Note: this feature is available only for accounts with Email Protection + DLP plan. If you want to upgrade to Email Protection + DLP plan, please refer to the following KB article.

With Outbound Email Filtering, you'll be able to manage:

Outbound policies

To modify your default Outbound policy, log into HostPilotĀ® Control Panel > Services > Email Protection > Outbound policies > Default policy. You can also create additional policies and set the priority for them. If multiple policies apply to a mailbox, the policy with the highest priority will be applied.

The default outbound policy cannot be removed. Outbound policies can be assigned to domains, Distribution Lists, mailboxes, Resource Mailboxes but not to Public Folders.

Spam settings

To define spam settings, navigate to Email Protection > Outbound policies > select the policy > Spam. There are three actions that can be used against Certain spam and Probable spam:

  1. Permanently delete
  2. Move to Admin quarantine
  3. Deliver to recipient

Read more about Outbound Quarantine Management in HostPilotĀ® Control Panel for more information.

Content filters

To add or remove contact filters, navigate to Email Protection > Outbound policies > select the policy > Content filters.

There are some predefined filters such as Credit Cards Number and Social Security Number which can be enabled. If multiple filters are applied to one policy, all actions associated with them will be employed. E.g. if a message matches both Credit Cards Number and Social Security Number filters which trigger Deliver to recipient and Move to Admin quarantine actions, the message will be sent both to the recipient and Admin quarantine.

Blocked Recipients Management

To restrict users to email particular recipients, navigate to HostPilot > Services > Email Protection > Outbound policies > select the policy > Blocked Recipients.

You can add an email address or domain of the recipient you want to block.

You can enter blocked recipients manually or import list from .TXT file:

  • The file should have .TXT extension.
  • Entries must be separated by commas, semicolons, spaces or lines.

Emails that match any of the blocked recipients will be dropped.

Safe Recipients Management

To secure the delivery of the email, a recipient can be added to Safe Recipient list, so that particular checks are not performed against their emails.

To manage safe recipients, navigate to Inbound Policy > select the policy > Safe Recipients

You can add an email address or domain of the recipient you want to whitelist.

Bypassing individual checks

You can manage the bypassed checks for every recipient. To select which checks will be bypassed for an individual Safe Recipient, click Manage next to the required entry.

 The following checks can be bypassed:

  • Spam
  • Dangerous attachment
  • Virus
  • Content

Notes:

  • Emails that have no checks to be bypassed will go through all checks as normal.
  • If email triggers more than 1 safe recipient, all the bypass checks will be applied accordingly. For example: Safe Recipient email@domain.com has Spam and Dangerous attachment checks bypassed. And Safe Recipient domain.com has Virus check bypassed. An email is coming from email@domain.com. The email triggers both Safe Recipients entries. The email will bypass: Spam, Dangerous attachment and Virus checks.

Bulk import of Safe Recipients 

You can enter safe recipients manually or import list from file. Safe recipients can be imported in bulk in two ways:

1) Via .TXT file – it will import recipients with default bypass settings. Entries must be separated by lines only.

2) Via .CSV file – it will import recipients with the specified bypassed checks, where 1 - check is bypassed, 0 - check is NOT bypassed. Each recipient entry must be on a separate line with their bypass settings separated by commas. Headers with the bypassed checks names must be valid. 

Note: Please use TXT and CSV templates to make sure the data is properly uploaded.

TXT




New entries   Matching entries Missing entries

Recipients only
Import and Merge will be added with the default checks will be kept with their current checks will be kept with  their current checks
Import and Overwrite will be added with the default checks will be rewritten with the default checks will be removed
CSV

Recipients and their bypass settings

Import and Merge will be added with the bypassed checks from the file. If check column is missing from the file – default values will be applied will be kept, but their bypassed checks will be re-written with the checks from the file. If check column is missing from the file – current value will be kept will be kept with their current bypassed checks
Import and Overwrite  will be added with the bypassed checks from the file. If check column is missing from the file – default values will be applied will be kept, but their bypassed checks will be re-written with the checks from the file. If check column is missing from the file – default values will be applied will be removed

Note: you can use this option to change bypassed checks for all Recipients in bulk. For example, to bypass Marketing check for all recipients instead of Dangerous attachment check, you need to set 1 in the Bypass Marketing column and leave Dangerous attachment column and other columns with 0.

You will see these notification signs if the same sender is added to both Blocked Recipients and Safe Recipients lists simultaneously.

Note: Safe Recipients list overrides Blocked Recipients list. A recipient added to both lists will be considered as safe.

Attachments

To manage or view attachment settings, navigate to HostPilot > Services > Email Protection > Outbound policies > select the policy > Attachments. You can select one action to apply to a message containing a dangerous attachment: either Drop it or Move to Admin quarantine.

To modify the list of attachments which are classified as dangerous, select a checkbox next to the file type and save changes.

You can specify file types which should be considered as dangerous even if their file type group is NOT selected in Dangerous attachments section.
Note: press space bar after you entered file type to finish editing.
For example, MS PowerPoint group is not selected, but if we add .ppt file type, it will be blocked, though other MS PowerPoint file types such as .pps, .ppsx etc. won't be blocked.

You can specify file types which should be considered as safe even if their file type group IS selected in Dangerous attachments section.
Note: press space bar after you entered file type to finish editing. 
For example, Executables group is selected, but if we add .reg file type here, it won't be blocked, though other executable files such as .exe, .scr etc. will be blocked.

Notifications to senders

To let the senders know that their message was rejected by Outbound filter, you can enable notifications via the Notifications tab.

 

The notification will be sent if one of the following conditions are matched:

  • a message was considered as spam
  • a message contained dangerous attachments
  • a message had 'not safe' content
  • a message was sent to a blocked recipient
  • a message contained a virus

Domain Key Identified Mail

This authentication technology allows senders to “sign” a message to prove it really did come from them. Once DKIM signing has been enabled for a domain, all outbound email messages from that domain will be signed using the current DKIM key.

Read the Knowledge Base article on Domain Keys Identified Mail (DKIM) with Outbound Email Filtering for more information.