Table of Contents |
---|
20232025-0903-2125
Status |
---|
...
...
|
...
|
...
Email Signatures
...
INKY Email Signatures is an optional product offering that allows teams to easily configure company-wide signatures and footers on outbound mail. The signatures can also be personalized for each user, based on user-provided data or tenant directory information via API.
We are thrilled to announce the soft launch of INKY's new Email Signatures, available from September 25th to October 27th. If you’d like to trial out Email Signatures during the soft launch period, please reach out to support@inky.com! During this period, you're invited to try our new offering at no cost to experience how it can help your organization maintain consistent branding across all email signatures. We welcome your feedback on this new product, so please feel free to share your thoughts with us at feedback@inky.com.
Note |
---|
Possible Changes throughout Soft Launch period We're hard at work perfecting our new Email Signatures product, and that means we'll be making updates until it's fully launched. While we'll do our very best to make sure all updates are compatible with previous releases, sometimes we have to make changes that may need a little extra attention from your end. Rest assured, we'll only do this when absolutely necessary and we truly appreciate your understanding as we fine-tune this exciting new offering. |
Status | ||||
---|---|---|---|---|
|
Note: This setting currently only applies to Microsoft Office 365 customers, as the location is determined by Microsoft based on the connecting IP address.
Based on feedback from partners and customers alike we’ve added the ability to block messages based on the IP address gleaned from Microsoft. Found at the bottom of the https://app.inkyphishfence.com/settings/analysis page you’ll find the new section named Additional Analysis. There you’ll use a multi-select input to set which country you want blocked.
...
When you block a country, any message that’s identified coming from there will be given the new threat category “Blocked Sender Location” and tagged as High Confidence Phish. This allows it to follow the normal routing destinations defined on the delivery page, which would likely send them to Admin Quarantine.
Additionally, within the message details view of most messages after October 2022, you’ll have access to the sender location. This helps identify which country you may consider blocking if they’re found being used in phishing attacks.
Documentation: Additional Analysis
...
Sent Items Update works with New Outlook for Windows
Microsoft has been gradually rolling out the new Outlook for Windows, which is based on the Outlook Web App (OWA) and aligns with their vision of a unified mail client experience across their ecosystem. As feature parity with the legacy Outlook for Windows has improved, adoption of the new client has increased.
However, the new Outlook for Windows handles local emails differently from its predecessor, prioritizing a cached version of a message over the server version. As a result, when INKY performs a Sent Items Update to append a signature to a sent email, the update is not reflected in the new Outlook client. Instead, it continues to display the locally cached version, which does not include the signature.
Fortunately, we’ve found a way to bypass this caching behavior to ensure our Sent Items Update feature functions properly. However, this requires a change at the mailbox level that users may notice. To force the local client to sync with the server version updated by INKY, we create a subfolder within the "Sent Items" folder. Moving the message into this subfolder and then back triggers the client to refresh its copy based on the server version. Since INKY appends the signature at the server level, this process ensures the updated email—including the signature—is correctly displayed.
There's no action required to enable this functionality. As long as the "Sent Items Update" checkbox is selected, as shown in the screenshot below, the enhancement will automatically apply to emails sent while the feature is enabled.
...
Status | ||
---|---|---|
|
We've recently added a Team Recipient Domain filter, located in the Widget Filter Editor → General → Team Recipient Domains.
This feature allows you to filter emails based on the domains listed in a team's routing list (found here: Routing - INKY). By using this filter, teams can focus on specific domains within an organization rather than filtering by individual users.
...
Status | ||
---|---|---|
|
You can now add the threat categories Possibly Misconfigured Service and Spoofed Internal Sender to the allow list through manual entries in the Allow List - INKY. Previously, these categories could only be managed via the Allow List dropdown options in a specific Message List view.
For both categories, the criteria support an email address, IP address, or an "email:IP" pair
. Examples:
Email address:
matt@polvocapital.com
IP address:
192.23.120.54
Email:IP pair:
matt@polvocapital.com:192.23.120.54
Using an email:IP pair is the most secure option, as it ensures the email is only allowed from a specific IP address. However, this may not always be practical if the sender’s IP address is unknown.
Additionally, be sure to uncheck the “Apply only to messages that pass DMARC authentication (safer option)” setting. Since these messages likely fail DMARC authentication, they wouldn’t have been flagged under these threat categories otherwise.
...