From 4ada07f2e61de9148c332e3e82b94d460c09c8fd Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 9 Jan 2025 13:15:46 +0000 Subject: [PATCH 01/26] [Email Security] Inline deployment docs --- .../CF_A1S_Deployment_Inline_Diagrams.png | Bin 0 -> 17118 bytes .../setup/pre-delivery-deployment/index.mdx | 14 +++++ .../inline-deployment-setup.mdx | 57 ++++++++++++++++++ .../inline-deployment.mdx | 20 ++++++ 4 files changed, 91 insertions(+) create mode 100644 src/assets/images/email-security/deployment/inline-setup/CF_A1S_Deployment_Inline_Diagrams.png create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/index.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx diff --git a/src/assets/images/email-security/deployment/inline-setup/CF_A1S_Deployment_Inline_Diagrams.png b/src/assets/images/email-security/deployment/inline-setup/CF_A1S_Deployment_Inline_Diagrams.png new file mode 100644 index 0000000000000000000000000000000000000000..7cd838c8b3eb96472ef5176eb6f1f3e22ab802e6 GIT binary patch literal 17118 zcmeIacU05e_a+)dK&dJqhyuQ^3QAX+QUZdAAP|ry-9`sN>4XFY0Tlri0i^{*2qaRZ zMM4QhMWvSzLV$qM0)$XfAR%GG_jhO3{CU@1Ywns^_x_P&B{}=_bN1fPe)i{ut&O>e zpo|~@01&abaqSiWZ~y`T@Z=ui=l&8qK?~r191gwV5(WSWiSNI70J-_n+#h+uZkd|^ zs`^inxL*$XUbVgo0DQ?1+P%vM0GNbXT)XNJ%|o6N%FmC0P&SBjCJ&#TJuSs!aUk3I z``B6d%kQ3V9lkqDS|&`4lwi+}(T^OlNSCldzCEaJuBLNP=}xe9LV2a*v1PJ^xay#rnhTcZIvtp?n_A_ytnit}V^q8u&wLmYHD`lWM7K>bM z+3ME>_?>H-dkd02f^q#7IeB_uBm<1cIHApiQ5n$?T;(w1XgpT*?;(HN6Iivj8Ac1_j;~C4w&hG!;-y%GNlfR|#L3ur&E@$e0}QeQh3X zE4&v;D$OYqu%>|p#nL%nOZnyeAR_4VIulL=H&Udt2?Ke0M&MC!Mxk@@k>d5D#lJji zU?U+ZH7knp%`-(^II}Y;G}k1?-#s7G6QAD5QZut!Ly~0qUad`Fz2JCI$Dw<8f;aI@Y`zKP zvQVpeCwr3Av;zqsDpGl{9mb+X2lS3e3dVip#s2x8TInPxyVOM%M5@l}kRnUVoQL!f z-;zeg9P&C{Z(Kcp^Xj=E!T#aMWeTszAv;?f#`Fv80^L>QT1S(^%oeLZJwTK{pXxoRbVz32G3*jD?RgW1NB*$lD- zf30Ipkg+Z82BFF_;~^!Up)^oto%i`TH9EG{VEln;YN5Hb1N9Wmee@tX>ukuM(Sg$3 zQnvOGxuH$O*IP}SV6Y`>2Qap@rmXjvK24H_f_K{iGq)Z2aON2 zrT+94waIS>{;h@!+;<#~%gtX6!>ue?SIurIH^P=;E}Ul)8(?wl6)$z>1gWh>X=QKW z?zypMtL?z`S+V%b1>Ls@vQBzfkONglS127Ujrb*geSB`C0ojdRE!Sf(eS>?_OZbJy z=meXPuQQ9*#nASx1$5}k!;W79hCpj2@@zkt;A=VOr(JnJ!cXIPuzCIA01+`dp5V(O zkQxOKHUwCXbP&Xr@d0*?F&g?74Y`tCJEF7}%hn(GMZ{vo>9RZjOp8@c`b@7!jINyQ zZ&<>tL{RUD^M{g^C!C0p++u@^#nY$;2YYbi;VT5+O9XccLy8~7*56*qA){QE8b;Vj zEQ{h9nKn6mxASu$;+eaSBZ?iOrk`>bQ~8M3%kCGZL)!23fytNMqG-RIlpB!LbHvDn zeBB?%dx6tWItFzMub1#XZ0wvBa5S1hH8i+1kS+>o@A$in%PR>(W}mtXjG3TtXv9)< zmbI@~h2xU4(}`PI%AYThwAIeWRVC%76gYpVmAKW(Nhr;|q&x-OV;na1zP*7pK17V< zo30sNSV2GKcYCl0p~gjQoGuN`6G@BRy=Ps8H+JiXe#Cvcy);6u%b;`&pzOSyT!(u7 zyYb846;EhLE4NK#JER7JYhUGN+c}iFTm~obRDQf|Z!gUZ_=gZPofS~HO9I7DEHds1 zuxpmHTdlQ|1el@CU5E^c70nZL-X14y)9;?jc6T;e>L{`Mk*}|QvHd(R$K2%@Qg;BS ziIGWVH6MUlwn@lA(rm3`?XCC$=1>N7lv^RoVw>W;+@MUqJ+D)$tEt`dsJH7*2u#3PVbBpPJ$k5553X@X&{Nmh+5|X+fi=zDRHAA(&SM&m};ve6g6H zos?(vUCIDrTQcu;G*>6-a8+iwWm<=otNW{joX)~B<{@wR{f#E7`Y6A59dzk@rkye@?LsU4?n>qqoQ3(hm6>Xy8P_!$X=h|(6?R=GtjfsH2^!* z+8)Z)Z+>>br(c}=wPGEx=aYowgHQ4Q!}q#_eu4E(5jaG!DhEaY(K*ky3wr^Uh!A`9VRBhtZ5(s#fVS z=PyJOOFg?o+w^rO#g8JHGB#=+NcJa*Dc|k)oVvDa+xRO0VUfOOW1+3OGw<|nD8DAD z2sd1=i5(xAdG!=wDk$fQa*(z!8oAJJSy}S(e)RR{tMsKu{Nk?s6To;`0lgmc@zu2e zyDP|Njjj3YYXg-|JiVac9LKe@69E3~n`%4H90^oqn9ab?j@3E8aKyuBkmt3K{Mv%O z)U-)zg~{kyN&dw35W%x|yLUP`mBZw%MUrpM;1)J=8CVAy`~3#eC-|#PbbfQ;wqZQc zMjr1Pq>oh}LOLKm?HqD&OpV(yW*kjUy+r`NCo4C!GIecVtCo#&NS5UIwmwrl$kGtg z(PI9RJiysT8&y&kgC72{ujR?wwBHW?x+a0->pRXhT?eTzliIF-B9GG19ZqsQ_1Uq{ zfJ`cnaoWxk5f63GmahZE@_RhxQYP|%(f4InFK9`o@tX-R`r`oKlAfLd*xpZ4=ypoV zu&V$pzp#{lQYPipqhOu;Ank{M?vlhK;Q0h-9AG(ZP@st9kA8DK+fe8*Kv*C*ifcdr z|AzB_xeO)306_h-wXT%PEs}50wATQPNKntRcrxoL(yL37bvgSI4I zK+!MRn00gd=yytumld$DaJzw6(+y{%*?+!i1~DXWehynyudE1f{9w3ou}%d3o;@S! zv$vsCN3qsm4N=~cciQf*AL6=aT3-xxIcenRE_eOyv=A50ZC}df8m~YQg&gmzul7DT zC4QYUCLwANL~mEA>#o++r^gX7n#j; z4TXZ=Doj#Z`+^qxvPCD)J2Q^fc_2ly{-N>!2A_%U%@Bh$^yFAC=B3yb_(ZYsn%Kwi z`Mo(=i>#1Dk>6n}|GlJMd{YlU*%?#2%aXdyp<^2EZd8W2a)wj;3adWf!gm*U|M!xc zQyw}GP{e?pz-$G_y2a0G6JlI& z6*DvC6E!3i@^#-Yd_F}dXU8uZ^z5ymDi!2*stY;b48s6v;J)j4r!gLbPpPWim5mP^ z!~0|3VpwWDd*446(}<>y`_k<Y^D#484W7>R&$0s>?dt) zdxkxjzZt!et2I~c_FAJ_M^=Rbh0_xES4*5Z?B+cF^e?C}7vIpcndA9@t}fZ1!r0@C zY)b7FIxxXVacv%kEWfCVK>$~4aCp) zWXBW1y#dh(l;GD{0LDA#aTt5vrvt8abeo|rjsi~~Ku}>X`wZjSg4YUz%1?1m#S?|Gtdn=+HRH1&Yky9D27fz`{2*^M zsyQ%CS7fT~&1YtNQ9bL_iNOt2Qi(me&tir!WZ189d4CFB+i}yOO&$ymIGFg&zS1Ys z(0j+|<^j*)S9!5BMsM45v=)K%=h)w~E%@dMuV82Sortc%{i*dkYE;N!MPmO@2!E@$ zRgoWjVGVIysl9gZY_HwL?|E@ZW5-saHH%W92q2BI=9I*9EL z_&6<#*g9N=jx)W*&I{fQ z^unJ)p6)OL{&H1aNO^fbq4q4dQfQllopAp44R^^81CN>snag zDtNJV$X0&8qI;Ub==n9~M|?=jkL2$ks%s{Vpna<-b&b*g3`V+uzIiqpf_Fm*+h1;HgvkVbnKYX8rWYn9&+eZufRC?r-J~-vua(s2ov%m1PaZ4%V(Xm;PHPGgDN_l_Hy?S@RIqn z3W;hi9%sEY_g6Il1Kf~I{{5d5VG?ph*Y{%c>MH8Qe=fG7!+nPOzFVHMzU%r?e@@T~ zD?+p!l1FNI&J%X?V0Ehc87C0;S;6p=8WJdXgHDBXQe!;ZWxCMtfojO+(qVdI4lD%K zhfV-O61k>_Z6hRQtMPABKXuU_By$&D_%r3c`mYM>*te|v=dh*puwFaoq%sQx@Nc?6}FjPHKhQ7hq<;!&V5FqS~Dk1U>K(O zY5-q+)|eOj@lA^_%+H#X)os5~CDm5OTmBpY76c0r`l`Mb_sK)yU~i5qbXWif?-T$?E(E zxXCe}sOhlt6}$79N@JJ1ZnkZ8rBfTe^?#_?_PN7nf@pulgEzOo zx(#4w<4GQ@VcS<@pUOPNpi%Lx&||yk5ro&+ixTsRE8^GPlw)gKMy>o0u`*wJDq1HM{d;KWP&rlE= zA4PuP#?Fd#!+e=49LHukH7L9S`*UgxyU{`Sx(~5vFDmUx%d7nakeHn6iS2p{vGKv% zv_e0C#;WvBJ2SyJIjY3t1<$>pcXxgN-Zu{#+k+}V)->U=zIh>+`vxbdNxoB9MZ#N@ zO?^uIqh2-4T`#@pf9mVl@24>Esfp%X%qC$v3nfq1zt@~jg~SJ19;e~#XSN{m0iV2f z0a|h!5YFgYicPmVPwkiIxqxNVf6SDSoOpTkV^?=(00?p>b6vgv>C69opJZ(l?3@L~F3u`$e!>KQm9 zr_&bcwt>}gd#^=$DY_eY9QN(1x=BxFJS&S*FnMyf(GZK0857S~J%EVp9qRE8OC~>;9>qt5iJO*Q#EZ zE?TGjaJ2%OB#|q3BR4imdx*qaXp{R`(kUZ?ArhDSwiJ%Q_i-yM9>Rb6u?r|_mrDNV zG^A-hE5zMZWPgmBWAyQUF2)d3EgPa~6yZKGSq*(CXokPwA$Mi)uKC*|*rhXIl&qdl zhWs+o+Em=0m~Vg@I`f$H972Zx(q375$)4XPJ$cQ^KZr4lY8gBxegzCO6N@_uj1?3x zq|QRzBgki5>ms}rvf?FnCJBkqz8?j@-^S~Q^YbQ^@8}x&BHJR`WgH`^8>*Co zd+m32_LoNaq2EpOj%2;9X;>B1G1Snh_=1bXcIO3`{9QT%K!omOK*O;;35azeP6jf`Ly02 zCBx!O5tl7<8zq%8+i}`Dka#;)bHnq`f7N>TFxl2TwvI+03}PNrn1TUiDHq^V-Qa}(xvS<@A>{G+*E#>&BW71^?gn=x z@IkU;PQPnxY@A;B+n1*cUnxgRS0&DNIrs9<`fAvIMW6FuupaQzf5qK45Rqy~*}yxM z<-|h{Zjow6Ntn+CbV!WF4%)7JzM@=TIkEm@l;k}1`DZf`OG4#&`Kh4 z%si7qr8tgmng0psvo`*Zn$mu6on`%WfRSfKJi0E{>gL-h7@X#9_>-8Yr4-5jaVC;Y zWN1|+$6m)e`97!y{d!!~z7uZ*1`V7Y#!fJ>`7C^Ol`apf%QMpYVPi-t&2U$B`x0#>!!HG0cwNa{IBE)sHfnfZ{>w4$p@CN! z5Q^SjDJ~l?w*6_}V9Tgjm}&(x=s=xh`QmDxBwvj~195hN$hHPdl;v^jkI3Mn%oxZd zn9|yMX7(Pu!Fa{MX%TnHtuu5pN4lUFKg-QIzp3_VIw%zz1YKl=HI?e?-2q1P}q`%f$yi zF?LMv&pe+licKI^_-}7E?K&hOvkHg042jh6cI;VnIqZa{&nNkJz)jUi;MZS?#6~!i z-ym%XGG}aVwz!H#?=@gbmfopwZ6il-y^oNTO`W}D-o^)gvs%4VJ8v#V_J8Q=3W#tu=ZSSZF?WlTkx{p&-$^>`h1`r})0k-^rsEGbi0@I&(^A zqRea8c6HM&6%%j}TN+X}Nlwi8BA<~XQDRjB0GX>=qOA|e!(nyo-QO<9q3Qn9Mtnhz zC%PiIVAeZM)rtwGBvMPvVj7fm%X*|bZekzPcQUuVc~z8TP=qrq(zze;t}c}gPT_)GP@Oc>J?8_ z5T_R!&+v6+t#z9(IiV@abL8kMf{tNq@7UgwpWbcL9tpbE-ZWwF&O2*quV_yYUmLD) zaO<|wbo^*~IBl;JGRs#ooSI^!y|euB#r$GHe16}19VPY&Q~02wAQWh)(IHm(3Y4z! zaY4=Tj27BSTpqhff+QLocB(Iou%!LkSbRtGVhIHQ6+(&BJ?88lixHj4P`E#yIU z0!-$jVA^1o#=1y7MS1YTWJLn%Z&MYO5frbl{g;#Rp@gg|^-4vC{*9M7E`@x?38Xq3VAfo4+P*U!C~&T~Ul*yTDqycy); z`X8NfSz`mR}Gyc8FDQqBOBk zAL?+dU!hH6`k7O8chC`uk?cdzUpx}-L-asZdPdGH;K>)T4rAUMah6iFjgb=~fLj+@DF)wl>TYpLUX{(-OI>p~fXt*RFgY=o8GEAB5 zrttKO)@mnRV{y~exHcQ>7S~1<*;B*lEMT9M_PZC?Q*IWwJFiMud^v2Mk9${K5xf4U;g9n6_kzHE;Yjjx5`&F1!FuSNe8)>gzs`z zsAV=b6;z*82j+)bSw1Xbyj%;MPq<)){F`MvLMGk6KK`paO$Ax&{F|iC|0B^O27JkX zb7}zf|YUvpXd?SJLYOpnqJ}QM(;A( zQ=~5ve8ugGw!;20cdm9R6^MEw{Lasn+M~}tRVT9;6(h`3)VR~nJ7Elg&)+`)ZBHEV zx;vpO*?)~ierv_xI}G<4dZ!|{9ov6*YEP)I1(#0o@bY?_-FEvQb=(E6hutK89iFHa zaCEztDvjWfE_z)|_IF8s*`9LyC^Pqo=yk-sXK+hu=3c`**Kb+OZUk0@bh^6tI z=|AzAu>EWReVy$$T4DnL&8(d8SYx#+4dr^458EwdRaL7StyDo>WR8>82AMwn`4%&# z@3?yVH|t`>UZIj~Kr+IcMlR)mO2Dk0O2M)ip5?3J&si4TlAYPkm)q~19~}UBeeQ%p z0fUxYF@@Fcvx$}A!q-9C8}qHQ^V)17NwLvHIygxs&5D6&G`ZcnlOs=AL@fxUd|sok zYOuD$>*POQ0+cJ5c=1{&2jPI3=`CC+7TYvDt7Uuk)Xc1Pu(4|No?((oQl+bNgTPyx zt;e)qlAyo0w7on>#dme4?u||7`+fxszUQ|8?`pSJewHY_hGgwAJ&-Yz5+KBSt#*@z zEtu5seK7>SGacBoV(O;7hwcm_{3wJiR%)HZ#qCRf{dn?Y)5g#zL`@LJF`(9@14(#3C{8DZmj!J>R<2!$iTpIchny(-Y2dz%8>=!QHzb+mYQ0_`?Of`(fzk5 zi*Uf9ceRltSMyk3d`HwopfXpb+1r3o$>QqtP7W9muI0Md`Z#G(#nH&f`d@1!BZ(3= z^zQJdyuyFUC2(p#FTPiAYo{~bR=iSeUiyJi+nK2t-X|TWso1NR#Xi)Vly(ic$n-D5 zElM4K@mymiP#C~tE%<(aee%1)jGt5L)TwHHp?S5wiYV4(;ms=@A+Oonf`;_9#paQ= z4uGv7?3nh#*6WJD=m88)FiUiCQ3cCmo@p8Q*neRw5u{bc_H+z}ZGFL8K`v5d4JM;@ zI8_IJ-7E&BO3v{MLhl*@wO5=5GblHrhyXMzsW5osi6G$n`UN}F=?n{jcAv`dcV`TI zE1b0>YRvQNiC_%Yr#b+nAM=140?UCUj=iZmAQ{YuQr4k5tXc9IsS2?+3NV98L(^CW z!?!U0BDJ8m`^uBy?RVuzDczrdA=B~IS>{d2iz>7kb0f_560rrfHyzPOj1O6;?<@vc zf97M2iAe0meef#~T>LxoSMKM*{$LPo7kFQ$WQph95BRmL3i%N(HcP1tuNWS(>}x9B zzH$?b8Ccxf8p`zxW1z6c?oTsp#h|d5i|dfsZ2bH$if`|#{}>G#=L$CgXV8f0De+_W%)BcFly!h57x8>^ zAf4fFFR$B&f&07M~O zxrPmDb>q`8++y*=oJ_m%KE@f4qEGmtt>lvq=ZX1Dyx2qfC#Vpd59T7d!6Fe zp2!9aDBcZe>C4mXckK)8mwl7m#zKYTlR~0NXY3tO{hwY$jXrmuJ?WF^CB3b*+Pz4B zpagM?A1e@@yS@8kh#$bqg=c?0X4VydpJJ1{ew9usoW)ji?V*I$g{;aG2Gbh%KTTa} z>sbRA)q$2W6*Cp4>$SGkT6yjP5E+Bc=Pv5}{nv9J zH)i#V>93AvULW7L4DCTdQ)S-|TWoCRYlbz_7TI~xFss~}0U6EO=mwC%HU!Ff-H&8_ zo8?GuRT@z&;Q<>wiroEPTrC(kr*wpuHg%KN>ll@@xO>n2ln?7x{P$)7_Bzo zf$!>$TH3jh?EzdM$DHyKzp$(K9@PfF>LwT3bXdbJ(lo#|rj&0uY zld&bGJfossM|p~@kkyxgvb`HgA*WUts7itK`Enx{)yOwkuAd`w;jG4iJ$b#00ZpI`X7 zX!LN3AYYgJYcY7$E3Wr?KFzX6ac_zZ3#qG$3m$0EqF|B1n_vBti@6bLV?GCOx2Dh* zRc7x$%`s#1%YQ&$Oi{V2#D%O2T|j zIvv>t2+P9$1!x?^&p4N7!2F*4z);9HSgZ;JyvBKn8c<8~h48|1-|*Zi=h784uH9X? zm&e@e07)9Atvb$g=P1c<@CP{+`&(K5G$EuY+OTxj>EzTWBwDRfU;Yd^J^=OobY z{+4y-p*R5IB{xRq_%^vAPmyM`_)%eE^@F}3iG+zdTe(SkB`+99o#nL+w(1uKIF^yz z%M^-(zdKKi%tUcL(N#mKjM@>K<&$#`QzPN(QLWKxUe+zW262FZByOeJMFGSXoUCsu zFl>-}&==iXDXo6>9^1)<86K)zbwT9__(*fbZvj9l16GAUjW+| z`wIfOn06f(WxlQH^5tIA)Z-piosek*H`K#|e;&4}OV#b$mR=R5tH7p5f3LgM`@QM= zpxNzI?HSw`M4o79eDLd7-j%Sj;OUkt9%ZM?d**&+jtFT;obd!=H^Gr^)@e%>CrHA> ziq@A0&}cCi)%nL~L`=<>kRN^63vG8g4iIX+Z^nu|r}Qw7X`YIMwamS}sWMsSRGv<{ zQt5?h8whhlhx@y-N0J!-BnPa{!!&x_g6DTrjy7&52vm+eRyRDI{AAGCT<=a6Q-MOH z-<0)Jt~ewS+hWq=@aVi_fr@W)IHpVTh^;;W6`~HFddxtr2A^%F2-kx|>t&PHG(WLj zEL&54<0;BhYE#adjr>LUxzB|sUKo!VER8suj=(`6%i*T_d&RJb50|_xC&DE+7qr-Y zAthxhMj9`mW3}s0D){!!AO&5y=EaZ#7LF-5iZJo=_71`8M4B#9&4cQ0f^@1}W<*Un zN!9BRiS-zVT8u>`X2`6^{i|4ZU=d3~TYMl_TiIg(=NJ~~SHvh;Gwq?GUOz0EhsMvc zhEV3HKA^5D?vl&b(7P0{A~?PuWx?Q+*vuegOju`}svymiOsCX=uD5PYwhgbo$O{0I zCVi##lpqlr@toay^|zuj0b?$0aZP=NhWZ`~%uw9Z>zI{4eFm;X*0{ecpOT~T=zs;I zB!b#e4ZV8zy9uPYlg6c_m$Ak+O$fHn$41!8#-F-}be5ZhwCxwK2#gwz6Gn8lKX${-{B9A_{I(pf|&^ z>*2RA9tjg~1tuw_P8^@Y6ef-h1um?BZ%`GyD*sA$b+p(#@A5^-Hl#J{S7!Ub^nTmG ziqLk)n2jF3W01js<#~$LF(I}`%F97#0lh;p=Z8^X$nzCKv%KxD>7>|sXO9R+X0WHg zO+F*Y;L4ws?WfiPin0>nUg)%uj!yk%-~JbGid;8uX`?A&j*X~S^=!54 zhKj}OwIkw>xtbQg32O|ZV3vR+j|_C`3Rp<07Lmsie35pH}| zdoDeOeml^LZaSkRp?unWB1a(BXu0*c6S1e1B_eRc8##}TkIz_vEc1YHv1+bs9(q*f zHspYDDK}7c1Zuo;`mgnsKk|R%a<9p+ff;LLluhHUnXD(PSI@>7RM$(m>Kv(D%vfaC zhOcixU8n0;1#I^|4C3^DAC{WcYr{ymE6QU_0b9pCN?N3ILbgdVJ1HC+pS8y!#6=1W5i1xS03Bn_|$h>(9eskJ|uZM z-no2}M_R>%sIk?A?mWSy%~nBe^=^}RiMXMs-MFC!`GcK1ZOgy9%0>T7D_RiJ#%3Xx zyL#?086=Ue0r4VEd>29+4c`&z*| zK}=(%*6Y*337j|pf9jxaFO{cC;gtOO;?#^MG|?%&pAT>wS0!D6?gBj8@R-cZvW`JB zcKM)QC%aEQAmEgsn3v!!AhyRA=_?o*8}B!hNJ(Yl1q@#(J(%#)zVnSs>wSZkqyLUE zS_ZOxY3!{F&dHlVDkCk#P5Lv0P;Zsd5%-?kFc9MShxoHAF$egWFfqYY84+k46Y6>+ zYU5g!SP@^dQglr2T79}w;BuWqkSqpdZ8WQuI|l#sQ*9(-yP4QFsB=6P=nCq)2fQ=_ zpZnRLmb~zX_4s0&y5t1WQgw@MU2GYTYg;YuWdwUEHj6PS-w$NKhOJnI&OH)84VHGc zZq-$1L`ymHHhB3G19@BJ4d+Nu>Uiv_sp^N$%d`vB$!}gEhCVugl}B+$Bz;!^8WOn~ z|G)|oie<{YcIx}CguJTsjC)(GO*##SCg~kXvi9_BI`R9tIlyq&@Er54S*aNB2i8=g zHVjTlk&+8pgndTaq3}_PSZHAzk?>IGVQxch6V52lGvq(CR_hL~L}J;?m!NMe*h6LS z00{HD19`Dsh;sm8{$jDj1z&C3%-j^iBqQydq^*3O@_f*-%0W2e9Y{|EkZ88l^}1aB zRt3ikz^`badCQ)lxBI)2*-p^g8tkEzaF>ddXg(=)+Ow>tP-n$aBOapMyoY zS{EK&-uRMhuyRq?oBjwJlEvk{ei&*Y0JM&L96b9KS|L#I#yE4Hx$CVrL;9jEAU}9W z>qK;Ptag0-yIiSTnOZ60Dl0u{P~7I~1zvUt@SYR=#mL_cvqQ$n(^PGM>>b3TSY+|w zlCkV$T<2|~g7pt!tpkpXxPa3eBb|~bu?VFC=NiMA3mVHG=b^5eaCJjh(3Z{e#d^=} zXu#kq7x=hVj2wS4BlOEj$)G&zmWumwd(*=yz1-@-@OmRDJxZl>Wt~HZ{cC$kLdfFc zAeJ*QdLH1)b>3h2=>&U(Yixz3EPq6pHNLoP@TeK~c`BqN&}gxIgo3675qa>A` zs5>64M&^tpVtA+Nv)PnPeN}&qa@#3@>(S!s!z4f{qDa(J?+&TGbotuXUY5p-1F(lB z3rdbxw5kg`J-&(#zN*I{50B+NE?