-select input to set which country you want blocked.
...
When you block a country, any message that’s identified coming from there will be given the new threat category “Blocked Sender Location” and tagged as High Confidence Phish. This allows it to follow the normal routing destinations defined on the delivery page, which would likely send them to Admin Quarantine.
Additionally, within the message details view of most messages after October 2022, you’ll have access to the sender location. This helps identify which country you may consider blocking if they’re found being used in phishing attacks.
Documentation: Additional Analysis
...
and learn more about the section here: Additional Analysis.