Go to the table of contents Go to the previous page Go to the next page View or print as PDF
New in version 8.4
Release Notes | Forcepoint Email Security | Version 8.4 | Updated: 31-July-2017
Forcepoint Email Security version 8.4 includes the following new features:
*
*
*
*
*
*
Forcepoint product renaming
Forcepoint continues to define its brand and unify its product lines under a single branding scheme. To this end, product names and some product component names have changed in version 8.4. The following table summarizes the naming evolution for the Forcepoint Email Security product (and its components):
 
Email Attachment policy rule
A new Email Attachment policy rule allows Forcepoint Email Security to examine email attachment content and determine an attachment's true file type. The rule comprises a default Email Attachment filter and an Email Attachment Default filter action. This rule is enabled by default and is applied to email that matches policy conditions after the Antivirus policy rule is applied.
The rule is triggered when a specified true file type is detected. Default rule behavior is:
*
*
Save it to a new attachment queue for administrator action.
*
An additional option to check for a custom file attachment extension or file name detects the specified extension or file name, which triggers the rule. However, in this instance, attachment content is not inspected for true file type.
A new Email Attachment message analysis result appears in the Message Log and in the Personal Email Manager end-user portal. You can search the Message Log by a new Email Attachment analysis result. Email attachments that trigger the filter are listed in the Message Log details entry for the message.
A message that triggers the Email Attachment rule appears in the Blocked Messages queue (Main > Message Management > Blocked Messages) with a message type of Email Attachment. Detected attachments are displayed in the Quarantined Reason column of the queue.
The following default presentation reports are added in this release for the Email Attachment policy rule:
*
*
*
*
*
With the addition of this filter, the Treat encrypted files as infected default Virus filter properties option is removed. Upgrading customers who have configured the Virus filter option will see encrypted files analyzed as part of the new Email Attachment filter.
For configuration information, see Forcepoint Email Security Administrator Help.
Cloud-based URL analysis option
URL analysis compares a URL embedded in email with a database of categorized URLs, providing category information to allow Forcepoint Email Security to properly handle the URL. Existing functionality provides URL analysis via a Forcepoint web security solution, using either Forcepoint Filtering Service or Linking Service to access a URL database.
This version of Email Security introduces a new service for URL analysis that does not require a Forcepoint web protection solution to be installed. The Threat Intelligence Cloud Service allows direct access to the cloud-hosted Forcepoint Master Database, which is a real-time repository of classified URLs. This cloud database is used by many Forcepoint solutions to identify potentially dangerous or simply unwanted URLs.
Threat Intelligence Cloud Service is the default URL analysis selection for all new installations of Forcepoint Email Security. Upgrading customer installations that have not previously configured the Forcepoint web security Filtering or Linking service for URL analysis also default to the new cloud service. URL analysis for customers who already use the Filtering or Linking service retain that configuration on upgrade.
URL analysis is configured in the Forcepoint Email Security Settings > General > URL Analysis page. You can use a proxy server for communication with the Threat Intelligence Cloud Service.
Information about Forcepoint Master Database categories can be found on the Forcepoint web site. See Forcepoint Email Security Administrator Help for information about URL analysis configuration.
Relay control SPF settings
This version of Forcepoint Email Security offers enhanced relay control options for Sender Policy Framework (SPF) settings. Combined with DMARC validation, the new options can provide improved email authentication and prevent malicious email from entering your network.
The new SPF option on the Email Security module Settings > Inbound/Outbound > Relay Control page is enabled by default.
You can also configure Forcepoint Email Security to reject mail for the following SPF check results:
*
*
*
*
*
*
On a new installation, these options are not marked by default.
On upgrade, existing SPF settings, if enabled, are mapped to the new options as follows:
The version 8.4 Neutral option does not map to any previous setting and is not marked by default after an upgrade.
See Forcepoint Email Security Administrator Help for information about the SPF settings.
Product license behavior
This enhancement provides customers with valid subscriptions a grace period of two weeks to provide extra time to renew their product licenses. Alert message sent daily during the grace period remind users that the subscription has expired.
Mark the Block incoming email connections when subscription expires option on the Settings > General > Subscription page to block malicious traffic after this grace period.
Other changes and enhancements
This version of Forcepoint Email Security includes the following new features or functionalities:
*
*
*
SPF checks are enabled by default (Settings > Inbound/Outbound > Relay Control).
*
Real-time Black List checks are enabled by default (Settings > Inbound/Outbound > Connection Control).
*
Reputation service default sensitivity level is now Aggressive (Settings > Inbound/Outbound > Connection Control).
*
The Commercial Bulk policy filter default sensitivity setting is now High (Main > Policy Management > Filters > Commercial Bulk).
*
*
*
*
*
*
*
*
*
The following appliance CLI commands may be visible in the CLI, but they are available only for Forcepoint Technical Support operations. They are not supported for appliance administrator use.
set analytic-update service --status <on|off>
set reporting --status <on|off>
set email subscription --key <blank|reset|subscription_key>
set mta delivery --status <on|off>
load analytic-db --file <analytics_file> --location <filestore> [--factory]
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2017 Forcepoint. All rights reserved.