}6cM*2uw%T*Cbt$*08_hHA3k!PsdM;sMeau=oe z&?otKo$59VY?(%Ej5xqJ=v}Loqc%d0~)H^9s8*PwWWT zO!6us4&W+l->7wjVj!1$@&0uTZP&PrX4tYr?)0{iG?pEAV2?M2Dc%)RJ!e3vOCXe4 z=fx^Vl`_kdDLi{`ufd!Em9GYI#uEM9D4Gr}YO|lDSH3gX*mcEKy8Jk~2XQA*-nn5Q zFH&0&CCz6*5m+jTadcGI4iyCC%Jwy@+6ZXM3QN-Cv}$r=J|rKgyyhW&4dTpo$XQIu zlJ-TcaYWksa&)BeAwc~xF4DE3P_|ks(}H)7Tf0=`xSb!{=9RMygWHyu-SGlZM5=3) zwKk^#gNXf=?Yo5qo=JhJYZ-_?y-psEI$Zf9vCzc5qRwx7=6ofE!pnD^!gBRnmjKis zU~+ep$k=&b#B-CCau;Rrn6Ot_B1|oyZF50IcFqB7>l?*)HDrNC^4yIw((E3suov+= zm>c`k9KY;JNvX+8NXSE9@`KUl@wEB@a9v2`F`riTPTCsxYNr}@O=kJ&toVRxAm&?6 zHx*@bz#H&Sk<{jl5A)5R%YImE3Kwv&n}?B&Bxhi7SpUiUNGaF@fW~cvRZ7QAuX~m> z91{B%Vexfz<_JLg<^O!LdCm6^q5aQP(j%TCr=<}t>+J~7KBLh1;69}paP;)P9enM{ zJ{|6V*&ov0Tn^p>mvh0T&ra0)o8bsw?wiLN#%#_}KN6ik-@cpU{`dtqP(P46#H6i| zr@<8K__k#PGH9XqgVTjpQS_4bg$Qu#4_6S*6|~~Jx3(wh!pTJ`DRD%W<_G4Ns$~GU-kb{_lJa^`B%c2s$R{J!5D9$<0>~2hgR`*l_z$> zT$>)3s=9xzLA~YL=*FnKUC9a6NlP)xE&hg;CAfQB7r;MybdyX#F{WYvVZN|EaOg^< zSNlQuoQlr#!NI|#2E-Hm%h^{aG(TtUC&rd*R);28zYx^9drsw3yK_0-j!{CWXu5nd zza_VPo)dj{E3|^3=lDH*Ljh~jH(WY)SUIN2UCl#%QVx%f2&6>%T$qWOvA-|-<@tzS z>rT7aN}{R7ITeq>XJx>6P^S$Od@L>&XRYMky0T-237KwbVo=&tDq?9I_x@mrtfA-E zbTy0fWDj4;bSocjgG>+p>3O!f7ggzQQGPQ7^>7MJjS6mtf=qlVjiil;g8Ax{he*sy zW6~HBbwxQ6p5r`GRo!nP=cwVcB_;+aK%$nQ7ngZxspy ztHF+j+=X-r!Cb*qB76{^{AIO^moIku*t>9j8gx1W%xqQ)ay8E=ooBlAv~0q=hbVtm zn2)vDqSpxJiyynO4RSc;SpBFqtLg@oRs9Me#MKCF#ED&@Eblq{wK`qfQsegIQ%%VX zd=MV`Y38GkWztbqb?sW`IFCv=>&R3J6R}h72!~}_I#D3ZV9E5|M!^pO_Z(l}+SBK2 zt+8-IVZXC5JJ0WhymaDbH#%?MTC(?ZC>q@wg2akf3b?A`^kVZvV=lN7_p7G*-svDe|M!=BzE_EJ*AItRjHQ?L?F3Z;YR{gQ5QvvEGD zdAd+>&h=K61#O* zV3vA3OIY{&!xcw^5T?VnUGyzJtG=#f9GnrHhvnCX+>`{&r_F zLecL&KYh5evORif_T1s5))k3drdf`6Pc|*a05)beaAwYabR1ycxWxI~KB{g}vszbJ z<}vh66;GpX&%RUn-l*T~*^0gYJ9{!!|GyHQ8m}y-ec?tEFL4Rti<#0Xz6t9V$z420 z@wB*!tRU^d5aiLiOa<%Zutp(F+5>?&;c&ve6^WIw^6sG};=PsavxE4n@*G`l)s;qI zsntK8Z$@trZV`@6!^@A|4l*RJJsm^l{7>2-?VG~>Z7*E+Ul~jP%kTaFH+0MYHf=n$ zb24>{l&h2U3fAN*RtYXe!X_{BvGsiyvI$HlZlBV-pRUU#nh)<&VFE7XxNjcbe^Nr= x@A=2neg6D&9xjUYf5a0JUf)#vuZKLa_OL2W1WT)8?zRE|EX-`KRhisL_;0q5)A9fS literal 0 HcmV?d00001 diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/index.mdx new file mode 100644 index 000000000000000..d659ffda51d84f1 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/index.mdx @@ -0,0 +1,14 @@ +--- +title: Pre-delivery deployment +pcx_content_type: navigation +sidebar: + order: 1 + group: + hideIndex: true +--- + +import { DirectoryListing } from "~/components" + + + + \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx new file mode 100644 index 000000000000000..502875672d915fe --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -0,0 +1,57 @@ +--- +title: Set up inline deployment +pcx_content_type: concept +sidebar: + order: 2 +--- + +To set up MX Inline: + +1. Log in to [Zero Trust]([https://one.dash.cloudflare.com/). +2. Select **Email Security**. +3. Select **Monitoring**. If you are a first time user, select **Contact sales**. Otherwise, select **Set up**. +4. Select **MX/Inline**. +5. To start the MX/Inline configuration, you will have to complete the prerequisite setup on your email provider's platform. Once you have completed this step, select **I confirm that I have completed all the necessary requirements**. Then, select **Start configuration**. + +If you have verified zones on Cloudflare, continue with the following steps: + +1. **Connect a domain**: Select your domain. Then, select **Continue**. +2. **Select position**: This step allows you to choose where Email Security fits into your mail flow and configure position settings: + - **Select position**: Choose between: + - **Sit first (hop count = 1)**: Email Security sits at the first hop.There are not any other email scanners or services between the Internet and Cloudflare. + - **Sit in the middle (hop count > 1)**: Email Security sits in the middle of your email processing. There are other email scanners or email services in between. + - **Position settings**: Refine how Email Security receives and forwards emails: + - **Forwarding address**: This is your mail flow next hope after Email Security. This value is auto-filled, but you can still change it. + - **Outbound TLS**: Choose between: + 1. **Forward all messages over TLS** (recommended). + 2. **Forward all messages using opportunistic TLS**. + - Select **Continue**. +3. (Optional) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. +4. (Optional ) **Update MX records**: + - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under Your mail processing location, select one of the following: + - Global (Recommended) + - US + - EU +5. **Review details**: Review your domain, then select **Go to domains**. + +## Users who do not have domains with Cloudflare + +If you do not have domains with Cloudflare, the dashboard will display two options: + +- Add a domain to Cloudflare. +- Enter domain manually. + +### Add a domain to Cloudflare + +Selecting **Add a domain to Cloudflare** will redirect you to a new page where you will connect your domain to Cloudflare. Once you have entered an existing domain, select **Continue**. + +Then, follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/). + +### Enter domain manually + +1. **Add domains**: Manually enter domain names. +2. **Review all domains**: Review all your domains, then select **Continue**. +3. **Verify your domains**: It may take up to 24 hours for your domains to be verified. Select **Done**. +4. Once your domains have been verified, the dashboard will display a message like this: **You have verified domains ready to connect to Email Security**. This means that you can now set up Email Security via MX/Inline. +5. Select **Set up**, then select **MX/Inline**. +6. Follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/). \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx new file mode 100644 index 000000000000000..b36374a53910b4e --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx @@ -0,0 +1,20 @@ +--- +title: Inline deployment +pcx_content_type: concept +sidebar: + order: 1 +--- + +With pre-delivery deployment, also known as Inline deployment, Email Security evaluates email messages before they reach a user's inbox. + +Email Security becomes a hop in the SMTP processing chain and physically interacts with incoming email messages. Based on your policies, various messages are blocked before reaching the inbox. + +When you choose an inline deployment, you get the following benefits: + +- Messages are processed and physically blocked before delivery to a user's mailbox. +- Your deployment is simpler, because any complex processing can happen downstream and without modification. +- Email Security can modify delivered messages, adding subject or body mark-ups. +- Email Security can offer high availability and adaptive message pooling. +- You can set up advanced handling downstream for non-quarantined messages with added X-headers. + +![Inline deployment diagram](~/assets/images/email-security/deployment/inline-setup/CF_A1S_Deployment_Inline_Diagrams.png) \ No newline at end of file From 5aaa6590380d0fc28270668d055ecb7db946bb2a Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 9 Jan 2025 13:43:58 +0000 Subject: [PATCH 02/26] Fixing link --- .../setup/pre-delivery-deployment/inline-deployment-setup.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 502875672d915fe..7a7cdecf84d775e 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -7,7 +7,7 @@ sidebar: To set up MX Inline: -1. Log in to [Zero Trust]([https://one.dash.cloudflare.com/). +1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. 3. Select **Monitoring**. If you are a first time user, select **Contact sales**. Otherwise, select **Set up**. 4. Select **MX/Inline**. From f612335d5f1946f54a77338262f434c80fb0a354 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 9 Jan 2025 15:20:35 +0000 Subject: [PATCH 03/26] Apply suggestions from code review Co-authored-by: Jun Lee --- .../pre-delivery-deployment/inline-deployment-setup.mdx | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 7a7cdecf84d775e..8a5b6aec0cbcc87 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -11,14 +11,14 @@ To set up MX Inline: 2. Select **Email Security**. 3. Select **Monitoring**. If you are a first time user, select **Contact sales**. Otherwise, select **Set up**. 4. Select **MX/Inline**. -5. To start the MX/Inline configuration, you will have to complete the prerequisite setup on your email provider's platform. Once you have completed this step, select **I confirm that I have completed all the necessary requirements**. Then, select **Start configuration**. +5. To start the MX/Inline configuration, you will have to completed the prerequisite setup on your email provider's platform. Once you have completed this step, select **I confirm that I have completed all the necessary requirements**. Then, select **Start configuration**. If you have verified zones on Cloudflare, continue with the following steps: 1. **Connect a domain**: Select your domain. Then, select **Continue**. 2. **Select position**: This step allows you to choose where Email Security fits into your mail flow and configure position settings: - **Select position**: Choose between: - - **Sit first (hop count = 1)**: Email Security sits at the first hop.There are not any other email scanners or services between the Internet and Cloudflare. + - **Sit first (hop count = 1)**: Email Security sits at the first hop. There are no other email scanners or services between the Internet and Cloudflare. - **Sit in the middle (hop count > 1)**: Email Security sits in the middle of your email processing. There are other email scanners or email services in between. - **Position settings**: Refine how Email Security receives and forwards emails: - **Forwarding address**: This is your mail flow next hope after Email Security. This value is auto-filled, but you can still change it. @@ -28,7 +28,7 @@ If you have verified zones on Cloudflare, continue with the following steps: - Select **Continue**. 3. (Optional) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. 4. (Optional ) **Update MX records**: - - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under Your mail processing location, select one of the following: + - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select one of the following: - Global (Recommended) - US - EU From 17503b8b092717293208d17ef466c5148f43bb9d Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 27 Jan 2025 10:14:27 +0000 Subject: [PATCH 04/26] Updating steps --- .../pre-delivery-deployment/inline-deployment-setup.mdx | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 8a5b6aec0cbcc87..d42bfda2f86d23a 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -26,12 +26,11 @@ If you have verified zones on Cloudflare, continue with the following steps: 1. **Forward all messages over TLS** (recommended). 2. **Forward all messages using opportunistic TLS**. - Select **Continue**. -3. (Optional) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. +3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. Select 4. (Optional ) **Update MX records**: - - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select one of the following: - - Global (Recommended) - - US - - EU + - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select your mail processing location. + - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to thew new MX records**. + - Select **Continue**. 5. **Review details**: Review your domain, then select **Go to domains**. ## Users who do not have domains with Cloudflare From 368338d01c65615f3dd536a776c810a7eeb641fd Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 13 Feb 2025 15:40:48 +0000 Subject: [PATCH 05/26] Adding prereq steps and egress ips --- .../pre-delivery-deployment/egress-ips.mdx | 103 ++++++++++++++++++ .../inline-deployment-setup.mdx | 4 +- .../inline-deployment.mdx | 2 +- .../prerequisites/google-prerequisites.mdx | 56 ++++++++++ .../prerequisites/index.mdx | 14 +++ .../prerequisites/office365-prerequisites.mdx | 42 +++++++ 6 files changed, 218 insertions(+), 3 deletions(-) create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/index.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx new file mode 100644 index 000000000000000..a4d7adb676cd8ea --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx @@ -0,0 +1,103 @@ +--- +title: Egress IPs +pcx_content_type: reference +sidebar: + order: 4 +--- + +When you set up Email Security using an [inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment/), you need to tell your existing email providers to accept messages coming from Email Security's egress IP addresses. + +Refer to this page for reference on what IP subnet mask ranges to use. + +:::caution[Additional information for O365] + +Office 365 does not support IPv6 addresses nor the following IPv4 subnet mask ranges: + +* `104.30.32.0/19` +* `134.195.26.0/23` + +If you use Office 365, you will have to use the broken down `/24` subnet mask IP addresses. Refer to [Office 365 `/24` addresses](#office-365-24-addresses) for a list of supported IPv4 addresses. + + +::: + +## United States + +For customers in the United States, enter the following IP addresses: + +### IPv4 + +```txt +52.11.209.211 +52.89.255.11 +52.0.67.109 +54.173.50.115 +104.30.32.0/19 +158.51.64.0/26 +158.51.65.0/26 +134.195.26.0/23 +``` + +### IPv6 + +```txt +2405:8100:c400::/38 +``` + +## Europe + +For customers in Europe, add all our US IP addresses. Additionally, you need to add the following IP addresses for our European data centers: + +```txt +52.58.35.43 +35.157.195.63 +``` + +## India + +For customers in India, add all our US IP addresses. + +## Australia / New Zealand + +For customers in Australia and New Zealand, add all our US IP addresses. + +## Office 365 `/24` addresses + +Use these IPv4 addresses for Office 365, instead of the `/19` and `/23` subnets: + +```txt +104.30.32.0/24 +104.30.33.0/24 +104.30.34.0/24 +104.30.35.0/24 +104.30.36.0/24 +104.30.37.0/24 +104.30.38.0/24 +104.30.39.0/24 +104.30.40.0/24 +104.30.41.0/24 +104.30.42.0/24 +104.30.43.0/24 +104.30.44.0/24 +104.30.45.0/24 +104.30.46.0/24 +104.30.47.0/24 +104.30.48.0/24 +104.30.49.0/24 +104.30.50.0/24 +104.30.51.0/24 +104.30.52.0/24 +104.30.53.0/24 +104.30.54.0/24 +104.30.55.0/24 +104.30.56.0/24 +104.30.57.0/24 +104.30.58.0/24 +104.30.59.0/24 +104.30.60.0/24 +104.30.61.0/24 +104.30.62.0/24 +104.30.63.0/24 +134.195.26.0/24 +134.195.27.0/24 +``` \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index d42bfda2f86d23a..3f90f7d37b37ed6 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -2,7 +2,7 @@ title: Set up inline deployment pcx_content_type: concept sidebar: - order: 2 + order: 3 --- To set up MX Inline: @@ -29,7 +29,7 @@ If you have verified zones on Cloudflare, continue with the following steps: 3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. Select 4. (Optional ) **Update MX records**: - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select your mail processing location. - - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to thew new MX records**. + - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. - Select **Continue**. 5. **Review details**: Review your domain, then select **Go to domains**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx index b36374a53910b4e..eea55f3a23b6ee3 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx @@ -2,7 +2,7 @@ title: Inline deployment pcx_content_type: concept sidebar: - order: 1 + order: 2 --- With pre-delivery deployment, also known as Inline deployment, Email Security evaluates email messages before they reach a user's inbox. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx new file mode 100644 index 000000000000000..d0ca8c49e42d4d0 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx @@ -0,0 +1,56 @@ +--- +title: Google Workspace as MX Record +pcx_content_type: concept +sidebar: + order: 4 +--- + +In this tutorial, you will learn how to configure Google Workspace with Email Security as MX record. + +## Requirements + +- Provisioned Email Security account. +- Access to the Google administrator console ([Google administrator console](https://admin.google.com/) > **Apps** > **Google Workspace** > **Gmail**). +- Access to the domain nameserver hosting the MX records for the domains that will be processed by Email Security. + +## Set up Inbound Email Configuration + +On the [Google administrative console](https://admin.google.com/), set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?hl=en) with the following details: + - In **Gateway IPs**, select the **Add** link, and add the IPs mentioned in [Egress IPs](cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). + - Select **Automatically detect external IP (recommended)**. + - Select **Require TLS for connections from the email gateways listed above**. + +## Set up an email quarantine + +[Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#:~:text=Sign%20in%20with%20an%20administrator,t%20access%20the%20Admin%20console.&text=Manage%20quarantines.,Click%20Add%20Quarantine.): + - In the quarantine configuration pop-up, enter the following details: + 1. **Name**: Email Security Malicious. + 2. **Description**: Email Security Malicious. + 3. For the **Inbound denial consequence**, select **Drop message**. + 4. For the **Outbound denial consequence**, select **Drop message**. + +## Create a content compliance filter + +Create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine: + - **Name**: `Quarantine Email Security Malicious`. + - **In 1**: Email message to affect, select **Inbound**. + - **In 2**: **Add expressions that describe the content you want to search for in each message**: + - Select **Add** to add the condition. + - In **Simple content match**, select **Advanced content match**. + - In **Location**, select **Full headers**. + - In **Match type**, select **Contains text**. + - In **Content**, enter `X-EmailSecurity-Disposition: MALICIOUS`. + - Select **SAVE** to save the condition. + - In 3. **If the above expression match, do the following**, select **Quarantine message** and the **Email Security Malicious quarantine** that was created in the previous step. + - Select **SAVE**. + +If you would like to quarantine the other dispositions, repeat the above steps and use the following strings for the other dispositions: + +- `X-EmailSecurity-Disposition: MALICIOUS` +- `X-EmailSecurity-Disposition: SUSPICIOUS` +- `X-EmailSecurity-Disposition: SPOOF` +- `X-EmailSecurity-Disposition: UCE` + +If desired, you can create a separate quarantine for each of the dispositions. + +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/index.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/index.mdx new file mode 100644 index 000000000000000..e259e0ad64299f7 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/index.mdx @@ -0,0 +1,14 @@ +--- +title: Prerequisites +pcx_content_type: navigation +sidebar: + order: 1 + group: + hideIndex: true +--- + +import { DirectoryListing } from "~/components" + + + + \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx new file mode 100644 index 000000000000000..70c897731aa5e18 --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx @@ -0,0 +1,42 @@ +--- +title: Office 365 as MX Record +pcx_content_type: concept +sidebar: + order: 3 +--- + +In this tutorial, you will learn how to configure Microsoft Office 365 with Email Security as its MX record. + +## Add Email Security IP addresses to Allow List + +1. Go to the [Anti-spam policies page](https://security.microsoft.com/antispam) > Select **Edit connection filter policy**. +2. In **Always allow messages from the following IP addresses or address range**, add IP addresses and CIDR blocks mentioned in Egress IPs. +3. Select **Save**. +4. Microsoft recommends disabling SPF Hard fail when an email solution is placed in front of it: + - Return to the [Anti-spam option](https://security.microsoft.com/antispam). + - Select **Default anti-spam policy**. + - Select **[Edit spam threshold and properties](https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about)** > **Mark as spam** > **SPF record: hard fail**, and ensure it is set to **Off**. +5. Select **Save**. + +## Enhanced Filtering configuration + +### Create an inbound connector + +1. [Set up a connector](https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail#1-set-up-a-connector-from-your-email-server-to-microsoft-365-or-office-365). +2. Select **Partner organization** under **Connection from**. + - Provide a name for the connector: + - **Name**: ```Email Security Inbound Connector``` + - **Description**: ```Inbound connector for Enhanced Filtering``` +3. In **Authenticating sent email**, select **By verifying that the IP address of the sending server matches one of the following IP addresses, which belongs to your partner organization.** +4. Enter all of the egress IPs in the [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/) page. +5. In **Security restrictions**, accept the default **Reject email messages if they aren't sent over TLS** setting. + +### Enable enhanced filtering + +Now that the inbound connector has been configured, you will need to enable the enhanced filtering configuration of the connector. + +1. Go to the [Security admin console](https://security.microsoft.com/homepage), and [enable enhanced filtering](https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors#use-the-microsoft-defender-portal-to-configure-enhanced-filtering-for-connectors-on-an-inbound-connector). +2. Select **Automatically detect and skip the last IP address** and **Apply to entire organization**. +3. Select **Save**. + +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file From cd0ef710cbc4cfd05dce6f234b7d0fe126a53539 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 13 Feb 2025 15:42:21 +0000 Subject: [PATCH 06/26] Typo --- .../setup/pre-delivery-deployment/inline-deployment-setup.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 3f90f7d37b37ed6..8fe6f79c62ac05c 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -21,7 +21,7 @@ If you have verified zones on Cloudflare, continue with the following steps: - **Sit first (hop count = 1)**: Email Security sits at the first hop. There are no other email scanners or services between the Internet and Cloudflare. - **Sit in the middle (hop count > 1)**: Email Security sits in the middle of your email processing. There are other email scanners or email services in between. - **Position settings**: Refine how Email Security receives and forwards emails: - - **Forwarding address**: This is your mail flow next hope after Email Security. This value is auto-filled, but you can still change it. + - **Forwarding address**: This is your mail flow next hop after Email Security. This value is auto-filled, but you can still change it. - **Outbound TLS**: Choose between: 1. **Forward all messages over TLS** (recommended). 2. **Forward all messages using opportunistic TLS**. From f796b60dbc4576ca4952e2b85e351da27eedb6dc Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 13 Feb 2025 15:54:46 +0000 Subject: [PATCH 07/26] Fixing link --- .../prerequisites/google-prerequisites.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx index d0ca8c49e42d4d0..eae0d3cdfa9f556 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx @@ -16,7 +16,7 @@ In this tutorial, you will learn how to configure Google Workspace with Email Se ## Set up Inbound Email Configuration On the [Google administrative console](https://admin.google.com/), set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?hl=en) with the following details: - - In **Gateway IPs**, select the **Add** link, and add the IPs mentioned in [Egress IPs](cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). + - In **Gateway IPs**, select the **Add** link, and add the IPs mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). - Select **Automatically detect external IP (recommended)**. - Select **Require TLS for connections from the email gateways listed above**. From c5559f56d8eaca7bba5556456c27ef976d8fabc4 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Fri, 14 Feb 2025 15:11:08 +0000 Subject: [PATCH 08/26] Adding Cisco prereqs, partials, and renaming URLs --- .../prerequisites/cisco-email-security-mx.mdx | 54 +++++++++ .../prerequisites/cisco-mx.mdx | 106 ++++++++++++++++++ ...sites.mdx => gsuite-email-security-mx.mdx} | 10 +- ...es.mdx => office365-email-security-mx.mdx} | 8 +- .../mx-deployment-prerequisites.mdx | 45 ++++++++ .../deployment/mx-deployment-values.mdx | 11 ++ .../deployment/mx-geographic-locations.mdx | 18 +++ 7 files changed, 245 insertions(+), 7 deletions(-) create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx create mode 100644 src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx rename src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/{google-prerequisites.mdx => gsuite-email-security-mx.mdx} (94%) rename src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/{office365-prerequisites.mdx => office365-email-security-mx.mdx} (95%) create mode 100644 src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prerequisites.mdx create mode 100644 src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-values.mdx create mode 100644 src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx new file mode 100644 index 000000000000000..714c4342837de6f --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -0,0 +1,54 @@ +--- +title: Cisco - Email Security as MX Record +pcx_content_type: integration-guide +sidebar: + order: 5 +--- + +import { Render } from "~/components" + + +In this tutorial, you will learn how to configure Cisco IronPort with Email Security as MX record. + + + +## 1. Add a Sender Group for Email Security Email Protection IPs + +To add a new Sender Group: + +1. Go to **Mail Policies** > **HAT Overview**. + +2. Select **Add Sender Group**. + +3. Configure the new Sender Group as follows: + - **Name**: `Email Security`. + - **Order**: Order above the existing **WHITELIST** sender group. + - **Comment**: `Email Security Email Protection egress IP Addresses`. + - **Policy**: `TRUSTED` (by default, spam detection is disabled for this mail flow policy). + - **SBRS**: Leave blank. + - **DNS Lists**: Leave blank. + - **Connecting Host DNS Verification**: Leave all options unchecked. + +4. Select **Submit and Add Senders** and add the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). + +## 2. Configure Incoming Relays + +You need to configure the Incoming Relays section to tell IronPort to ignore upstream hops, since all the connections are now coming from Email Security. This step is needed so the IronPort can retrieve the original IPs to calculate IP reputation. IronPort also uses this information in the Anti-Spam (IPAS) scoring of messages. + +1. To enable the Incoming Relays Feature, select **Network** > **Incoming Relays**. +2. Select **Enable** and commit your changes. +3. Now, you will have to add an Incoming Relay. Select **Network** > **Incoming Relays**. +4. Select **Add Relay** and give your relay a name. +5. Enter the IP address of the MTA, MX, or other machine that connects to the email gateway to relay incoming messages. You can use IPv4 or IPv6 addresses. +6. Specify the `Received:` header that will identify the IP address of the original external sender. +7. Commit your changes. + +## 3. Disable SPF checks + +Make sure you disable Sender Policy Framework (SPF) checks in IronPort. Because Email Security is acting as the MX record, if you do not disable SPF checks, IronPort will block emails due to an SPF failure. + +Refer to [Cisco's documentation](https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/117973-faq-esa-00.html) for more information on how to disable SPF checks. + +## Next steps + +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx new file mode 100644 index 000000000000000..c41c98371ad8b8f --- /dev/null +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -0,0 +1,106 @@ +--- +title: Cisco - Cisco as MX Record +pcx_content_type: integration-guide +sidebar: + order: 6 +--- + +import { GlossaryTooltip, Render } from "~/components" + + +In this tutorial, you will learn how to configure Email Security with Cisco as MX record. + +## 1. Add a Sender Group for Email Security Email Protection IPs + +To add a new Sender Group: + +1. Go to **Mail Policies** > **HAT Overview**. + +2. Select the **Add Sender Group** button. + +3. Configure the new Sender Group as follows: + - **Name**: `Email Security`. + - **Order**: Order above the existing **WHITELIST** sender group. + - **Comment**: `Email Security Email Protection egress IP Addresses`. + - **Policy**: `TRUSTED` (by default, spam detection is disabled for this mail flow policy). + - **SBRS**: Leave blank. + - **DNS Lists**: Leave blank. + - **Connecting Host DNS Verification**: Leave all options unchecked. + +4. Select **Submit and Add Senders**, and add the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). If you need to process emails in the EU or India regions for compliance purposes, add those IP addresses as well. + +## 2. Add SMTP route for the Email Security Email Protection Hosts + +To add a new SMTP Route: + +1. Go to **Network** > **SMTP Routes**. + +2. Select **Add Route**. + +3. Configure the new SMTP Route as follows: + * **Receiving Domain**: `a1s.mailstream` + * In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on what MX hosts to use. + +## 3. Create Incoming Content Filters + +To manage the mail flow between Email Security and Cisco ESA, you need two filters: + +* One to direct all incoming messages to Email Security. +* One to recognize messages coming back from Email Security to route for normal delivery. + +### Incoming Content Filter - To Email Security + +To create a new Content Filter: + +1. Go to **Mail Policies** > **Incoming Content Filters**. + +2. Select **Add Filter** to create a new filter. + +3. Configure the new Incoming Content Filter as follows: + - **Name**: `ESA_to_A1S` + - **Description**: `Redirect messages to Email Security for anti-phishing inspection` + - **Order**: This will depend on your other filters. + - **Condition**: No conditions. + - **Actions**: + - For **Action** select **Send to Alternate Destination Host**. + - For **Mail Host** input `a1s.mailstream` (the SMTP route configured in step 2). + +### Incoming Content Filter - From Email Security + +To create a new Content Filter: + +1. Go to **Mail Policies** > **Incoming Content Filters**. + +2. Select the **Add Filter** button to create a new filter. + +3. Configure the new Incoming Content Filter as follows: + - **Name**: `A1S_to_ESA` + - **Description**: `Email Security inspected messages for final delivery` + - **Order**: This filter must come before the previously created filter. + - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). For example: + Order | Condition | Rule + \----- | -------------------- | --- + `1` | `Remote IP/Hostname` | `52.11.209.211` + `2` | `Remote IP/Hostname` | `52.89.255.11` + `3` | `Remote IP/Hostname` | `52.0.67.109` + `4` | `Remote IP/Hostname` | `54.173.50.115` + `5` | `Remote IP/Hostname` | `104.30.32.0/19` + `6` | `Remote IP/Hostname` | `158.51.64.0/26` + `7` | `Remote IP/Hostname` | `158.51.65.0/26` + * Ensure that the *Apply rule:* dropdown is set to **If one or more conditions match**. + * **Actions**: Select **Add Action**, and add the following: + Order | Action | Rule + \--- | -------------------- | --- + 1 | `Skip Remaining Content Filters (Final Action)` | `skip-filters()` + +## 4. Add the Incoming Content Filter to the Inbound Policy table + +Assign the Incoming Content Filters created in [step 3](#3-create-incoming-content-filters) to your primary mail policy in the Incoming Mail Policy table. Then, commit your changes to activate the email redirection. + +## 5. Geographic locations + + + +## Next steps + +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx similarity index 94% rename from src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx rename to src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index eae0d3cdfa9f556..e3cc4eb9ea0cd33 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/google-prerequisites.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -1,6 +1,6 @@ --- title: Google Workspace as MX Record -pcx_content_type: concept +pcx_content_type: integration-guide sidebar: order: 4 --- @@ -13,14 +13,14 @@ In this tutorial, you will learn how to configure Google Workspace with Email Se - Access to the Google administrator console ([Google administrator console](https://admin.google.com/) > **Apps** > **Google Workspace** > **Gmail**). - Access to the domain nameserver hosting the MX records for the domains that will be processed by Email Security. -## Set up Inbound Email Configuration +## 1. Set up Inbound Email Configuration On the [Google administrative console](https://admin.google.com/), set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?hl=en) with the following details: - In **Gateway IPs**, select the **Add** link, and add the IPs mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). - Select **Automatically detect external IP (recommended)**. - Select **Require TLS for connections from the email gateways listed above**. -## Set up an email quarantine +## 2. Set up an email quarantine [Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#:~:text=Sign%20in%20with%20an%20administrator,t%20access%20the%20Admin%20console.&text=Manage%20quarantines.,Click%20Add%20Quarantine.): - In the quarantine configuration pop-up, enter the following details: @@ -29,7 +29,7 @@ On the [Google administrative console](https://admin.google.com/), set up [Inbou 3. For the **Inbound denial consequence**, select **Drop message**. 4. For the **Outbound denial consequence**, select **Drop message**. -## Create a content compliance filter +## 3. Create a content compliance filter Create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine: - **Name**: `Quarantine Email Security Malicious`. @@ -53,4 +53,6 @@ If you would like to quarantine the other dispositions, repeat the above steps a If desired, you can create a separate quarantine for each of the dispositions. +## Next steps + Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx similarity index 95% rename from src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx rename to src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx index 70c897731aa5e18..61148ceade8f2e4 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-prerequisites.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx @@ -1,13 +1,13 @@ --- title: Office 365 as MX Record -pcx_content_type: concept +pcx_content_type: integration-guide sidebar: order: 3 --- In this tutorial, you will learn how to configure Microsoft Office 365 with Email Security as its MX record. -## Add Email Security IP addresses to Allow List +## 1. Add Email Security IP addresses to Allow List 1. Go to the [Anti-spam policies page](https://security.microsoft.com/antispam) > Select **Edit connection filter policy**. 2. In **Always allow messages from the following IP addresses or address range**, add IP addresses and CIDR blocks mentioned in Egress IPs. @@ -18,7 +18,7 @@ In this tutorial, you will learn how to configure Microsoft Office 365 with Emai - Select **[Edit spam threshold and properties](https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about)** > **Mark as spam** > **SPF record: hard fail**, and ensure it is set to **Off**. 5. Select **Save**. -## Enhanced Filtering configuration +## 2. Enhanced Filtering configuration ### Create an inbound connector @@ -39,4 +39,6 @@ Now that the inbound connector has been configured, you will need to enable the 2. Select **Automatically detect and skip the last IP address** and **Apply to entire organization**. 3. Select **Save**. +## Next steps + Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prerequisites.mdx b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prerequisites.mdx new file mode 100644 index 000000000000000..3ab0775d7f83aad --- /dev/null +++ b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-prerequisites.mdx @@ -0,0 +1,45 @@ +--- +{} +--- + +## Prerequisites + +To ensure changes made in this tutorial take effect quickly, update the Time to Live (TTL) value of the existing MX records on your domains to five minutes. Do this on all the domains you will be deploying. + +Changing the TTL value instructs DNS servers on how long to cache this value before requesting an update from the responsible nameserver. You need to change the TTL value before changing your MX records to Cloudflare Email Security (formerly Area 1). This will ensure that changes take effect quickly and can also be reverted quickly if needed. If your DNS manager does not allow for a TTL of five minutes, set it to the lowest possible setting. + +To check your existing TTL, open a terminal window and run the following command against your domain: + +```sh +dig mx +``` + +```sh output + +; <<>> DiG 9.10.6 <<>> mx +;; global options: +cmd +;; Got answer: +;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39938 +;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version: 0, flags:; udp: 4096 +;; QUESTION SECTION: +;domain. IN MX + +;; ANSWER SECTION: +. 300 IN MX 5 mailstream-central.mxrecord.mx. +. 300 IN MX 10 mailstream-east.mxrecord.io. +. 300 IN MX 10 mailstream-west.mxrecord.io. +``` + +In the above example, TTL is shown in seconds as `300` (or five minutes). + +If you are using Cloudflare for DNS, you can leave the [TTL setting as **Auto**](/dns/manage-dns-records/reference/ttl/). + +Below is a list with instructions on how to edit MX records for some popular services: + +- **Cloudflare**: [Set up email records](/dns/manage-dns-records/how-to/email-records/) +- **GoDaddy**: [Edit an MX Record](https://www.godaddy.com/help/edit-an-mx-record-19235) +- **AWS**: [Creating records by using the Amazon Route 53 console](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-creating.html) +- **Azure**: [Create DNS records in a custom domain for a web app](https://learn.microsoft.com/en-us/azure/dns/dns-web-sites-custom-domain) diff --git a/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-values.mdx b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-values.mdx new file mode 100644 index 000000000000000..7159d1c82e5849e --- /dev/null +++ b/src/content/partials/cloudflare-one/email-security/deployment/mx-deployment-values.mdx @@ -0,0 +1,11 @@ +--- +{} + +--- + +| MX Priority | Host | +| ----------- | -------------------------------- | +| `5` | `mailstream-eu1.mxrecord.io` | +| `10` | `mailstream-central.mxrecord.mx` | +| `20` | `mailstream-east.mxrecord.io` | +| `20` | `mailstream-west.mxrecord.io` | diff --git a/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx b/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx new file mode 100644 index 000000000000000..c4e31a82c6cc983 --- /dev/null +++ b/src/content/partials/cloudflare-one/email-security/deployment/mx-geographic-locations.mdx @@ -0,0 +1,18 @@ +--- +{} + +--- + +When configuring the Email Security (formerly Area 1) MX records, it is important to configure hosts with the correct MX priority. This will allow mail flows to the preferred hosts and fail over as needed. + +Choose from the following Email Security MX hosts, and order them by priority. For example, if you are located outside the US and want to prioritize email processing in the EU, add `mailstream-eu1.mxrecord.io` as your first host, and then the US servers. + +| Host | Location | Note | +| -------------------------------------------------------------------------------------------------------------------------------- | ----------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +|
  • `mailstream-central.mxrecord.mx`
  • `mailstream-east.mxrecord.io`
  • `mailstream-west.mxrecord.io`
  • | US | Best option to ensure all email traffic processing happens in the US. | +| `mailstream-eu1.mxrecord.io` | EU | Best option to ensure all email traffic processing happens in Germany, with backup to US data centers. | +| `mailstream-bom.mxrecord.mx` | India | Best option to ensure all email traffic processing happens within India. +| `mailstream-india-primary.mxrecord.mx` | India | Same as `mailstream-bom.mxrecord.mx`, with backup to US data centers. | +| `mailstream-asia.mxrecord.mx` | India | Best option to ensure all email traffic processing happens in India, with Australia data centers as backup. +| `mailstream-syd.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens within Australia. | +| `mailstream-australia-primary.area1.cloudflare.net` | Australia / New Zealand | Best option to ensure all email traffic processing happens in Australia, with India and US data centers as backup. | From 0647b84dafe16213fddb0332792849690533f752 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 17 Feb 2025 11:31:56 +0000 Subject: [PATCH 09/26] Fixing steps --- .../gsuite-email-security-mx.mdx | 27 ++++++++++--------- 1 file changed, 15 insertions(+), 12 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index e3cc4eb9ea0cd33..5e21c0032bb2f7d 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -15,33 +15,36 @@ In this tutorial, you will learn how to configure Google Workspace with Email Se ## 1. Set up Inbound Email Configuration -On the [Google administrative console](https://admin.google.com/), set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?hl=en) with the following details: +Set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?hl=en) with the following details: - In **Gateway IPs**, select the **Add** link, and add the IPs mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). - Select **Automatically detect external IP (recommended)**. - Select **Require TLS for connections from the email gateways listed above**. + - Select **SAVE**. ## 2. Set up an email quarantine -[Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#:~:text=Sign%20in%20with%20an%20administrator,t%20access%20the%20Admin%20console.&text=Manage%20quarantines.,Click%20Add%20Quarantine.): - - In the quarantine configuration pop-up, enter the following details: - 1. **Name**: Email Security Malicious. - 2. **Description**: Email Security Malicious. - 3. For the **Inbound denial consequence**, select **Drop message**. - 4. For the **Outbound denial consequence**, select **Drop message**. +[Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#:~:text=Sign%20in%20with%20an%20administrator,t%20access%20the%20Admin%20console.&text=Manage%20quarantines.,Click%20Add%20Quarantine.) with the following details: + - **Name**: Email Security Malicious. + - **Description**: Email Security Malicious. + - For the **Inbound denial consequence**, select **Drop message**. + - For the **Outbound denial consequence**, select **Drop message**. + - Select **SAVE**. + +To access the newly create quarantine, select **GO TO ADMIN QUARANTINE** or access the quarantine directly by pointing your browser to https://email-quarantine.google.com/adminreview. ## 3. Create a content compliance filter -Create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine: - - **Name**: `Quarantine Email Security Malicious`. - - **In 1**: Email message to affect, select **Inbound**. - - **In 2**: **Add expressions that describe the content you want to search for in each message**: +Go to **Compliance**, and create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine. Enter the following details: + - **Content compliance**: Add `Quarantine Email Security Malicious`. + - **Email messages to affect**: Select **Inbound**. + - **Add expressions that describe the content you want to search for in each message**: - Select **Add** to add the condition. - In **Simple content match**, select **Advanced content match**. - In **Location**, select **Full headers**. - In **Match type**, select **Contains text**. - In **Content**, enter `X-EmailSecurity-Disposition: MALICIOUS`. - Select **SAVE** to save the condition. - - In 3. **If the above expression match, do the following**, select **Quarantine message** and the **Email Security Malicious quarantine** that was created in the previous step. + - **If the above expression match, do the following**, select **Quarantine message** and the **Email Security Malicious** quarantine that was created in the previous step. - Select **SAVE**. If you would like to quarantine the other dispositions, repeat the above steps and use the following strings for the other dispositions: From 62420a3d6b93bfaad7d67cd525d778c514557d76 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 17 Feb 2025 11:50:49 +0000 Subject: [PATCH 10/26] Add submission addresses --- .../insights/email-monitoring/phish-submissions.mdx | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx index 8166aaa89b79ac3..359b149483b1599 100644 --- a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx +++ b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx @@ -32,4 +32,15 @@ To set up PhishNet O365: ```txt https://phishnet-o365.area1cloudflare-webapps.workers.dev?clientId=ODcxNDA0MjMyNDM3NTA4NjQwNDk1Mzc3MDIxNzE0OTcxNTg0Njk5NDEyOTE2NDU5ODQyNjU5NzYzNjYyNDQ3NjEwMzIxODEyMDk1NQ ``` -4. Verify and complete the wizard. \ No newline at end of file +4. Verify and complete the wizard. + +## Submission addresses + +To view the destination addresses of user and team submissions: + +1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). +2. Select **Email Security**. +3. Select **Settings**. +4. Go to **Phish submission** > **Submission addresses** > **View**. + +The dashboard will display **User submission addresses** and **Team submission addresses**. \ No newline at end of file From 495cf42ba6b7cb20d8bece1e151961cf934da58a Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 17 Feb 2025 13:04:30 +0000 Subject: [PATCH 11/26] Remove space --- .../insights/email-monitoring/phish-submissions.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx index 9777a6715a0c8d6..1d058dd936dd53d 100644 --- a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx +++ b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx @@ -64,4 +64,4 @@ To view the destination addresses of user and team submissions: 3. Select **Settings**. 4. Go to **Phish submission** > **Submission addresses** > **View**. -The dashboard will display **User submission addresses** and **Team submission addresses**. +The dashboard will display **User submission addresses** and **Team submission addresses**. \ No newline at end of file From f8af93e248cf3c40d52db814dff0145c9150e581 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 18 Feb 2025 12:18:54 +0000 Subject: [PATCH 12/26] Adding graphs --- .../Email_Security_Gmail_MX_Inline.png | Bin 0 -> 19376 bytes .../Email_Security_O365_MXInline.png | Bin 0 -> 11502 bytes .../prerequisites/gsuite-email-security-mx.mdx | 2 ++ .../office365-email-security-mx.mdx | 2 ++ 4 files changed, 4 insertions(+) create mode 100644 src/assets/email-security/Email_Security_Gmail_MX_Inline.png create mode 100644 src/assets/email-security/Email_Security_O365_MXInline.png diff --git a/src/assets/email-security/Email_Security_Gmail_MX_Inline.png b/src/assets/email-security/Email_Security_Gmail_MX_Inline.png new file mode 100644 index 0000000000000000000000000000000000000000..fb64b42c1d35a236fb58f397e8f134ef3daac8a4 GIT binary patch literal 19376 zcmeFZcT|&2v^N?