Mastering Email Security
Mastering Email Security
An Email Gateway is a security solution that sits between an organization’s email infrastructure and the internet, filtering
incoming and outgoing emails to detect and block threats, enforce policies, prevent data leaks, and ensure compliance.
It protects against:
Phishing (fake emails trying to steal credentials)
Malware (emails with infected attachments or links)
Spam & Graymail (unwanted bulk emails)
Data Loss (DLP) (prevents sending sensitive information externally)
Spoofing & Impersonation Attacks (fake emails pretending to be from trusted people)
Step-by-Step Process:
o Enforces company policies (e.g., no personal email use for work files).
o Email Gateway sends logs to SIEM for correlation with other security events.
2. Blocked Email Logs – Information about phishing, malware, or spam emails blocked.
6. DLP Violation Logs – When an employee attempts to send sensitive data outside.
Protects Against Phishing & Spoofing – Detects fake emails trying to steal credentials.
Stops Malware & Ransomware – Blocks infected attachments and malicious links.
Reduces Spam – Filters out unwanted bulk emails.
Prevents Data Leakage – Stops sending of sensitive files outside the company.
Ensures Compliance – Helps meet PCI DSS, HIPAA, GDPR security policies.
Enhances Visibility – Provides logs for SOC teams to investigate threats.
Integrates with SIEM – Correlates email events with other security incidents.
BY - Dashrath Jamadar
2. Threat Detected?
o No → Delivered normally
4. SOC Team Investigates Suspicious Emails → Uses SIEM logs for deep analysis.
• Scenario: An employee receives a phishing email with a fake login page link.
6. Fortinet FortiMail
Detect and block emails with suspicious links, spoofed domains, or credential harvesting content before reaching users.
Flag and quarantine emails where attackers impersonate executives or vendors requesting fund transfers or sensitive data.
Block emails carrying malware payloads (e.g., .exe, macro-enabled Word/Excel files) using sandboxing and signature-based
scans.
Rewrite embedded links in emails and analyze them at click-time to prevent delayed phishing/malware attacks.
Automatically detect and filter unsolicited or mass marketing emails to reduce noise and protect end-users.
Use machine learning and sandboxing to identify and block unknown threats embedded in emails before signatures are
available.
Reject spoofed emails by enforcing authentication policies using DMARC, DKIM, and SPF records.
Identify and alert on emails mimicking trusted senders (e.g., lookalike domains or display name spoofing).
Prevent accidental or intentional sharing of PII, credit card info, or proprietary data via outbound emails using DLP policies.
Correlate email IOCs (URLs, hashes, IPs, domains) with threat feeds and SIEM to identify targeted campaigns or actor TTPs.
Block non-approved file types (e.g., .js, .vbs) even if renamed or zipped.
• It verifies the sending server's IP and applies rate limiting or reputation checks.
Checks performed:
• Sender IP reputation (via RBLs like Spamhaus, Talos, etc.)
• HELO/EHLO domain validity
• SMTP command sequence compliance
• TLS encryption enforcement
If the IP or connection is suspicious, the gateway may drop it immediately before content is processed.
Multiple detection layers (signature, sandbox, heuristics) are used to catch both known and unknown
threats.
4. Policy Enforcement & Routing Decision
After scanning, the gateway applies organizational email policies such as:
• Block/quarantine/delivery based on:
o File types (e.g., .exe, .zip, .js)
o Threat level (High, Medium, Low)
o BEC or impersonation detection
• Tagging:
o Add custom headers like X-Proofpoint-Spam: high
o Modify subject line (e.g., [EXTERNAL], [PHISHING])
Ensures that clean emails are delivered, and suspicious ones are quarantined or modified for awareness.
5. Delivery to Mailbox or Quarantine
Depending on the verdict:
• Safe emails: Delivered to Exchange Online, Gmail, or internal mail servers.
• Suspicious or malicious emails:
o Sent to Quarantine portal for user/admin review.
o Or dropped silently (based on policy).
User may receive:
• Quarantine digest
• Alert (optional)
• Link to release/review email
6. Logging, Alerting, and SIEM Integration
All actions are logged for SOC visibility.
Logs contain:
• Envelope + header + verdict
• Threat name/type (if detected)
• Sandbox results (hashes, behavior)
• Final action taken
• User interaction data (if clicked)
These logs are:
BY - Dashrath Jamadar
[Incoming Email] ➜
[Policy Application] ➜
[Delivery or Quarantine] ➜
[Logging to SIEM]
• Review the correlated log from the email gateway source (e.g., Proofpoint, Mimecast, Microsoft Defender for Office
365, etc.).
• Search for all emails sent by the user in a specific timeframe (e.g., past 24–48 hours).
o Attachments
o External recipients
Actions to take:
o Spoofing
o Unauthorized relay
• Check for:
o Sudden change in user behavior (e.g., emailing after-hours, increased data transfers)
Immediate Actions:
Escalate to:
Document:
Remediation steps:
• Access the SIEM dashboard and locate the alert triggered by the email gateway log source (e.g., Proofpoint,
Mimecast, Microsoft 365 Defender).
Purpose: Ensure this is not a false positive and determine the risk level of the incoming email.
• Check if the sender domain is newly registered, spoofed, or similar to a legitimate domain (e.g., micr0soft.com).
o Use threat intel platforms (VirusTotal, AbuseIPDB, Talos) to check if it’s a known malicious sender.
BY - Dashrath Jamadar
• Review SPF, DKIM, DMARC results from the email log headers:
Purpose: Assess trustworthiness of the sender and confirm if the email bypassed security policies.
• Examine:
Advanced: If sandboxing is enabled in the gateway (e.g., Proofpoint TAP, Defender ATP Safe Attachments):
o Execution behavior
o Callback URLs
o File actions (e.g., attempts to drop another file or connect to C2 server)
Purpose: Identify if the attachment is designed for malware delivery or phishing credential harvesting.
Immediate Containment:
• Delete or retract the email from mailboxes (e.g., Microsoft Purview Search & Purge, Proofpoint quarantine actions).
• Block:
o Sender domain/IP
o Attachment hash
o Any URLs found in the email
BY - Dashrath Jamadar
Escalate to:
Document:
• SIEM alert
• Email metadata and attachment details
• Sender IP/domain intelligence
• Actions taken (quarantine, block, user notification)
• Timeline of the event
Purpose: Ensure full visibility and audit trail for post-incident review and compliance.
Strengthen Controls:
Awareness: