Zoho Mail Comprehensive Email Security
Zoho Mail Comprehensive Email Security
INTRODUCTION
Since the commercialization of the Internet in the mid ’90s, email has been one of
the most trusted business communication tools.
However, email has also become the most common cyber-attack vector in recent
years. Attackers are constantly improving their attack mechanisms to deliver spam,
inject malware, and launch phishing attacks or other email based threats undetected,
with an intent to steal, alter, or destroy critical data and information systems.
In fact, according to SpamLaws, about 14.5 billion spam emails are sent every single
day. That makes it about 45% of the world’s daily email traffic. While this figure is a
general consensus, there are some spam traffic statistics that suggest as many as
73% of all emails are unwanted promotions, or malicious in nature. For a
small-to-medium-sized business, this means receiving thousands of spam emails
yearly, each with varying potential for financial and reputation loss.
With this white paper, Zoho intends to create awareness about the most common
email-based threats that businesses face today and helps explore in depth the
defense mechanisms that Zoho Mail's spam engine employs to ensure secure email
communication and business continuity for its customers.
1
targeted to hundreds or thousands of recipients, by someone posing as a legitimate
institution, usually through email. The goal is to obtain sensitive information, such as
usernames, passwords, and credit card details, often for malicious reasons. An
advanced level of this tactic is called “spear-phishing”.
Viruses: Viruses are a type of malware program that piggybacks onto a legitimate
application code, then spreads itself from there. Software viruses are loaded onto a
user’s computer without the user’s knowledge and perform malicious actions,
destroy data, and slow down the system resources.
2
detect unwanted and unsolicited emails and defend networks against email-based
threats. Our approach to spam protection begins with perimeter/edge protection and
goes all the way to time of click spam protection in the user's inbox, ensuring that
your organization not only stays productive, but also protected from email-borne
threats.
Zoho Mail provides a robust, yet simple to manage protection from spam by
combining the most effective spam elimination technologies into one cohesive, easy
to-manage system. It combines connection analysis, local and global reputation, and
advanced statistical and content analysis techniques that inspect all incoming and
outgoing emails to protect users from diverse cyber-threats.
A. Edge Blocking
3
your first layer of defense against such threats by receiving all inbound emails,
assuring that these threats never reach your network perimeter.
● Rate Limiting
Automated spam software is often used to send bulk emails to a single mail server.
To protect the email infrastructure from email flooding, our spam engine throttles
inbound emails for a period of time after the rate limiting threshold is exceeded. It will
also block any further connection attempts from repeated offenders.
Rate limiting, ensures service availability while ensuring your user inbox is not
flooded with spam.
● IP Edge Blocking
Next, the defense mechanism compares IP addresses of inbound mails against
known offender lists, such as:
● Dynamic IP Block
The dynamic IP block list is a public block list of malicious IP addresses or
address ranges. Instead of blocking the user account, the spam engine blocks
the originator IP address for their malicious email or failed login attempt using
a different username and commonly used passwords for a specific period.
Note: While SMTP RBL is an aggressive spam filtering technique and may show
false-positive results as it is complied from the reported spam activity. To avoid
4
emails from trusted sources being blocked by RBLs, add them to an Allowed List.
v. Greylisting
If spam emails are received from IPs with very poor reputation, the system will
automatically greylist the IP address, thereby reducing the amount of spam received.
C. Policy Enforcement
i. Based on IPs
Zoho Mail's spam engine lets administrators define a list of trusted mail servers by
the IP address, thus, avoiding spam scanning for legitimate emails. Likewise,
administrators can also segregate and organize a list of fraudulent email senders to
5
block them further. In some cases, administrators may also prefer to utilize IP block
range to limit specific email servers as a matter of policy instead of as a matter of
spam protection.
● Blocked List
This lets you filter out sender addresses and domains from which you never
want to receive email.
● Allowed List
By approving senders, you can automatically allow messages from trusted
mail servers or email addresses. Messages from approved senders or
domains are not checked for spam or source reputation. However, messages
from this list are still scanned for viruses.
● Trusted Lists
Emails from email addresses that are added in the Trusted Emails List are
delivered to the mailbox without any spam check. These emails will not be
validated for SPF/ DKIM/ block list checks.
This detection module scans incoming emails for known malicious hyperlinks. It
enables real-time scanning of links, including links in email messages that point to
downloadable content.
6
iii. Secure Attachment Policy
The Secure Attachment Policy intends to protect the users from malicious files and
attachments. Certain attachments containing executable/ program files may have
destructive programs or malicious functions which perform phishing, spamming, or
other malicious activities in the user system. To avoid such security threats, emails
with certain types of files as attachments are blocked in Zoho Mail.
i. Spam Identification
● Intent Analysis
Every spam email is sent with an ‘intent’ of receiving a reply, a call, or a
website visit. With intent analysis, we identify the intention behind the string of
emails received, and detect if it is spam. Typically, intent analysis acts as a
defense layer that catches phishing attacks.
● Content Analysis
The Zoho Mail's spam engine enables administrators to set custom content
filters based on the subject line, message headers, message body and
attachment file content. In general, administrators do not need to set their own
filters for the purposes of blocking spam, as comprehensive analysis
mechanisms are preconfigured and are constantly upgraded in Zoho Mail's
spam engine to tackle evolving spam scenarios intelligently. This allowing
DLP to maintain complete visibility and control, especially in the case of
outbound emails.
● Other Analysis
HTML Tag Based: Emails with a potentially harmful form, embed, iframe, or
object tag can also land under the spam category if marked.
Attachment Filters: The Attachment filter facility can reject or quarantine
mails based on the attached file's extension. If any of it matches, the email will
be directly rejected or marked as spam.
Blocking attachments with macros: Certain malicious macros in
attachments can be executed when opened. You can choose to block
attachments that include macros.
7
to thousands of bounce notifications or autoresponder emails, ending up in your
mailbox. To combat back-scatter, Zoho ensures that only legitimate Delivery Status
Notifications and Auto-responders get delivered to your accounts.
● Block
● Quarantine
● Allow (inbound mail only)
v. Quarantine
The spam engine automatically quarantines spam emails, ensuring your inbox is free
from any sort of threat. Such quarantined emails are held for 60 days, then dumped.
Admins can view the message header of the email to check and recover any
legitimate email that may have been quarantined.
F. Outbound Protection
8
the score, the more likely an Email Service Provider (ESP) will deliver emails
to the inboxes of recipients on their network. If the score falls below a certain
threshold, the ESP may send messages to recipients’ spam folders or even
reject them outright. Hence, various mechanisms to validate sender reputation
are incorporated.
● Rate Limiting
In order to prevent bulk spam emails getting through, smart rate limiting is
enforced on the outbound emails. For instance, if a user hits the outbound
sending limit within a time frame, they will automatically be prevented from
sending out any more email until rolling count below the limit.
● Spam Scoring
Just like inbound emails, outbound emails are also assigned a score based on
which the outbound email will be sent or blocked.
● Outbound Quarantine
Quarantining the outbound message means that the message is suspected to
be spam or in violation of the policy, and will be stored for the administrator to
review and act upon.
iii. Deliverability
● Increased Deliverability (based on sender' IP reputation)
Email delivery goes hand-in-hand with the sender's IP reputation. If you have
multiple dedicated IP addresses or send multiple types of emails, it is
advisable to separate your IPs into IP groups to better manage your sending
reputation. Consistent volume of emails, fewer bounces and complaints,
preventing spam traps, user interactions, and subscribing rates are some
other factors that positively influence the reputation and deliverability.
9
● Rate Limiting & Throttling
While rate limiting is applied to ensure that your email servers are not
misused for spamming, throttling intelligently spools emails based on recipient
email server deliverability, ensuring optimal deliverability.
CONCLUSION
Zoho Mail's comprehensive spam protection is your best defense against
email-based threats. Bundled with its elegant web and native email clients, it offers
the best-in-class cloud email experience, with enterprise grade mail security.
Our software is extraordinarily simple to set up and manage and provides many
features, including 99.97% spam detection, virus and malware blocking,
authentication control, outbound scanning, and robust reporting structures.
10