=EFhwSB3)mUrWApI^eP?cARt7ghbFy-ph)l1Bmn}18k&@ZPE?xo z-b<7gI?^E_@WuC>^WE>e>#lq6TKBKJ*2!AQtUY<2%$_~Z%lv(Gna8`JfkfhxklHsbc@s+N@01Ka>Q(Uz z<&4+kb9o+KZ|vdAR%Z`sV1M*0^b)*{^7U+Z@M_d+bwh?%KJ;xy6ddZh3O?7F7!o)? zhkWYFAdS{?VRH%!@h3XRo+duf`6gKUT6uYSx*@5gThQ%{ahRQPZvEN&&36HzFYNv)bsH>hBHrV)m4fhbx##6rP%W+CpmUm zCE*evJH|67nOo(4o!C&xCrBs$}4eRZ(+RJP&hhawC!!JS<6OhfqcTW5=_0nZrQu+RMm7_bCTEX?jJj0_{Qp+ z0JK1#%_AUr{YxI&d`3Ix6GH)jaCh}l;t$rp``zH$Ww zpZ&dQ^76l5=Q@yY{y#4JKi&1OXj5~PP8veC0|1cx`WWj`S#n?O$)@iB)ecDh1OS@J zwg093|Dq-NS1(1zp@<`Rr*ri$^JDiph7%* zR&3KH8rzSM?v8rc2*qxlAJJlV`Y*ncuxBYY2S!`(m;r>xm-(AJv-u^YZ9RS0ycWH_3hId1>Yap(nUM|g3y3(|T zPpdm5dTy-cF&7g|3p?IEAkHR@pO|pe5TDZJ9Vv3TcFY5ww(GwGp zKIJA3(}p<%hAY01FW|7FN-{AMcmszU^7 zkK?4umfNs34vqq~>UPZ&C?!uFUt(G>`?>Og^TfAk*$X+_;}>XyPD^L+SLm~IKz9yb zNb)5GQp|(_Qus3X-jw%Z{ih=8d@cxbpoy>CLXSWC(vKplw00o>YS~6*nO;PLH0pam zH?vM8_)lEn6}mAiyh%B$euR4_G-y2Qm2Vt+mZ&LpAi`)mx1?@dIep=TIh-4!P1II` z>fk+W>4LsF9sHitJ_o$HkK$7+mN4U@Pbu~(tBgaGR`y?Y!3@#3W>@IQHNc>6opGSI zQx@^2ohAo>9bZ*+^xnOy^{s^{(CJx!hE1Vh1k?sO3*c8((Fki``pW*}G9c6bb zoCu7@Q+3!2sgi5_18~xD8uEdc-tn(Ht!TW7ZQ~9Q?p{S9UxaF+Ledlr+2P)7`B=Wo z#9~LLv5cXpLiWw_N@j!aeT-4^zx6{re9H`4)$xCPivLOP3ZMBxcOg1|EVW(VAz6D- z>S}-;w@7uy*`;6C({{E%8a342179GB2hl&beJ7`b-tT@W2<$0++b`U+?f1wv_O9;B zjkpYZgY|H^sM#!Yu~#{gK4(+Y#$`2?&{>!CyBs3$=R^7%bn#|K!vipF?2vH9lLyN6 zg)WcOa#qD=XIvVycB;V7F4|P!!sXH<1NY2S;_^^sJ;qzzMMbGEw9gg_f*Oiq6pi@B z4>zu-5RcomPnmTZXV*bNs2qZ*3i@k$mulMwlrt%GJX? z%~br;*x^O?YLT+%W*8P-r=E&AyFMMCsrB|nr=#BP##xu3hLO}jXVAcaM@7aRD&8m2 ziakFQ4G&{K8qMfKXB$fo;X9C=V#M}KRp2wU;&=7F6Upsnu5(ky6y&_01f&y{apXp2 zvqjvhEvwp$q(S2EwR{bRwMt)DC#y~)nY%*Da&L?#?`&6?5J+2VbFIYdes$#?lbZHr-bgs%g-_wwlDg=J3UDEVC@KXe(t%w}qU-2u z@_f67l>>(puKasn96t3?JZu}iGl)0Q* zr!Gj8(0x>UF<51n!ERAE?`q?=p{*C;kC<|WTJiLrgPbc><0Lz>&c20j*25>viAd443H1IvwTP@Fh5C=CjqpNe4Ez7bLyvLYMWMFUy92v;B>I=U)q? zUO6{T4%-_UvY^j@L}Hd41GXCa%2JJ~{r8QxE13jQ(UiZEch@%4lDUBNc^TV=@u!12 zi*Isnp)a05nT~T%TyAAEY-w#kSAr~iASWs%8=>ZGkTm}6;!i7&DbUQ(&;#jL=)YSK zwC6BFs+GN;@udVMqe0V|EYF7;iytgzC04}AYa z{*uANrF#5~!H%Sei?OMg-WQCNU@SPtlKF9yRM>foGa^!8vwM~m&4K!D+H9S{CRhFa zUZ9&RAB?ayofeB(mY8Wl_J~Wu>*M;G(_tjYIbDR(b=@I%S>_ndCOR+--klwCyC|jt z`S-6No}-*7^_7WkhBGv{-4Z`++;-ZSt!g>GwCuD#p<^H$3E!K;@KO62G&-izT+>@OPnp|| zpt$x2Uo=iQgVt=OfMVmu{+ZLm(T_<(&p2%njh}7-FEwOA#=~A*+yhxSPF3eV@al|r zYTKH3n1VJ8R%!M};b~YfaSUR51354RQ4qmOr<@a{o?o81NAY-cHsKa9@bPI+EXlJv zKYe?UoBP>VCZWz7bt&xSHuyXg4Z${==B|W+zcj`)?%x+ai;&8k~zo`(hPJN5*vTiMddIW7Mw=~q7j zw+6FAn*z?uIdBf?%N)F$I4MN`%bs&bPpcgk6R-IDrb?o>UhIz`7thtB@v)c}dd_2N z`fo<;GVhIjDo%e$ZLkm2R|l^%h8GrjYba>6hB@AusfkiuZfpq%Dy`!Meel8S!Ov7a z!UnyaEI8tWCJJ$ec8)#|g^rB9{A0r4DSWFD%ErdwWm8vjw!w3m-_rgFA&2?>GiU=oM8ttoZ{=UH!f!#- zGqKRrw-G^}=7v&tEqnqGdxki^s*&t#&$_GZ5DrHvV?f5-3~-_7&(;-OQL#lLK2%d} zKln~c6nQ`1-)hSoM>ZZ%^SC9|Cj$?o;SW$(9- z@aOujRoyfafZpz7oMP-JV78c`5h=6udd}_P1J#>pNSfdHW7;hlsjRguhgl0 z=7e%U-+a<03WL1yK~$PBfdx<1BEa4gwk()JM9t<4L_|os^V~bMz)b_jnD}sZ!J`ZV zW?e-J4N8q7UJ&!uvRVd)z1tTY+WH?YK&wPaJTXI`fdZqY48}rZq*n28){J;(dL8t84*Y4&D zCl$2EKi5KUt{4BN(r`Fm(%VJq`V9D&@XNSX%lwHF)~0xWXq0Nm-3B0!P`DTo|Nkg(LYpn9GTG zEDU@QwfawqmE$fQA!m42cQ-UkWjPw$`$gm`=R*mZV8xh~4Cdm3AUA`SqSO){D9;%4 z3&e)@Y1Fe%SlAk7uByf)!aZFnZu@S5{YtpTVPS~vWaqs(C-MHq!S01xEM~J2Z+@g& zy9|*CIGo^bT!q*+YRX9;_B(}G4DK;{8}~ToMsH28zlLrPBWAEIB>frj^9N5F;4WV` ziTz(UvFAO%dR(A+jlB4LMD*4ByciZ_f^-0mWz#M*sqAxchdnXHz^M@Yxkd8q?JzL= zlghG{d}N|h0<&@;_u025DQbf)ocYj5Ub*2yWC*>7QhO5hNHQJg&%&#NoQ+oIvo+-# zyI1`M4b=?fnoZEUr(t3^cSnZ#{%H8#+T@cuUfhT4s4-7LP=veN7ylijp(~z-ORJf| zJ!T!{k#TcS$zxT_6Nxf~;>{^%@85gdFlvr5oxZwz2%Dp2sDP$H%f&XcBllK7Go%bs zFouHTd|ODZRm9D>3I3|wnaWnDzPqU;I94oxXCSu7&ga!pG@^D>>bzs~f;1ep1_*L2Osn!l!)O$%yfzK-WyT5qK7O+yofNME0(y??DB@; z2mHr6mojN{WHCEgP+7ut#YApnG>fZwxis_&wcAB6wq{@U0CWUL>Qq+gYPYYsiW9#d zHxR#{?O8qve=;3cGqEkj+c3%Qnqu7=Mms(`>(qX*`H69AeFO{UAbra`8XaXa_KcSq zx8OVt9rz-%?|EkEy;znC31G-B$Bsv7_npYj_$RZ~?pPCph|y)t#a!wkO0R2+z0@f6 z?CYu0WbB^cMB*qOYXm>IE3Zu&ooX&DMhFa&Pe3XkaW710zqAOBhd#d5?fR&QsTf8; zu4=epT{VdCQIa0^D&y$ z@yQW~)qstvx7ymfnL0Nl|EsUxR{G#32SShOdVNDOJ$_Sq_swA63~1l~5b2GDKp1jy zLvt}ZNgN!Bwt=-itk&Gh=oo|xBz>!5uK*@{E3{YI)nuN${^%-dpNh>+xWJ9ItERLM zjrmooVxBV4a#0pnHwx@cBOAvuheA_er^RwFo?Q*p-7?tF7L0jNAp6e^$2fQWqM>hG zsC>Po+H#%~Pw_-eQ5MO;(SZ(DRyLZe$Ce+ksRlHU$%|XCt+CuDoT_0ed$C{Moy2G%~$JSwW#UB>F)Rr}3 z2ailS2cgTst^*ctv4QR8oAfy8k%FzKZ*oVdcRAP$HqUtENiB}KM!6CmE3XU;3|Mm+ z3dEeJ87^LHWu{9u?#41sT68vzq@EG&oVH2guk^NNnZ^|7?b?qD%T>Lx%i!ojJ4E<`k!%#B@YbR zblinXmCwyeF4;sM*7Ceyl6ZZ&_-%wBAI`7dOBv*)S1g~ecc3EJl=CY{Q}*Hez=!w8 z0%Ik&+`%~s%&3&H^GVDzRDS*TCeJUy7;wV9BTF8;OCSis)rGt(8yI}=FWYFmsuTHf z`b}rNi$GfrZ-d`Z{ti-gVuXCg(hyDjN{|F*d8UqO%LRS&vguIqd8?|kbv|E;Yq9K- zA3Ghyn%jBCtmm+BPrJ;$9=Zney4unqClbY_zj_?r+-)5A>m_l}nWL7T_Y zdh0#WextPL9?D(Ntw1aNPB?c(B6G3OV;yZsq=kQn_$I!yrM16)i@un4dTMnyAH#H1 zKc1Glj5B_?UXJse%=M$3a3M%*w=dAI_Df)%ZSOqV*U4}yadC>gnrrW`*X%qs&qT+Q z)1tet;}p}{|55NB^dkt!KYJQDzJhi6bNgVlO&332z-VOb{Jto6Gm>-KM2+zYZ!^!( z3mcN#P86KfMyVLMEVzho5;Te+J2{@6Gu!}U5tJe~8X=YD|l^Pg_auAJKq6D*<|S zJu&cm&gSn_e8zHl54Lc(#i@EbDUC2*2rrqI_6ByMm-H>wiBy(F-ATvB+(qx+P`djG zVgp)|vjUR)aPO73X){bd6_u6zjb&y<1q)3)^3Fw{TZE~#^QjHoCn|Sp5Ca5rseL)Y z>QlMK;SN)OuFkpHXJh?yP^T$keX+OA*P$I)?yY=gP9XY8GB}4kO>IlkVs=Ihb;y2s z1Q-EBtW_OyY_QFWerf=RFa(NS6wDcCJuCkO%i-^1bCVyj|ET0P;TkRa)}#CGW3}bR zZ@j6$uO#X3=H!mG=>QGfoQJnNOP@_|=ZwEBRtlUsHfdvwZa~fn`7mjpqP~?|G&=3C z^ojXw&z@|*1Mb$3`@;w_EkIWTImZq2gbwZH?UwG*WF255tPxza9xpkyZrePyF3KGR zMyP~m8j7Gk=zFwiWzlyRtrloAoGrkLF*1~;R)IBat}z@he|KjE?8)=b)GlDJ4)?_m zobKbz`3e0^cfF6@3TGIxyJAwlKFb4{-XOekfMbuNld6f=97(|I3pm<^$Ktp^XL74T zqQ{to4<#e=ey-PE)J|_+)HDsZjL6RMy_iMtlHFqCn^@4R7PF#2@@WSAYpd=}AZt)f zxuRoXDu@_3draN@Y*P95>UOojwZ$NPy<7U(%{L^AUZdQ9k`Mhur1b4=J#Y1*Pi0|ev)RTe!>2mSY zgpW^IVvN1aQd;1qP>vx@{&Dd=4fM;Pm8nLn_ohSm#DYioW* zw7g5Tkv-?Fo@fyu*j&u8%I+aCO2Qx09n_i(EeR@zPeF^ z)4V{A(d@g+tQyT3HcM|JQeR}pZSQ`nms`vFX22NbACa{$YbcO4qXIP6i_oVXFDl}C zBJsQ8k}>Z}(T|@R^Dhpf(crrMEe{c1<!4w61yna*1cQki1Ag582< zLu*`%zi&4~rSC`sGxx#yQ{aV^&^ia70eXJ(K88u;smDyFZ6RGV?p@c|n5pe)XzFQ) zWcAvz!(K`(*hYh-yOnety+^_<#YJ?t?94i)$DbP<)Cz77E~eLFs{?QWJH!QB$e429 zK39B2k5qd3$L^1UvUXFeCgZ`k^X(<^XoKjL*ht61a+WvGJ!p~TdejcX6LROmtqkIG z(O{V9&rfYh5$ts$JD#;NS+5ShU2bvS<*}PMcv>NK+C{+|$krl_HWmT^i>b*INH88@)>@&vfpl=E6VTp;iWfH$& z`4Pk-$Pvnm+iBimAWCcGe2yQu?Llbd-w#XT5BTn9i-rE|=HJKoe1V)Lx$Re&eQvn5 zd^1vUOAgY#*?Vk$)C3hJDpgaZOScPO+}|>{6U3P1m}R%?(dtS+I(40K_BK$`Nvi*S z6QFm4TEo%RvC^;PsO^Jm|Fc-k#;KDuo#8WlE6VtCF`%AO`BU#-ompH|tWA86BCQl|Jng3FE29I$~qts4JTRk^+h$y6#w=?R_5BPW+(J zk6qI{f>|!dy%OHuQn5i@hTrx!%AUet%D5%%6?e< zIr%`eJgx}L@;*)2?&Ti4YH6r1Wi&S&SZhw&mmGBhqC$rOxAR#)%lTlrwQ^WB{Ju-N znjh!Y!Q--=ijfcYf3KcMZ5ySMdikmgv#LHztlRelt|1onX2IGoKJl2CFpBT@oK=XM zA31`=%%Pg+%LhC4o1AV5D4Qn(YWVEy4yh}`pNk|StU+W1XD*$C&0;AutVogPc`O+Q zHo*CySlQk`Sxek}Djjg-WM1o%nIC)Pwq-uu>E!OS-{jusSU|GuBQdPhXxr>MRZrR3 z!RFj5jT$s0jfdX{mRmMYYvk9Li3H_M&tBN1Zy*lU5ciV@>dFROd8bB0L|H4LAa z-G0co_Lb3mMFbS#_-yRBxU(%X)pYk+&+L26zHpu!I33RdQpyAie}rpzB8g9PZ#!3DczE(6*Y4H6J)&FuzJ^4bxWLUDNtW)^dM5oF=l(lr zTYjK4Kp~~%)1t`Tn+WpYLMDXqkV&Ue9+ulE3gQnNTYs&hxpSs{{6OvD#>5Qi7zbh^ zt2S1F?xoxQ+RH8Ld~ZzO#^tpu=47Y0BgN;M^P5M5HG=W8ExN619K!m0hnd~rJD|f% zW`kzVdBdt2P+svp)M7bsHzH8>6BHVflN=H!1>D+rdZ-=ZMbn@(I?7eOFPol6AU)~{J=<; zzJ`Z2S@^-yQ79RNEOpX`6Ov}am1jzahE$pt-Af!b2B?Ji9w-;Dt!v{uTHz%)i;xvz z&IGvgE0?2_)S|QWVYb|xU|~ZJMMDZpXq8P%K#7fD0;lXt4aMi-h7XTgA&Ib$%Y42*a4DU*69wDDCsE? z^>Me1@`pVGv&0;dZAvex8fAEYu@Q)mOF@Ecrz*!VZ}7nn7Jar$j^8_CSqzwRsoBPxP^3o<_nWMYj*neU z9gg?}woyi~xB=kElcswsA$aqZSl61(sMP{Iz0&>jX*MEiyC86c7YaBKB*z5QKPIbW zXmV05r{E#O719e{=SJvx!ER#R+a3~KP27bH%o3t(c8<^czW93xi za-Y>Z#wd!yv7m7}H&aeWui#A{#Xn)gqB$ba zP9|9;l%YJd7Tc|9bdMx@>s3~zMBW5dlpo3J*xb$I@>skCbQ;2$t`r>Fj>K=0&NAxV z%I-cy9mHiCe}Md<{?py1eI;2@o2qz;D*vFD#wZjGtl!@uBhMfBoRd!8S+5m*xbjfX zKz55RHbt5bWau%AUi{rMV7IR|TnOWdt;0W5|BjLiz2PxGHSOc!?S#B?-(Ip?xYkKX zN=EW(EW1_u3;e4UM-zDSNqg8ZanoGb+c(xQ8RWh>H7@D`qsZ5#*Cu}MgXP_Ui_wM) ztc>DIM5v8WiMcz5TWU8QEid*A%Jhf z6CFq~zk}r13cG(sP6L?%R7!Y|Z&rlasaP$J)C<;4D0+-a(Wf87 z2D;9!rbx}U^16>8d3@~8N7V93KQKY>1cnw4 z44ruvI-fh!dWk&=J~!4DBi@S`}Y4U1f(Y(xsuseQI za5ptww67|l1Sw%RcVN0Z(NAXPG*~A@U9w^=VD31CB*E4){hWQ&^xqE;uAp+Fpq69J zy+Yv<1KtN)YPi#%1B(@Cvwna)8Wx~sb%s7of7$wLrKxIYh4ln(RE@f!Uys(+(kEU5 z7orUCoO0E19H4u2&2zrpSCLRWm9g_^h7LvLhK~;{bMJ#?h0XEBlrVkA;e~DNkHVDz zmNZqg!30+p$GH$516AE|j`-*_!Fh3)1C$H|=vo*yR-L>+(yF0Q4^o`B*b^%X?}6P7 zX*{NvcSC6{g><(V_@W6kUb7w$hNuZuv`+Zc>Il+oLMaXdHiC|_l**voHvFZ@k>f1; zs}<7^f#?#JU)yP5OOWKmCXB~=+eyIw%f8c0RtpK4>l{_P`wbun0Ax2986~VY;bB=j z#i7ivTc&vpZyt6!L@Oq96_+6(4Zw^#Arx9&VdvLvL-7s6o>^kqbLluqQWd#(2&gbB zg*ne)?_g>!L?h5neNqTt?+!*P&*Z_yX)p6$hRGCsFBqMeb$SF4dPF8%m0;qNxn{>G zi;UUG-u|fS@7(PKqHROZac@FH#wI;dB)0~r=ukMmcO9#n}xYMw)$kog)>yfb@R z2rdY7vCfP5t6>l3%IMEG>}LFRU?IN8uy&`3?J513%x;W6q~ji{>o+0)eV$&K>EFpIe!av-^oP&_Fd@5! z;5>jKm3D~G$}EQ&F*8jWs5;3~$6s zqji}xD@d5=vW?v`H|SH~qj&2LER(TOE06;C}N6Ep89P|J@Q zBzj?LXbJY$N*yokTtO?g@JhyxYS25iTc^mNJ(*^9_r zKL3aEv02u%6>^>HI?~~0JOF?YnWGsD`|PxhzoyGmh#uICKS!YR!{dMedDs6SS%N=b zGQv~Ny^R8dy1!%R1*~%Ht5L{zTNkjtB@-D%0D$1%MdVL%i?{xF&gg?HaPkTj1Dk1B zsL)2%)m{hGlbNIXU`jw38S~*cRv&I?Zg~DcImgU-zG*5|5agnn`ZN;jGWqqphB`vr zYkl;jI={YtN}%QBoq40T^Zc^U*7RL$x#~422)fb!=ijm5d*OL&U0Kd&`!yvX&&-aF8jfz==W`Chxb?w+7|*p~UvuRd$~V?LO{-se@)uo3 z3bY?foS#i1WCAdA&_^1`a-c6frlbxHHeZ7LFS;8h8ekxHryS8de{bA1|dkw>P;KY?)!4Oj%cy5or~h z`t=3T_nQlx$HjQn98UFzaT#fGr zsX8~SCRvD!JA@B;2*YsJTTmy(%M$Ddb_%_m<{E%O7Cq}SWP3zHc#}^1HA`cW-oj2#JTXjV}%b@z^9VFUIAh(bHzVZuKIhAp^RieNSXwv8jmA0 z*#`J+ISw{mr6BDAM+o6Yb3r&XORxfALn0i?^l;U3^Tq7B=y*Ojlt!GfX20^@o;B4Y zCdZ|L^QshVj64_Ouqxc+SrZ34Nr4gFSNQSEntMQUw};eg>>&O{(xV>d)!huc_%pBO z&WS?2(Unto|D`>5u&)9I;5zxp^^6QEb0;G`yIcINP87OXw z5%|YHNQWPZb=@P?Z?HIQ_@F!JvdvcSkMGil7Bp3ql#W*}FMm#>40=se>THQSUGnhv zHLdVS=D>Hk|LEb}wE}J2gOqa+PkpCSpMnCL2@t|es`V7?sU}Inxnv(FZu;_ZPs`HI zvP}ZEv*-1$y9Tx*4et-yYbvW6OH&U5spEUdp4{bPN(DZ@g+8BWzop*q$se-G;vD@2 zPGPb=KJHsT{Z9sh-s2l@sad{0c_F`T$0b+Gzzs=8P|I(L*VEy4q70^$R_>))&n%{Nef^sYz9=;dqqJN{mt!~kD_7n1mG6AHl?DH|e;*alCE>wv` zix!akO=wTFWC14(yLSoq3dWqFXQTNA_X9J#X#T-snQ7IY(|#AwI@iFFOsnlGYA?vN7r4Z?f(9ubyn}NC--iBY*@o{6j&Jv*{;(w8l@t zcM9DVXBPS{dk{_6y*M^idx~e1mb~&^8`GTm@Mk`nE#=|ej}E!_3p&r)K`(dqaTd4@ zuV&Q&zf*i4u_mV5Ev2)ScVNgw`#7q-n3SANIey7YI6Z9v0&!s?!29DA0U< z6o|n7c#9N#JM$||o7{fq{QJ+jaN1DwUH(WxTX)_%k}tHIx{*YRd89<;Dcw z-ZYa{`q9Y?Z0ZEj>siUp*c2`#dEy3tW4L{BrXi_E*vrv$4i^WcwjLk3a=?vP4o%6U z=8WNIOUq^POQx%C%bb+!uMXkB2GcJE)A!`)@aN_A6H%wB`z#;M8|W+(U-zpj_AU>s z?NkWAv?)FpBdkwc3&~UxdJa3HRT%m3HVks@orTt_KuOE-M2*LWos6fVEAt!s1;w>r zLk(Vui}bUnq152$BcSV@{BWE);}!=>;&9sF?ho*lb;gXK#Ik5dVEVATWgQpI&iA6= z@fTmkp~G$AvIB{$zC*j&123
  • #SbK*sDgfC!vjk@ywQr}oYDea)VC4(W?u3R{+Z zK5I_u;~wr-ZP^>jX;U>H-VYg540v@A{xbJrlb9~T>&JEO8)j1J@kjimSR<7++;`Qr zJ^H%yIT_aC*V>j&Yb9iJwS>DN3cKNT_E>{c7PFF7s4B_gtWF*C^pC9=x_=;G8Kz~_ z8Qjf){rw}aFy*`JXI}|K9;Ca%w8_}N?kp_5n>vMpFzb$cHIC=*S+RDES(=!&>Vl4I zbAsZ1*mi}Voz@ac3w5V5CXtpOP1)5aU#MJL z6qoUw%Y$^d3I&u!9f*7SUV~zfj6#J&qY^xRstxXxv(U}^@J?N7!xCbJD)f&1E?{>^ z-wveKNDXUwRhr@#XB}Zj5SbbmHah=`{)?8F@tosTQiIr-*qSSHAB+2>W+|9wVb=5W z)jfqP%-2hkk)IqMr7r!n&u2w3F5@|OAB8JugS(j&`u1WLkjDfbCFbv{O7g^OE-mv* zM0ZsQ59Vh)J`v^|+QX{nBbZ03GCgc&Gpek^KVL9Ms>u;$%eFp$P>Ja|7T?v&{@nSg zq7^h^N3lSRXJ=+_9)GMFHg?ULKwN!wV1?nedyY@c8`vG_X7jqURsgLCRD$8-?&FE( z?#b8>S^Ms?K8CuG9pu!ha62nn(C@s*!qpvjFtkq~LiR}(2Oirz$S&uDMB>>jpQN4G z@(py>>-g1bxVy?rBPJ8nV(s+pJig?YPC*H$gD_bwAPRxFcHml0A1x>Cc>}0+noz=y z3Y?rwc#x98{SzKWauonF)cPL33`ueigBGHR8Kep&o<- z#=J)o-?LX1$c+=GS`GH%CXd=Kf9;ZTrG6IlA*IxBZ=xxc$M1VVMb~L;*qyx3K75e# zxTT#TkTbjPMw9JyJn1z_y8tF-S{#R8YD1o@jo;zMt2%0E6|8%BJ;o2;CZEzoAF5HT zj(HX&c-`=AJGd$=OTba@aSj##3N$az}v9tlWp@*7V6qBVxtKjh*zI9!yj zHO_cI^`P%QnoeFX%;!jflVGmnt{XWxK|PfGrB$ibx5UGxN=eW%K`JAtm{zPpt8yh% z9nR0sh9M_E=4)?Prb(rvB)hpCvLADl^+}Brg9W}^uRIZCMOkND$;Uz!kKhU|3jcabl%b|S3BXx zoZnb`4Bg{0nyZKafc$f|LI+r0<)~r7iRblP8WXA~GI%me`T0U(mTr?AAMRjh@%zi~ zI;{lM*@y=-O8it(C2qh9NosYKRdW|M;ytiM=mceCXc;Mq8kpb6*1wf^>C~cb=}}gD z)~+R^i0oo5?)1q-J8kfKE{!o_aE5z-{On1C?;QEyF>BqkrYI?4>MXnz@gugy#B`Z{ zHmdtcpWVXpq^{-uG-?8xBeDf_CYqrzrsSreEOs=E1VuZ{7Ot=GL?XSp-j`dh38g>+~?0GiAD}G$2chT zbyjg?c9uc?3cWt6cXZ$!Mh4}x$CsCjWpxlpz!KxAS%=`{VS{UuE6AYVx_{ccqU$(P z=+KW~N&n{_vBLzt*JXI8o3aKu^WNWB=8Elq%LfJtVAapLl*AZVw3;3@w?RTB69F{M>iueo9phreW~( ze7mLHqP(1yW$=7AVVOb&w;@6GWM?N2Mtkv;iVsv_IY28u&!}M-w<6XxDk-hJwlDK- zt=>8|Mc@cRJZPFIfBT*wK8zc46!gm4GgBtb+~xeklf2M5Yibo=KUsG0{NgO)?(3emOIp$wQ!@22Ur9 z3+vlYi{A)R?O(RMOb$`t9C~~bv%OX?DWY``pqF%SS}G;E0`-l+LRp;+eWq0

