Targeted email attack protection



Overview
Displays a warning if you view a targeted attack email.
Targeted email attack protection is an extension that adds a targeted attack e-mail countermeasure function to the Google Workspace mail screen. (*) Targeted email attack protection is for Google Workspace users, and must be set up by a Google Workspace administrator before use. Depending on the settings of your Google Workspace administrator, the following functions will be activated when you display emails that match certain conditions. - When an user opens an email, a warning screen is displayed. - A warning popup is displayed when a URL in the text is clicked. - A warning popup is displayed when an attached file is clicked. - Warns when the link URL displayed in the text is different from the actual link URL. - URLs and attachments in the email body become invalid. Other features include: - If the user finds suspicious mail, report it to the administrator. - Acquire the user logs that hit the rule specified by the administrator. For details, please refer to the following product introduction page and user manual. â– Product introduction page https://www.sateraito.jp/Google_Apps_Mail_Gososhinboushi.html â– User Manual https://sites.google.com/a/sateraito.jp/sateraito-dounyuu/Home/meru-wu-song-xin-fang-zhi-ji-neng
0 out of 5No ratings
Details
- Version1.2.3
- UpdatedMarch 26, 2025
- Size209KiB
- Languages2 languages
- DeveloperWebsite
Email
contact-info@sateraito.co.jp - Non-traderThis developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.
Privacy
Targeted email attack protection has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.
Targeted email attack protection handles the following:
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes