Enable Executive Spoofing feature in ForcePoint Cloud

The Internal Executive Spoofing feature provides protection against spear phishing attacks targeting individuals within your organization. Such emails may come from legitimate (non-spoofed) email addresses, thereby passing other spoofing checks, but use the display name of a known user (often an executive), with the intention of tricking employees into sending money or information.

To enable the internal executive spoofing check:
1.Select Apply internal executive spoofing check to these names.
2.Click the these names link to configure the list of executive and their approved email addresses:
Click Add, and enter a first name and last name (both fields are required). Various combinations of the name are protected (for example, “John Smith” as well as “Smith, John”).
Enter a list of approved email addresses for the executive, separated with a comma or a line break. This list should include any addresses the executive uses, including work or personal addresses.
Click Add to repeat the process for each executive whose name and addresses you wish to check. Click Save when finished.

3. Select an action to perform on messages detected as potentially spoofed.

The options are:

  1. Quarantine. This is the default option. Messages are kept in quarantine for up to 30 days.
  2. Discard. Spoofed messages are discarded.
  3. Tag subject with. The subject line of spoofed messages are tagged with a custom tag that you enter.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.