    BRi_q5@&jomhWDF|V^&mCVS`lRFF+VX3; z;O@V%-3P!Me19PKCw~uTzS2O8r5O}x3|?Q}e|hTvxsRMTeBU9xl$piq=U!|9o-M1n zy0m4&L$Yf_vF)PGzd{hs>ia`#Kgv?GWk9uH_=Qpq=Oc2eVj%se0NRG`C$5%hf-%Lf zH!7yao_T3pb;AaZiSOpLp<*Vj^ z6ds>ZF$UXt%(huGIgwoWe*$H}4{{)i6o4X?8qU9PSg<@9fFr-Iks;iF#e>AZIpV2o z!U6<2%GFEqvSfUX>74cNHJ65J=>9GLE93e9Dr*~7>+Ewzh7+z=K@Dyrcvy zrIBUk|GlaIYMFyv-Mw0)j(kc_x(Zl*LXK~8u{`_R(zk^FH%*%Dbv9$N{o*MA1akbf z>ks~K*7-`a^A*5Pa;)?bS<7HyvYD#L$;pn|$aUwDp(J8c%TfA0^J--Nz&@FWaHqMj ze4t^)d1lOR$|gMKFSNL|fA(<&@1&_2P=QyhwStU1g3DlXtY`j$*!%(SToq=XL5F$F zWgtHiFiMyK$)fD7TO^h=_y5OC{Q$%0-Ph{1oVd#S4Q%_Et+=C!{)f)0YUzVG?*pHw zaiiX!Qm?nL`Gd9_hCh=3IYgcb2poqysHj4h64B?NjSJck*}HK4v^C z<$UXF_iWq;oY1Pl_YHv#a{XqN;)G0oOSyY3r+LHH&s1NjQiRRbnYezjYd<`y!faP+H+0coQ$fTHP075z_=}{lo+w3V8n`EDx0#hk0i z8{E{<*36=OKK_4ujPDp`y8jM=jK|o*R0Q4v@PeR5W6C)?B6vC zX7&I6{3vDJxcl9%)#;U26MjB_xw=k_-;*m8GzR%+@1evluvAP4_N)YTNR3vD9+V*lykad#k@^ROU|q z<-Ky7_w6ZeGuK>y3Oem!1t*t9mfLgXXPQTJqPA%8g*UTmUiGTvowENt`@{>sw#4Z! ze_pG=dDS3uMv3iuK_*v6&-cM+r_JKj3dvlj`Tp?K=-_E)(D42FqMDg?Ma(M0ON;k^ z|C#L^*{?EP_T0BA%+Ml@&e;Nff(5Pf->5}c4-Od(c2H#iKSt$0zvYkpwo$tUlR?6s Lu6{1-oD!MLSxg9?B*E7IX7VyfGO^Z*ZmTyx*mlW{@~V|B8@}t8 zzJ4uoMx(2)KsQFw1NHv4mx)aHYfU^;rJ9bGneek;7u7oEx~T8+W?pbXdKVWUfP3I; z4ng6Cwg_P@X00zW9(u=T49*~M(g=`|4k$|qI7}wR6+?6tKbbMvExqvID!|cYFB%=t|;MK zw(~khButJw`~TGei~)4^F6p*5_v%>ufXZ~dp!g6VpKKuvFt@huO>?jQJ@i?6mC`lK z4ag_*vKBuOKhkSxKe(l1oDq)n`JvrJdBzAI=&DeICn>(eZJ3i>f@y@H*u|gzKJD{w zhr{H)fAC&+?f+PMLh(mEe1sO;jsz^tI5|OGYw4F6!3U+7 z802!3mc0`mJ>dbft8IyGlDaKP6_9`j!8R2tpJLR4J%4a<-bZ^BBk?u^I5Yl9mjqb= zan``&mF+5d?6Jc85y>CK-&Q0a3$f7j(Z!;7I|^{Wb9TBdEGG{N+hx4FzVTnrUEo)Q zpxg>Jvx6!Q- ztrzVx;YF>>d4q}o%5CuM`Kx4-c+pN_CxLx>UTcHWUip*XI()mxyeJf1gbyWdJTHtV zMK1clq?OA+5?f+1Lo8h{RznwQM?Cht0LYfvz$0<)zIn(fY)78viTbm5q!@I>?oiDw zvKuMBqq#x3vl+Cve;yU=-r-$nm~VIaJ-(1ahMpK)nuecF?RwiDYm!>-^f9=~*-0I^ z+e;U@+O*40pxB9*;c0PgDNiU2@l@Vpt3@niQTx2h9XIvhk;Mg~KMg8NUGI!KeH2f+_PnN?_pP;UbZe2z+OgWbr8g(FHxng8tMNzLi0esgWneC z8e%UCS;J$lR8cG_A2!6N|$3gnWzj!oqOP(5K4w|E39 z!#M%{OEd7(9choa1nS}=u;-X+W}Sw+d^rJ-Wfg1Uy_aIjk9yDhM|QC?>RH~hyDA>k z^{vy}XK^eP8}i*j89S|V3JxIdg-5F5S}?c(+{6}pIJHNn<&jx~0zWumasNbcw^=t~ z&r5p8W4K273<@a8QiZt4G3R-ixf8{PoIH*AZe!v~rd`3IxfsYf2=z6X=KhHx{mKhl z(C?qDdNq|8-l$?+xK0RixxdD7&U&0zPSwK*Qn_hU0g}p0xUY}3=QzGNV|Kk62`^a- z$o*vL7h}=Xbmy@5SHjc!dw_usXz{d)ckm>A-IgerYNZ9&I@vGG!Da|8COt)WY z?WUps_;J-Oh+@i=Q)3WLXL@RCZEk+v^?Of7Yp$JzG=Fo`kk9iOW9lFC1NY$RCUE=O z*MCSJV*qarEe}j9l233y8tq@e7k0mP5xE2`HPrPNZ2AUsag}$l-t^=aQD4S+-izZZ7%!cn zIyzjX+t;vk6ixhlNX_*n?l{%D{h(3bi0c(OO008)0iky#Ac;+yTG$PDot39j9B^{X zPWJQN?BtQ1_`jc>J0?BPRJ&uA0_K|)lf3J{4}rO-MjySry3FaW@A>a(yFnrOEKZPI zt@x=-YCGz?)B5Mg>e;yKqc?u#C_1lMsJBNFBJ$LNUbHd1LcK%BB5(nl?+E9<`-?0Y zci*x3hVVVi$dR%4Lmqd;U5kZyLob0bo|SZ+n|-F~axr(c>nv?gEzWK49zC5196~jm zw5r8D$}zkbu<$A5u;<}Wj$+_6$~8RtPV`EWp_`k zx}D#2xM7>y@M%Kj&qM_je~zl7b(WU)Vza)Iu0&*C z>!`!JVw=Bwh&jz5tKY;aAm{}8{o~K33@1=|11cWahL;gPHC^rat18JaBcoMboo?UB zL9I4GEnl3dt5{q9^KOzk?*-P0^nnJO%bp+AncB=j zc%gt#>xQUp9b?@uURNFWFXmSB8$V>`6$W}Pwq#jAPZ2pLpL}d@pI5tyXFA&u3<=~C zpi5lVq(<3#`^&gD1aN)9uNQ%tSwDx1{KBFK1^D;xH{G>h^VYX?=Vv+}PgVnK&BiG< zcw4Jk-LvG6EiU9`sM3?R7oeLJ?YJ7S&YnDOj3l@vFjzNC_M~#8RiM(XKFN@5+DGrA zl)d_ zna+p!Ues1>#c?$Q;&S+eB{Ud6UfxLy-0r`)$>Bqjw|WASy2=TRr8VRR`W28R0_GYA zNG8Z>?#-jY$gXsQV)7w%s(Qi3X!SZ^)c+yAh%9~X_DawMEM$Fu82A_SZc~h=k4Ccx&MyAaB;;pr|7y&2gdyBsm~qWnXS?;6 zB}q(ZeGsF|z%-^SJ!$z@QFNN_C5TZB@a-%3ZQH0~P$=;m`OhR@L6oheOPv=pqj3^Q zD);suDRBXf?tg@RD2sKSd!=MHd6CXXn=bboLMl(e5ne5@QOA}53v|!{KXhLwHukCW z$;yJ%`*nza7>9Gk(HcHfaAE=>bQn9W)+!rO7^)Rd53Vj|-*jxK?yGSa-_DUqwA62P z3RrBzvV4pwoi6jfw$|B>fTeWFdk?#}P>+P;#kwY8oP5(U|(w46xNUnHI7S~eqE+9Uidm0I5!LYcWg*mZN=&(cdZ*QMeNVV zO>K2-gVgE zjQ)@K(ba*yD$T>e?!7>QF83#K!j?s+MbgGeyn8AqzDbm(#IbOlcGkSE3?xNy+X>}~^9#JM+kKhO5oDxqk=@Ds_D;xjXVulC0-Jx>Va8C*!IVto z?EVn8vtE!`onaQrp!mT`$PjipoSoWdjkP)kmgr=pk zqu7n#A3wTs35+ou_?_b@XMxkBuc8BLzTdrzp4F4bRWH`qVXC6cUz;iAVlBJ#X;g}v zP3s{zEtFH>RWR^vv%CRzkBTB3e-*b`Ei7||(NKQx*Dz~C$fVqHV`#Sv*YV+oZC}_UXUu9kdJ`WDB~CV0W#z1qZL-jRheoAIcq8>jhHqMN#2*H~ z=;?_lGLuZJJhBH_LLf*LUZB5%bTV9kiCENLr^30zBco2X>|1Z&2a`ckd6D@-bseYR z)v+7tJn%WU{xpbD4eFc_9J<-6f!&ThdRDpHrZIeCX9{q-PTjz!b(2O4cNLz%(g}}XfX0`+E&)SdaCO2rDtW3r};iNVC7+3ZaDlc8yO{$;OA!z z*cM5F!H&|rt*O|+j_IOK!cImM3MAD^_ayEsO5y>e{#QKN8uHsm)~n{Fufp>tCLO{y zhHio^)rMuG>S;;tsul```<$FFa=m%`#_AAj?lA0`5G3&EPD!B^TeX2^_u^ssGz^%0 zVh$tsR4Vjb@;=KNz|5Q4x&GQOoftB1W}Ye9qe>{*8$j8I z*&hZ3fX_f#u11ITjIkL*Abt@&Gq#m`kmiBD7hu|&(Dq%M%lMxr*slFPt8>G;8!fFf zH?|elnO!bJRL2_fT&abT`5;CI_G?*F!TJ}(U%Y_!E6S#SP%Xa=&fhp5cRpY7jW;}f)W=t|_)SlIU7K8VeE!(y?2k_y zgHBe;1FesPsg}GC14DQD@6eaa*;Y>Zw69suxzV=hQvhtysDmbCLKrRfq!Dk&e#+8Y;Z@~NO!&o)t%zq&A|kk9XyDLu4aI2b6i#~5zE7Q4MCmGg?wN}Bjh^~# zyN5=KXs%#;o|x-fhStrFhi&rGrejBx-Gy%5qIv~X8bbRpG3%f6vvf_&hB1Dpa)!=J zOV&<+^eVB7jvdr`u6=)&d$c==xMl$tAH=>Yvj+P zI~ii4bZgV&W!4ANPEM|K1A~dT3D;OnH0GX|Q)zxRSzb|A{f3p_IQHh zftc|UU2jMk-IG~n@ceP?=C;R)@H}E^?M5%^RMG=^0V`cSF!TD#Lh2YLY(vgQ+q1D7 zhh9##pFgv%W7qXJDWmj^gMsQm4MVYcSnjjd97Ye*;a&?|WGYYd<~Q`3Cvl76Yw4Oh zgjNC|ke|r;Q(i!0d~Z-ESkr}g@A*xe2Gklc_TlV&c1PXkR>DrAg!rzUnXX=w5ukS^ z&ftyS%&|gKT#4{dhV*sVUTw{_k|S%^^?p%3p8RcnP39cK0K*3y^v8&4)^|<$m&v>JHh1LVx)ms~C z$gdPwA2aHoETWF{GL<&9b+5fE+!fqclTQS`_Q-x=LcHHv8~G4#PJC1{^p?(c)-#zd zyFF!n-jet_`jrt0a=pA=U3x@2*QC~JA0NKNQf+A`Jz~Q65eJswRKd;kkWU#!0(Km%@!9Sn)0i`$Kwa)q|!#nnC?&QHCs^BozBF} zE9UV_V3mzuvU#uPdkyD(CDNM}e+-xq?9v`A_j`xh zpLkl*68kBOdVb+EUSmxTy4)U1n9tT@HXu^wLqhm@Q!y7$IT~m+$cE;1f@!=C9 zz;6TA%P-~KyoNBt?`M}O%wKnT-j4j!?EtbIPE1cr!X?vc=KrlzF4jH#*iPXiwlD4f zym(kS*h)HI+OG3?Y`#c~DT7FAkaz&HBvlE1GVQlE%mRbI?+u*PxQuTD9+y+PF3f&u z(feMw5dKx0OwG~}SfmBbFJQ<8WCCCNab)fSpB5$V2YXc_lIg(h({gUbvoWluC==G+ zQun-u9=U6e6n|EBeM z3EqERZB>wY4}Wz~r3{Ki@Y;kW@Y1B^IVQ05cS6LS2RC236ZbRQ2!F-*$vGL>;&gyR zKv+`QB3H^n4H)T&36_gP&~S6BHJz6nS_D*7)FY3i&HQ(1gwQQ|A)u<*_`~-2+Sj_O z#FAywY)9Y)dO;6;w&eb%TGrY!c*topu+SPPH(_P6R7vedAFqa-FX*n^?McP&#_DRW zCwpvQZD91UXSJs1((x*iVeqk*j|Lz>#}D-M8&f3m=j%fye9!5u>qPJEpT_DDx#IS= z;q7t8M>=l&Km!uK$%BwDmT5W#|Et0&BLWml%pdHxLEW|1cJCN?^cP4`I4mG@&vca| z$%n%|H!ZLKsj4us=m@2}wIF|7rs7~M^dIT8ZKyB+H-DVHd>f}bto=%bO}8lbn(^ML zliq>QQsZ6oH^>B*k-KV)3II~@9l$E#PRBLm#@E`{$*(@qLT-;D%6~UznA-KB9N6JX z5hOBPaQrholL|reBoq{tDM`SO=@3YH;)L{;aN%<=M2k+pqK>x?{3!@5VVXOvHVC{@5X<61u@@Cc}G9F_nWLJ|j2EM0GS#r`btUE8s%t#G8 z{osi#pG5^06N~(sN^dt)hJu`&q5hRn#@*Ckt@N4|=!(5 zx_kb5MVggvN3{e(kJQpXdKAqRI@Xm*^&uaZO)w_Y7slgIs3UG5<0dN;{EXE-^X~6S z9(EIdg1>1ksv+e!s#48}O7^BAf`HOrep5j1T-HrSy(gmTaZ8Hxe{yIs(>24TIXN61 zRpkT2`I>zlAv$LS8r;zX4D9r{H>Lv}5T@ zFl#Ei1pJHy6N6r>9Du^b^(bA9JUYI#JEj{L&at*GzT7DGhl|XDr}A96M8TY)%~|FP2UCG7WAZ3hI^6h@zIc{?JL?gCIJ;@ z6<}O3GQla&;r7HBjYm(Am#*B`J;>#s7nx3c&z!;$W?kXYOa0%l z*<_!z?EeI{{U2BoX%`vUQsqNDAp^E8mE6o4!OQUZw(u%{fB#TXQBhRRjpIMPfmAZ_ z#J^@oOWq&X2@9kg>}b$ny^pz23;)(9n;*{pjM$l5&AH;b*&Hyx<`%WW+~U>8-tu6q zBtLV$Ben$>$$VL~VlINXiABwAG~Au7zjs3Eh$WF>%v)k-V%(kk0#*-ffbS$K@{f;X$lluUNtGDd17X?jJMj_8ZpWTL zArZt+-1Zyf-;0#e!780Z>Ef(sfo(|p(5l?1{RXJAfu>oFQuu$@^%(SKPPoXuF^c09y@W^_JD|SzDf~+set+HP%K_f| z>K17O7KE1c7w?@G-%ZesLhMVKBETgLo?ZmMrWuIHyHK0Pg%Vz z)BMmp+5Ma8dR$R_Gi5t=@pToY`&WM^PteEn`#}jSokZ*L(}< zxQd;uTka#U+V$r3TS)2mqosKVU~2BpQ5c7KGTEEJ)iM3mi!inyYpPq3$+GD4+Cw!i zVZ2f6XY@1eilqcE0_9H>+bqR-G~0IaRKHh$$aj;Q~%;R zHBXFB%#ePf;uCtP<2rX?Ybgmu!9}2Apum>lwrRm=R@Z7?*rbn{JvoAiI=Qp?wrn%y z#8nL(`2@*!=0L46Ak4<*)vi5MVmQ92x$f5E#ftSYooCo?Ts-9uWBfO}?1S&dlwPa`KBk4`^ z0P@AUAuOzhEo!AFHSq7xzLSnToxuH2vO}Y{T=m0wid%n5Kxse1>uvbu7bclwq4>kP zUzf{Z^%QJ?A;!WTI^6h6Yg^WL`0Ly$AVZ(^vSg|T%ppzudxSxQjBtQA6;@q2sB>5& zIF(y( z%a)wHC}#68_3jNktlsMBicY!3Z*Rz0BKZT!r_C>$sH3DZ>ENyfQ(Se4p5sZiSls_S z#bft@4)-{1t6SIB2lKNhdunduVY-3@7}V(|+JxVt>Z{$aNj1QaMY7g_UBm37MaIG2 zUDa+UXzfDcS!^G2u)K`)ip$CR=B)f!8~WXSyV6^2h0c-#$N=`_(Df0bryb~)YEtzvO3L;*rdd;zZ?b2mt3TIts#y&HXvQbMx zIgc#!EkjpXx%sajW9slX}Sd-P41gv?kGM{2i5Z!V& zLNi27Hdzp)N`}17xw7d4Ld4}c+uITOmA(#{P1J^uUer8Mv?|XB=4)Fd1ezQP6_xEl zzERD-;}Ft9Z2<<6x`0f^+A{l?*-fe7fL*06Ry5C}f~aSjgyYDtmnaxo?%b~*O%ia9Th~HmS>s)adsC>Pp>wbR;vt=nM zJSx8u?-0tddGt^>K)6bNGdkeUv*+nks(m9xzR4#0l(Ppt(*Nvh)tIS^z!`x)zaK_d zx%ux=x4u$%rw7X4y-Hbq>DJo)apgy+?;uC9z-mlp8qA?TW;d=S@0s`2jWQ^Yg@=RL3TcGt zt$}s$EO`a*d?v%>VMTcRgnwT9)2&!>-T1gDE$u5?M+*Y}@1_N&xKGh>@bdKz6-OyN zxZcIz++ywF89q<683q0R+A~E*jdRd#711}ycp)kplUx%~M(MpNu&)NiTEXU;Y64YL zoz=xr+QwLi`H?_XbWn}AhiOW^u_yz8%uF&PUw2NF^WT&KODS+xwwup1R<74x>U=nO z(ftT>xdGhnZ_7-XY4>$Gf)OT*lL=pJBj)TWZ2Vddz)x>@bq=HhxqK2eqhzr55D zOC25He@mmvXEFjZMPMS*(bk=T${d+n1%dCxKQs%Zco|2VSR{;@=i50jDjhWVbC0dEzU z9)m`8ekn5HHF^WWZp%N^xr~oY&1?ehVYC*+Igkjzvxnj16UiFed=JoyoTHBOSYfV8@Sn&J8o)?7$t5Z;Nimm7YBE)YT~9Q$fy5J>?PiAI8iX zk9te_2Z;COx;E7q6P++dHB|u$kl9J&xvx3*8rLsLQ)?!F`%9%XEw$9ixOLcpMYrM} zl)fYed1lofOxs-$@^5!CX3b}6K6nttVfdb`{lH8?_zGHsyv{oC6V|@J2Rxy9i@exV( ztT}P#2InoGw7tQ(y)w$_xzTdB9BW$#Go*`7qpvQ}Y2pJE-8;oT?cexAh+EGJXUKe? z+VOP`m2*|OjNP#UD!Ls3pNZ*h8|Bt%A4R6KrwTEbt5t~w&2Lpbe?5*ZD6}ap5D;Mi zu*2-kb*iw(5iFEK8xp$RL=a<6VO@nk?Q#bs+GUWGs=*in{sCpHg z3y20s=*>aGnhaNY0KcqMohqHxTs_TUWYo&h&2ve4Pa zOig>otjd$&+_atO9-Pmpjp=k*-GRNLi<6_QcDcC#cVF&U?}euh<;t9x7@gGFU@d_@E~!a6pv)S@hrLatEV2P zBwyQiL?^U#bK|?E@K!A=-c13A4lwYFsu27G==>FMRL{uuw$W1opC*g>LNw?L(Av`* z3&HTGT)B0)s{XW5!QIl%>AgAc0Ql33iC57(eh#vdwMjizW-*43TY}51>Le{$5 z)h`*m}HVuPYlkZu(tI`<9sRdb+hFBAM5v@AFL7Cf(5ZPi zuOa>XZ<^*c?Uo`#`s&pXH86Fbk^Hvz{q$bUH)4{(XWo<=RPZ8X?lbESGb5@bsMW94 zvGgXlm&Qe1ns0(IZ1k2*MKaS=Y0OSL006hr21@?hfB4_d%m1qxRR!Ft7)C!F>1HHd Z#tT*NS{Xwwy{CTzW;e}^PzD}J{|neTA}Rm? literal 0 HcmV?d00001 diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index 5e21c0032bb2f7d..149f8c4de720ba8 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -5,6 +5,8 @@ sidebar: order: 4 --- +![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_Gmail_MX_Inline.png) + In this tutorial, you will learn how to configure Google Workspace with Email Security as MX record. ## Requirements diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx index 61148ceade8f2e4..1680234e1ce4020 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx @@ -5,6 +5,8 @@ sidebar: order: 3 --- +![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_O365_MXInline.png) + In this tutorial, you will learn how to configure Microsoft Office 365 with Email Security as its MX record. ## 1. Add Email Security IP addresses to Allow List From 489914d7cb28343ded30cf4e9c8608fca971a61a Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 19 Feb 2025 13:51:50 +0000 Subject: [PATCH 13/26] Adding Cisco diagrams --- .../email-security/Cisco_to_Cisco_MX_Inline.png | Bin 0 -> 24754 bytes .../Cisco_to_Email_Security_MX_Inline.png | Bin 0 -> 24240 bytes .../prerequisites/cisco-email-security-mx.mdx | 1 + .../prerequisites/cisco-mx.mdx | 1 + 4 files changed, 2 insertions(+) create mode 100644 src/assets/email-security/Cisco_to_Cisco_MX_Inline.png create mode 100644 src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png diff --git a/src/assets/email-security/Cisco_to_Cisco_MX_Inline.png b/src/assets/email-security/Cisco_to_Cisco_MX_Inline.png new file mode 100644 index 0000000000000000000000000000000000000000..173d74c65fa89ab64dae2e443d40e2982f157d6a GIT binary patch literal 24754 zcmeFZS5#A76fPQ26axqfh@cSpQA9vcY0?4$f`~M!(jubti1ZpjX`)h;CN=aDAdwb& zq9CFoy@ZZ*LV!>b0tq1}o^#LRJ!9ObdmnDb$XMAs*?X$o_P?<<_t%Uc_56z==Z@&e@WK-$#ucE#&DPSQ_x{3 ztkB?HRQFg!?Br8TWO?s#07?vj}hO0hl_bd7M8{FOEi^`Z6nI05E*k zd;d!OYfW~Z@#We^MsS1@oZK3hIWsYnStnPAT3x)YTIbT2)lGvyT6s z>8+>CbF6=mAm|=MVYYTZ;ievx^7_IF06^jbE4v9xz!uo8@`7P+{i(v8t*B^j0Kml0 zPwVt=J9_=cd1?zv&83ynXmep<1;QoY$`qCRIslg6)1fOy>)?