Audit Logs for Mail Explorer Searches
By
Every search in Mail Explorer is now included in the Audit Logs
Mail Explorer allows administrators access to every in the organization.
This type of access is crucial for responding to ongoing incidents, evaluating phishing campaigns, compromised accounts and more. However, it also needs to be closely monitored to ensure administrators don’t abuse or misuse this access.
Harmony Email & Collaboration now adds audit log for every Mail Explorer search, to track the different filters applied by administrators. It is an addition to the audit log that is already being generated for every email body preview / download.
Note – this feature is currently being gradually deployed and you should see it in your portal in the next week
You may also like
Beyond Trust: Revolutionizing MSSP Security with a Zero Trust Framework
Introduction The cyber security landscape is evolving at breakneck speed, ...
Check Point Harmony Endpoint: Strategic Leader in Real-World Endpoint Protection
In the ever-evolving landscape of cybersecurity, theoretical protection is not ...
Check Point Software Technologies: A Visionary Approach to Workspace Security
In today’s rapidly evolving digital landscape, businesses face unprecedented cybersecurity ...
Securing Data in the AI Era: Introducing Check Point Harmony Endpoint DLP
In today’s digital landscape, data is the lifeblood of organizations. ...