
Audit Logs for Mail Explorer Searches

By
Every search in Mail Explorer is now included in the Audit Logs
Mail Explorer allows administrators access to every in the organization.
This type of access is crucial for responding to ongoing incidents, evaluating phishing campaigns, compromised accounts and more. However, it also needs to be closely monitored to ensure administrators don’t abuse or misuse this access.
Harmony Email & Collaboration now adds audit log for every Mail Explorer search, to track the different filters applied by administrators. It is an addition to the audit log that is already being generated for every email body preview / download.
Note – this feature is currently being gradually deployed and you should see it in your portal in the next week
You may also like
Is Firebase Phishing a Threat to Your Organization?
Check Point researchers have uncovered a sophisticated credential harvesting attack ...
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in ...
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found ...
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in ...