How should you implement a scan of all incoming email attachments?

The nature of your organization’s business makes your users susceptible to malicious email attachments.

How should you implement a scan of all incoming email attachments?
A . Configure a safety rule to protect against encrypted attachments from untrusted senders
B . Configure a safety rule to protect against attachments with scripts from untrusted senders.
C . In the security sandbox section, enable virtual execution of attachments for (he targeted OU
D . In the security sandbox section, enable virtual execution of attachments for the entire organization.

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments