CLOUD EMAIL MESSAGE SCANNING WITH LOCAL POLICY APPLICATION IN A NETWORK ENVIRONMENT
First Claim
1. A method for applying policies to an email message, comprising:
- receiving, by an inbound policy module in a protected network, message metadata of an email message;
determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy of one or more metadata policies; and
blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the at least one metadata policy.
14 Assignments
0 Petitions
Accused Products
Abstract
A method for applying policies to an email message includes receiving, by an inbound policy module in a protected network, message metadata of an email message. The method also includes determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy. The method further includes blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the metadata policy. In specific embodiments, the method includes requesting scan results data for the email message if receiving the email message in the protected network is not prohibited by one or more metadata policies. In further embodiments, the method includes receiving the scan results data and requesting the email message if receiving the email message in the protected network is not prohibited by one or more scan policies.
-
Citations
30 Claims
-
1. A method for applying policies to an email message, comprising:
-
receiving, by an inbound policy module in a protected network, message metadata of an email message; determining, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy of one or more metadata policies; and blocking the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the at least one metadata policy. - View Dependent Claims (2, 3, 4)
-
-
5. The method of 4, further comprising:
requesting the email message if receiving the email message in the protected network is not prohibited by the one or more scan policies. - View Dependent Claims (6, 7, 8, 9)
-
10. At least one machine readable storage medium having instructions stored thereon for applying policies to an email message, the instructions when executed by a processor cause the processor to:
-
receive, by an inbound policy module in a protected network, message metadata of an email message; determine, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy of one or more metadata policies; and block the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the at least one metadata policy. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus for applying policies to an email message, comprising:
-
a processor in a protected network; and an inbound policy module executing on the processor, the inbound policy module configured to; receive message metadata of an email message; determine, based on the message metadata, whether receiving the email message in the protected network is prohibited by at least one metadata policy of one or more metadata policies; and block the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by the at least one metadata policy. - View Dependent Claims (20, 21, 22)
-
-
23. The apparatus of claim wherein the inbound policy module is further configured to:
request the email message if receiving the email message in the protected network is not prohibited by the one or more scan policies. - View Dependent Claims (24, 25, 26, 27)
-
28. At least one machine readable storage medium having instructions stored thereon for applying policies to an email message, the instructions when executed by a processor cause the processor to:
-
receive an email message with a recipient email address, the recipient email address identifying an intended recipient in a protected network; send message metadata of the email message to an inbound email policy module in the protected network; and prevent the email message from being forwarded to the protected network if receiving the email message in the protected network is prohibited by at least one metadata policy of one or more metadata policies. - View Dependent Claims (29, 30)
-
Specification