Email Security 4
Email Security 4
Release Notes
Forcepoint Email Security Cloud | 2018 Release Notes | Last updated 04-Dec-2018
This document details product updates and new features added to Forcepoint Email
Security Cloud during 2018.
● What’s new?
■ DKIM signing: authenticate outbound messages
■ Default landing page change
■ Additional cloud delivery IP addresses
■ New cloud status monitoring service
■ Update to Help > Data Privacy menu
● 2017 updates
● Resolved and known issues
● Limited availability features
Added 04-Dec-2018
DKIM signing rules can be configured on the Email > Policies > [policy name] >
Encryption tab. Define DKIM signing rules to authenticate sender domains or
subdomains, using one of your domains as a signing domain. Granular sender/
recipient options are available to include or exclude specific sender addresses, or
sender/recipient combinations.
All customers have an account-specific private and public key pair, used to sign and
validate messages. Keys are managed by Forcepoint, and are rotated periodically for
additional security.
Before enabling a DKIM signing rule, customers must publish Forcepoint-provided
DNS CNAME records for each of their signing domains. These CNAME records
enable recipient mail servers to look up the customer’s Forcepoint public key in order
to validate messages. Details of the CNAME records you must publish can be found
on the renamed DNS Records and Service IPs page (formerly Service IP Addresses).
For guidance on configuring CNAME records, see DNS Records and Service IPs in
the Forcepoint Email Security Cloud help.
Note
Customers who have previously enabled DKIM signing
via a custom policy rule are advised to contact Forcepoint
Technical Support to assist with the process of migrating
their DKIM signing rules to use the new interface.
Added 28-Nov-2018
In order to improve the customer log on experience, the default landing page for
Security Portal administrators has been changed to the Account > Licenses screen.
Note that you can change your default landing page at any time, by clicking the arrow
next to your logon account name and selecting Set Landing Page.
Added 09-Mar-2018
A new feature in Forcepoint Email Security Cloud allows you to bypass encrypted
message filter settings for individual users and groups.
The encrypted message settings, found on the Antivirus tab of an email policy, are
used to quarantine messages that contain encrypted archive files, and messages
encrypted using a standard such as PGP or S/MIME. Such messages pose a security
risk because the service cannot scan the content of encrypted messages and
The new Encrypted Message Bypass feature is used to override these settings for
specific users or groups, allowing them to receive encrypted messages from certain
addresses or domains, or to send encrypted messages to certain addresses or domains.
The option appears beneath the Encrypted messages settings in both the inbound rule
and outbound rule sections of the Antivirus tab of your policies. Click the Encrypted
Message Bypass link to enter a set of sender/recipient email addresses, groups, or
domains that are permitted to send or receive encrypted messages through the service.
For more information on using this feature, see Antivirus exceptions in the Forcepoint
Email Security Cloud help.
For customers with existing encrypted message bypass settings that were manually
configured by Technical Support, these settings will be migrated to the new Encrypted
Message Bypass feature. Manually configured bypass settings will become visible in
the portal, and can be edited using the options described above.
Note
Previously, bypass settings that were manually configured
by Technical Support could be set to apply to all new
policies by default. In a slight change of behavior, these
settings will now apply only to the policies in which they
are configured, and will no longer automatically apply to
any new policies you create. For more information, contact
Technical Support.
Added 12-Feb-2018
Added 20-Aug-2018
The DKIM signing feature, previously announced on 2 August 2018, has been
withdrawn.
An issue with the current implementation of the new outbound DKIM signing feature
has been identified. In Forcepoint’s ongoing commitment to excellence, we are
temporarily removing the DKIM signing feature from the Security Portal. If you have
already enabled this feature, please contact Forcepoint Technical Support for
assistance. Forcepoint is committed to delivering outbound DKIM signing, and we
will alert you when it is available.
Added 19-Jun-2018
Forcepoint has launched a new cloud status monitoring service, displaying the current
service status for the global network of Forcepoint data centers for Web Security
Added 07-Jun-2018
The Help > Data Privacy menu within the Security Portal has been revised to include
updated documentation on the management of personal data within the Forcepoint
cloud infrastructure. The relevant menu options appear depending on your product
licensing, and provide updated information on Forcepoint Web Security Cloud and
Forcepoint Email Security Cloud. The updated documents replace the previous Data
Privacy FAQ.
The documents are intended to answer customer queries on the use of personal data by
the Forcepoint cloud service, and form part of the wider Forcepoint Cloud Trust
Program. Details available at: https://www.forcepoint.com/forcepoint-cloud-
compliance
To review the updated documents, use the links in the Help menu within the
Forcepoint Security Portal:
● Help > Data Privacy > Web Security Cloud
2017 updates
For details of new features added, and issues resolved during 2017, please see the
Forcepoint Email Security Cloud 2018 Release Notes.
To see the list of issues resolved for Forcepoint Email Security Cloud during 2018, see
Resolved and known issues for Forcepoint Email Security Cloud - 2018 in the
Forcepoint Knowledge Base.
You must log on to My Account to view the list.
The table below lists Forcepoint Email Security Cloud features that are in a limited
availability status. Limited availability features may have been released recently, or
may need to be approved by your account manager before being added for your
organization, due to additional configuration requirements, or other considerations.
If you are interested in enabling any of these features for your account, please contact
Technical Support.
Feature Description
Attachment When suspicious email attachments are identified, administrators can
wrapping choose to place them in password-protected zip files that are delivered
to the recipient. The file is delivered along with a report that includes
the message details, a preview of the attachment content, and a link to
retrieve the password to the secured file.
For further information, see the 2016 Release 6 Notes for Cloud
Email Protection Solutions.