>SB&@h4H&;K8 z^$u>Lmw=9xRL76rzHt0jLh$TUeqZ&eVROo(T4Tn!+88YIvQhnzgK#%sWHL#ZVB=y9 ztsWgQ`r_!4>m(-AHXdu3{ZeeTZAjPd)kl`EPemh1QO@zY^FlI$E)ra9r`tiJpd}~5 z+3{SET4jEBiC!D4iJ(mYm`~<9cF$PUk0c)bajDSXHsB?}1{_A6Q1sbPQ=~ScjF6~X zfS>1Cij&5?f(Mbb-@dUOS@%vC`i*I*4@VXHn3=3kO<~X272#7EIiiyiko{C!PZ&&yUE#F zdCm_b%ogSJZ~oj3KuH+jORmbKN?YXcAZ^YFgo(s;Gf)DHGg=-x^D zfQ^?1GF`b|?q5a|Dr?wKA}=n6rGlyY-?VcB{WDXi_s=ZE-ci5@PgUm{vL2D|De~Qw zf0yR2WUif2slhJhz>-!(Z*C7DrDwmlTr_=q_w6HU2V~+)U7sSSeYS|&3n`+?OY(5+ zlg?{m)sLaU_16v=xF;fmzM_$-r&%9pRE#-oU31!WB5+3+m@sZD6F^yYk1l1&R;XwZ zHd@PXRcQuvaTyEN7MWI!fSwb?x>K$kRH-Mof$Y^5(mGBv=U*l)1#Z=qqQVMnU3R5! zyuC~v*5GUqT|@?FIIbZsK~j$9*4Wu7{J6x1hxK95x@rtD`X;RB;uI;xEOz(nt+o^S zrf<bc&W-ySxGTcX235}FTarQrle4^X*}E~# z-i0>}SlNG{F8R*#m_~!bv(Kpf^IvPAy2ydEa$>4)?iPUgZW;b&dkEh(Bk`? zdDjW^_jHJc^n?-O3C%;itIF8K5q=ii=;L#g9pP0L{$=!*U&X$*=yS^P+14Yfn0;^N zZ~I02ZYY_4y`x6S?qL+%M;ma1m7gkqc^%>U?5={wdjHa^G%Z8q2!5g;QF)k|RqVL! z=D-~xyY5wd4#fw)xC4}c=z))qZ~bS{Y${h}ih_GwoE+iv=uBu(WLOk=&i)qYQHd`9 zHQv!L+;B6gK6<+V5VP9}DR~Q~rnlT$sse^0giTVUb6+FH-TR7^uZ}GJb{Pndd;^^r z46P9bMkDy=y-ucH9}P?ONv%A7d~gxF20PW1hD+pv-7x2^-TAglFfMpn?35imwmq=% z@Y|W?c);W5vsVr1+UBbHas#77R}F+SN0)xDCYz*4IS7=WsS!-OLkmzYjt0nO9i59?2w-^G0x0g3@Z?w=au zZg9@-=ehB#K1`IZ>xv5ewPg{qiV<10fbl!?;uz;ayib*EI}fR6{^x8QZUC|5O;eU$ivhWD6JE zI9EF|5w<+j4ejLOT_c)`BB-eP(1>iZ9=(3vl5;(|y7|KF{$V>B|4n?VnUHzQ!~a@t zf~Dw~3)3(+7mgK$b%{CP+q?4tn!!VAAOw94l{I;WX>8`66+tv`x_y{Ct16xD9?ty=Zy6#0(Rz~$WGjOp3udzNjk9vbGV67-wq97P|I%#}Prs6t z9=?-`>g-Z}x|Xt)e3>3-DYc;AX=Fh?wL`!!~_ z51;kLq(KzH|4Z^@dEMcssibQRii*}jK34CAsHC%|Va>?%U)ph5&)u44JA0Q^-$i!} zr73~=JK}(~Q!g|156S@{DA;0(K+F`FQ#Nw9u+)lt_BOjd_Qk2bKMY4^p)!oNbNH+KDp z?Gt>C+~V|r{@q7Qfs1)OkIV-^p6)&+uZo`*;}XyQNi*o&cIT63v*$Y9zBwis{UD#S zo=A^P2<^F`x*sTDL;Ki~MU@PDL_HEdfh7NIg>{^MS3HtCjQ4ar8?J`ptBE<(6luP}`i z9Cmh!AXq7`B+x>_K2V+cS||8T+(o11jp`@JVjH{0oSrLw3MDuRTh)NZJ3|)y^QgN& z%{9$ar1{VLm)aQCj(Cc5s2CvQ&yPNNVu+M?%w;`i=r5VQ;xQPiPpp{wgsqr`P-&7& zmOaIvwI_ZgT!K=zW@3L2?~Di-+bXVb(X^m%-R}>LklrQEkG?2}g^w!3Ogq;Gt{Siu zqT1>XH=c;Cc{;q1a7$-V_!Y9dPaWXaaj90&vaH~E$9zP-%hUi!GTG>ioBBI5t{+Ev(`j$KURbDm_!#i~U z+#Q1+Hfd0uw8<9{a7YYK@44FTbSLx*hL=slD7Tj%{CT2H<(%g4x8euGYxgD95cxsh z;sP>?_0xeBOwW-rTJekDSC>zhA@6sp@^Xc)0X<&F7yZ3=E$q2;^Oh9tR7nNs)XS~u zW=jYJG#eM4{QGdoVEOHgo7(Po>Nb7lv~0r_$_CkWPvolGYahF>L5P=L5wG`^jun9} z+_ZUai}tKZld_7Pv#PRoT>eUft$86R55b5RQ#GqPt|4X0TJl1dB;NyNCBFyF-^V$W z-#c8tOKN|E6As=vcWEa}S&>KM;C?p!?~YmD^U&Ct)y(<<&-tE8Y6KjG{*@o+wS?DF$pE9Y;J8eWxz8O9>soxP%xG6j!66>6pd z-Nrr`U}MQLaVrNxLFwI*5YpU2*Za-}cdduQTL0kY zeqshPG=GwtjoY3H#A|2EHQvthF38PLp7$9Plr}DE20V0lE0{MJ_*9QVBxYrO{8jR$ z`SvM<_~I#maCf-Pc8db9^K}bRIp~$V@i}M4?(l^kAWQM9D1I%)<0bQQdx_#J?esm~ z>hY1PhYFY0xeK!r(gKCKbBC3tO)mYu+ERU%ur62Fw+a+%O`+_(^XTS>EmbaiWPA1$ z#Wb**DEpE>dC!lVsPPMHDuRPL(x=16-$8vBGsj*%QDmG9EpnE_Qr36ug@26tt;`ZQ zD%;t8KeU;@{||8wkKecplpEkF)MD@}sab4Om8LjiP@#eIgnfUyR+9D!A&IrZ`iD>6 z3Noy0Z%QdFw&$BU5t|plgfE^e+Cu7u2W(X$4Hu5F2q)6l4!yCwFq!PEboV>fqR+oo z>P}2@Q`EHU-h5-i5{|kofhgd%!Ap$`?%)L>ZnlKJ%;BUM|AoxnhQ9rN<8|PToyAiR z=XK|c2A~&)T-acGyj8$_@h3tL$xN6ZeSAf-ZGY^l)XdVuh8w=J1t!+gC(eix?g%*t zfAKu}RrBdo@{>B}L89ns+3y>Z4Lzsa$1|hk@H5|UuUa>(-^G;u^^dDKRs80%s_9WW zdriT1rtHdUU_Kw`g>dA}Lx}&KX_2?Wty5ZtKaQ-DYPpnkYnlEKcs=XBI<7|Is;j*8 zjDt<|Sv*i)%3)IGl=1!3$xLkS#1)wHqRTRU^XL3=fT_iQ;;&Q)fe>D2@? z5iQl+Hh-Wt%-*b=E@3%bF>sYIreC0J-m(`0fi{J|aoip}S^1&lL<}%U$zJu^)refT zvFI4!6@joIE7wnCCM&@7r?P)T65^1k) zq0@rn&8x*Thu`r0a++Uv{ZF^V*i!{wNLkI7SZ{V4r=is*3`3{SwHGNg=hS)*c(Fv4 zrNZZ)nX*6()6Dnsjqou?UXQt=#;j5*d!@Ps8t%uV8{B{0%|3jbQiTcN#Fg714)gIA z!GBRErSfKnX-aDRz#tI`zkmrWU_@3Y7e=pY27Up8fZ|L5HBsH1mR`XfuN60D`f9M` z^6Kk>Ok`rQ=HnX~{)91q;nplja9x#_Tk`8Thb+o{mYv@OxFqdRISecq;f07eH!o(J zW)gJo_uG~?R+|P9=gjjSQjcWvlvMb3Gv+3y2`vOAIOlw)i;S#=Z-BqK74)r2xxnN- zyKk=cXX42B=l*#UV4zCfhFn@`{=kRj=JLN~jusY?7F_XK`f4Z8W=~D;nF>@_uGk8h z8YoDt!N~+%Alum(ZsO@7E1|(hEVuK*YV8;@>&B$gj6~z^O3I}Mw~7D4%*#K<;1Va} zJM?}@ogTh^TSKcra%b;SY?u1Ltdk?8lZI@g1v$%Q(28S$7wW)4ckL)T-Fn@7yB(0i z53WmygFm&-lKlb_&-Nhd;6Hf|4``wM7c9mtzL+{%(ahvzNrp8YaeKe6^UL>;iG`H1 z*r>6FjyS5w?aUWwc2HVnDSA7eO*N5U(Icd}T$mYq>0FBl=a)8*`m+3SOMxVLP^p}X zw2=DfakcWX>1Pv{;L(BdmHTp4tA&fRHDzgut1n^!kHzJE(tx>=)4|oI;Z7;d&mE~T-vlkA0vg29@b5L`}Ox^9oT z?VDY#GtZJM^xvzz4Nb|GR^4;gAi90#>2oLCZIcVVmiQwzE#Z<<`qi-SL%G8WArrZv z&tTW0j2o9die*f>va)s@UrAek`KstS{*;T0%kjH{c{2FV=1vgdYUs;;tW75y@yoFd z>4)k35Cp_%<^AA0X0egUpF{CK9kMmkY-XB- zY$*jh=)dVs`nTL`EDV0cy;u)II+frp4n-q53xkfMzhy}?0}A6=hdF|m1iOp(-*jz{xEuZ&)_(Y`^`Ii| zG@s@vtp zp%GN&#ZZ;~+&8gYpktV4c_)kSR5{|r®_*DSnYAhYoQ<%$`V$k4)h|2f(+U3ryo z(GzTk>I6Biw2ul^uA2r3~2XlITm*ZlF_#Co56C*F~Xy5P~5Y7v= zIp7(MJfb_z)k@R<){KD_upwQX@6G|JNQAM6SCjX{$J<0&DyB>1*S(nL#+jDJ$}w%W zUziWC6fTZTi|0Y{V7HZ}fFrH~8YN63t>>#GD=N zyFJ8jqPBjz(4f1ZdY*!P86NB!Fq(o=4-0(E;ge}^XXRBg=GU&6K=bv=%J1!bnTG!TdnDaPDF1l$LK&N=sv>TRGkUvy2j&Do_ zHf^T_WJPWVI((y?jKmae)$4@)a0OxN2lUx`J_6f~!<#W4r7yW~JxeiBdf#s4DcdvE z&sZ-4?}aCtjlQZloOycoEx^3a(FNOmT%ix zC4HWd6Qlz*8799aSaJ<9yFbdbcm?^-gC6!-TRp7S1B30nrn%=0@2k)fF?-lJT@$nF zE`P{`3%$VE3j7DDb*FQKwS+P@XZIYoEUH7-dS}>+9E(5^PoUdY6G{ZD*fhyvk$fM4 zZ-h!7xTN^o#%L>KRFoREN#=t|k9n_vkhnPa`}<6-B!v^+kD&u>(Nq+4=Qp<~c>J9!Gs> zh#EP`0iZ?!9$!^S30vkejw!t*nN!Kt4vZTePrd*8p>`(%6`2L7C~A=zi8W7LS-iec zX1rD7WGHK$ko)D?-LR@(0qV3I^%jDghl)cEly%g-t5V}RukOB=5u8C3pu}9+t+vmm z@#~ns_t}erpaU5_*Ed#sZL9Iq{noU#GGKVv=0$f604HaA_o)Xid84t%?r(@jMVS8S@ICe1z1VWytJ1BhXWjwwue&6{or$d*Hmy*a4S{PLj$~mPL(OYvQMUgy-q_(l+}T7{byHY)e-Td47)`w7fol4K>Gp?*ZylOM-6p0n zdUX?iGRUtG4Wo))v`qWQ5t!VFu}t-szN?F^8?Jlap)(OQu1ks^9$I~+A9s13dHokN zW9xYZt+w~H={w)6#9Vh^kt_fDQfk83?JDKye*8%pyf3bB6?O)+Wj+&Fg+J10 zOgz^Q4}iO?Be7ZW`YfE66|T^W|B5;yKNbVR`8p?}ZzhQleal=^jSM_&ecT$- z(=Aog?0zKn%>~%zc3U_N4bJY_0ie~JzgnQ}0gAYQN!3sOQ&ZK|?b{P+uM4#3n#b#g z3H!&VEu)R*m#@hGdZ_jD^D5)3t_aM@x-=XFIq0mBZ)Y{(JDJS#_+GYYzKM}})DChk zq=>%dfvSHtzH=Z$Bek?{@J4(YaPY-LVk)TfFSjNT~Lymvu&fsGX~wl_uU0e zOok`%7zC9A^`C7~lYS+IzV^M!^gicF^Mr1DS~rS%sj9vY9DjS2=jZ$G zEaONM81{vqLpAo&9KHJaRztO;^bX;O+ z@aA`H|M3&6uLGD-NA>Wwec#=Y8<$kG>K_2wXZu-PIPZFN3A(V^`Rv*UO zD?VE|sY+ZV*4@C;88(ChvHc$786nHi35bK2*t+-=J&#It>^#JCP6^|7lg2%{w%3o& zfNiBH?!U>jp9-CaH%|ISG!7;(aGo{Sp~v_j_%<`SZ^MN%(!~5Ve|*}Lr0g=m);RNgF?^3TbjwR=T+U;w-UUfcEsQ z6DAF9nW=8IU$Z*ETmHTbQ0U=gzwJyLZX(`ge?nH{u-PPZu(^HgmA#z%^V;UDwyC!s zhVHT4by0zs5-0vKwF3DKVObMhiD-aN>?PV!nx#r@HaR z7R(>6u@Bea!ZG)t!$j3*iN2MjnMNAa{xLC^+1pZ-m^WnKrXnAwcGyFr^PS5O9#z(ue)3p9zP|;v@`2HASV=z#* zp$tr0{!+D{hFWXO^Nlxzb=y{LuHB|}`Qzd?)q}jFgeRzruNbL}!KW!J?PJUh{~gd5 znn8E{;jt+YvHOcBWQ1kr#DgA=xK3sf3a2_V@t<|A;oNG(g7LY^Ks$TuO zYps08fLEmz>TJwmv+t@64A%bd?3y6UbN0v9lMNmjESk5=74JgojB@kcTwT9B9*WQJ zk;P80{K<4;(%5Ia3!M;5I=93iVqFj08_{VuYM zM%kF)9h;99pgx3uWJd8*e=_BuI}2T9GemeCzm(R#HTub=u z7je{9nVVOXhn3lxE3_tMt;0&NP=#UIpoT_B->2}c5D4Di2z%Nz{KzYlP>6M`!24Ff z@OO2HnFkcRU16^=xCTtm0~>;+=)jW>7+eDa$AUY=DftKn_XU_SX_cn+f?Hk2N)Wi5 z0JsCd0~SCh8G0Xc?h~jcQff_1Xyr$9StWEqIH{-CdKUftrZ_M=0uMtX!lj!NMR6J~ z4E5Oz4X}(W&3DWPf}?2gVE_wnERU2nrMQ#u(1ZO-<;VkC|6J=Y!NxCY^l4xICQ=su z&F(^kDt{rF@=o>%+XI;KVW0(s^+DJlkyAr+p(U0-J#+xyGMf0XkIWr3I02JERJ6=+B8j^DD3nsMsLsZoCaY@4U78`6|q)V@uE4)g1r1WB}IFFue!eseS>;D65gP(sZ9&S zJnGH?zl^}(orVGymqTV-gd>vN88)R*DrRp7*F}Mc+xx-C2KO6`sEpIeNfAcmynaga zh|00xfPafxKBWd5=WjbD`JB&)apVd=29G)U3P%kG8X)@%-)mT5jKZYDtBxlqP^x$S zPn7|$LwC)Ey2+ghhn+eeebLG(bba2|@Drt67Ia2mN7qmC0+w#xVA}%0h0OTdx>zjYbSYgfHj67B1{pG3Sb>mz ziwFZctX_T2_{e%@)ezsNpC{AoZtcfO&F-FhcUaR!8=;1;C_AJRKfFY)B40G;g@*mW zd3=yY%o`|4J;I)?S%N>qIUQZR>tv~RY(GAn8P?8_M&u^Q9^3Om7Uby1!ix$hy#J}8 zlTxrhc%hl5il;~F6%HzQXI!f=uP9Iq-c4 z5x~NQz86%W6s|ak6;KjpU5=0A84QB@C9K{}JpzC+{T&Wx-U2Vg!@vwIE?5fUSCd}` zpNA|=rXKjF5%(6V%@%4Oi_SsUK&(FjOB`3czljTLE^u3b4>1zEF`19ql1Tzu7;%7h z2~hs!f2n6(`XF+$&sV8;Nd5~3Enm!jX5@~=V|C~?-g51BkmKfK{qNm;46%4P1o`GO zBTwd5$%z0Yy_oVbd~1i+JJ-3>#qn63?zDpwJ)T|;d3o_-1f7hbIQxX_Gq~!JaL=9o zcmdXh7sr&*7HX?ovzOFy&Y_BBG~j$hcgTaJIZDeMjU~H-VNdB-`{M`;gkT2dz_%!ph`Jq{hdGr@qL~wgVW{r8)^M#W4&9)P zW6%LvbRq41354{_tX z%g9i~8qkq~AlydaWwsuwHwc^3NnRcqokBKReT*p8q1 z|JTp|svg2$Z1HnU|-ZpWOq#)AmnmEE)xyH)YZ6k)Q~o8~h}Kt-IS){?FiQ&NoY@H5PQ zQeISHtMjr?UsUIgxoBTsW$se*?pnCMBesx6Rxct7&n4}D4DSQ`6wWSU@{GT(Dcp{HZ)>^Mev#3?o8rDh zd%!SAysUg4I7gkv@0Ho`pd9xopV0#F$l*|{q#l*X@ApKH+sa4dBYw17#Dh=_4GJ%| zus=x&KN^?>Kj|s4^Bkdlj^#OEh)sl^qOZiY9YA&iih9$ic5K)9ueQUykp83seXrK! z7tM(`aJMB-mSh8ixE>uXFF+jde=Tk#iq%Y96Y^z^)JJ7fi*i%j;+SC;)kMPM9S-vehlOwmmtvVJ-0eh*OW%KtsUhQRBT)m`(OP!^L;=`fc*)1XPv#6a{;FB#`U2Aof{jYH* zp#|q&dG`Qe{h_{IUKpuk3^@hvkZdLD5aV6F8WU{aMvj_|YN;lZF}}MHoqqXyV(4}~imREoZqB(%lhr@GSw8YQ$6a(O30aK08ZI10`V_=& z%?E*T%N5W(@(5lgKWl@YOGm(|5=zG+k}J2`4)bi0fgdiW7@%JKZNn?r!-#v9K z)%Cd&J&&-L@2I_qb0E0aSK6hFvKIDRQTGrOJt}Qdul*q^LqtJFy$UVD8*wUx7V$Sk zC{`(b)0DAA!!%m}Nvf#GI48{putSNnh>q^CMB@SZ3>D2UO;mdv?|H zhJ56MBb${=@6bwkRud}6D7I>t;a9IFk|;+H93|qNZo~o3YjA_!D6~&Q;)2$6SRX78 z(;6-t`y6*e)o>mF-0-|6<1f|~LhQrm4Mrm|QLN#)!=V zgif8m#0-v1B>$Ya!_KD}hKaEYTgZ_?_oHC)uzxm z2Z0Li?#l$%QWIuXjc3V75c39Cq)sN^DcvsMDZDkG8-Kr%UxE)Dmie+$Ij!UE81`tl zr&R^?o*E+I=Q)Q_ud4H1?fU{{JO4kM6>2+fwM9K(xwj|(JtKxgAP=3#8r2aa1LOox zOcrRzwWPb*A_jT5B@oJ{e+TZ1YA2Z)0&5GtDtU}adw6;>tI+{|g{PkL+>kF{`7gb4 zuel?tpIRkui)h}q;ix9|ERgBpF=x4@F~-lei$35RaOKX0*ar6oo!zm59#ORqpu zoIfN(`pHoB#D(16x@E&vzKd;Dpc)HZBHE&E}(t}cLuI!$WY?+W8)3u?$>nZiz zpV|=*UN#c_oy{p3=~{eOUADbnp@+#NlwX$rhR~8s#czB8qJ&-;#8@VT#B2naDdpDm z--r2xgxEb&;6J7e&y7`F_z2QZdP06RLtek!b31=noo^%7pjd5@d}RMjMsB~j~hgr zpIGc^%goZS(h!Ggoc$BxiNu)_p;&A(50j<(eL~?%lnz_ltV+L8mi _7L*?4Ajm zBLDUgXKi18H=!6*)By=;T?5IEtkP&ddgH?EWs3>7XWi5dMZZSHp|Vj#J+JOnh4Uhj ze$qhDtgOBO5p-UO_82g<*f1Bwr`V2Dd$7b@v}yUa&DpZDz&T`aF;x^EGaS z%o63k77`)X#8hG?D_|jY<0yusHZ5nFIG`tWLnqKSk8iuv$NqW)i+$s@GYR%s+GcUU zVm*|$=%)`Pw~M^@>PgZQV5pxF5Z3?6PPo<}X-_i-9@}SJB}FgW$j$?r)15BiKyqG_eQ!{vT!q#O&*epyfBL)$|Noex+)NLn6** zc#WWE-8q;yUcM3uxW5wfg1>YxhKK))g)3$Iqe!ii0K_&>*Bf z8eZ-dEi;Lx>ICVLjyX#RbltZ7`)xn8u%RISIZWIcBB^?n?=&a*Tt!6%em$em=~2?! zvg7r+@~3^oB)!$&N-EYzlaIBTS%QBnz4o_Ax2u8E&Ecm2e}1S??{Do`70*yd)wAbe znH-&z$}jV|9sJ>Ka?PwU5JDj=)E5j-(h;+8Yeo@xPljlokEn8YJMsoUwgiK<+qiox zyFDPy8xwV9ghQqc1`e_0ueHeqOgpM>MQ;t|4qlsK;_r;DqnoqAYB!En)y~dYw$wES zvNo2VXhgQxHQpDV85VAX!NUhJ?Q*RKS`Qk}5?k6GJ7b6U;gw?TXnqaLsUZ)?3ZpfQ z^o*l00Fc@!M85^NUna)@Q|@2OEumnf+PR)3qs&4eI6S^aT{ueRmxnM2$ZS+IKPCR( z$%i_IADPq^G_7=Ca2R-l#C`Q5iDV7`e(U8Yre;VoH3J}-NPTw9AMLIIS!?iFD$7?0+c87k3LPwIXIY>W?*L!F$Q`e1JAGpiW~w_yd{_Th)i z_ERJnbfUH^UHZwho(x&pU%sP?4Rf7w+=2Gg|H8MJu8wGfc{$Va>Q6~B@w3v)X;%&b z8K!3mVYbG-%JMrHZwvOt!CLIsnT3JXz~jP>2H=P{yAP9^l=*$!u*qZy{iaIyE1W*7 z1|t3a{QUS^-v6T5T3HFaF@|t#OIaZ|LXKOiv2pV9^5aa}u$s@Wis@F@Rh+q1d{_R| zFbPT_0HA#xV4_I+czGjf8EN0D^68ED-Lv)t3aMtDw;IUJ{0FFjkjzuEJhvY3QZYyd&c z>M=yUZUV|QtjeaeTiT)RZdE0e>O)7aA~vr&{%7}mbFyJ3QLL0qZ}Pj0F;sVf>eb6e z-1LJJhat9*et1UuAz`7v2ZUt`FLHIcyXyUzzPn}z=E&v ziCvHrGbkvcRKNS<5rn!^fwFQI<$Ei?f zG7g>ms*lgN6w?}u;c(!Zjb3;DDjrLy5pfnb%;HP07(ha$Zs{8vb{-w<#wbD!NLlW4 zlJy>;4z9RGx^j1Yd#0RA0Mv@G7Bmv}C;P!6;cpUUpm38`BlYx{(CM8ZxQ#m&U9D9KoRw@sJVhGV z9gIOC4(w2aq#fw$Vs1bAGI_c_f?Ha$oUjAbbk8;#5Rs?iFx(~ppn~z-w_x(2tH5dA=8g7TQy>So~o@z%+&SF@ZU3iJi#J~(m z;lcL?&aOhaEtM(cCR4fn*c+``(7O6m+6JfiTX2K~tmnhOOAbg5JrM`b5J4>t5|&Z-kWTwHTytd(svwI;{n}Gj0e_3JoqP5qk~mbk`H8=#^cXOwN^{92ls-|+0k3&nkYa4>v5@Jc8mMTdZe?m z)$19Ln|vbj1(2hQ_OxBQu+Yf>yTwl)wuMtR7eHl+F9>7RqE8QfndoX-JH^YO;XkVV z)bJhk(>I5&#$hn%MJ&OlUfRKmH0`g3QL}eC3D7KHHY_9hm?;}A!$@GSWDs$p?)ni@ zt4<(iaq3R!{)S0se(7T%a5m?mK+I>RnVeeb&4!ZKN9V!(L#utcQx;JLLMKPXB@SHM z>zOt;K%sL;k<>bjUg?L=DX2DgL~6bJpDCGF@V&)-lM+~k;`gXn)=!D|riK>7;30k2tvCmc>P5$gQ#g-e+`UHsFaUsbTCU(kxeD--pFrDk3q{zQ_I@NPZQ%+R2R({C008QHrh-}Mv4xIG z2IX&0a_@A&TI!k@NSo+}# zLRT#AJIO?&mkFV313SSI21M1F)Q7bF)xymI*^>YhPo|@_(CbYw584mEB%(7?{4=AB zgA4@NApIA$T7aaG9IE)WwCA;Ftw zDb-r|8Wml2qt|-9-`j3jh7?P;8zCm*Gw?eqr_`;;vicw?W`BOy|CZg|I$BI3X9>9- ztrJ6RLfywegA?u}H%S&Z8qOzX>{&yD}0jMoaB2}caSzBH&eg!yqHI}o710ZpVsoLiJY{~!HI~@ITSH7Ew+SI+t z;9%q7-&R;`PBczAS?Y4FU$5VZDT3|DGTb+pAl&BNWKw{q4a7HJV#)Q6R>x^TzV$!h z{sbI!II#StDx+B$t0M;^EX4T4u=I*-$wksaY)apw$~v&Jdt^0D*UUGGGKc%T!?!DR zb@vh^!dz8b{xDNcoS{`vs_!)w4DWfNife7+;5Y*V{I1jy6k`oq`09%k>C6OtR2 z9vA@*ulBExU@)!f-TFuU4Fg}93dY>Ge94=(Xz6G+{!bQbW5mLax|d$eh~3T-c!AMhg*q4Vh-6j zE<{5mOv;;6S8SOnTK1{L#uA$|+}GTlR}6bbatyF#n@nI`*_@%YGejuREL^bw-UQwV znRSpVqFoIK7n0io^l62bCzym9(IPbe>pvXQM%&SfctpXE z*CVO^Yk|V=(Is;Yb{Tg^4jLq?$}eb7^^L~c7hIk7I~l<}i`+AwvUDT}W=S(k`T1%P6x~+!M>r!d z#ld)HtLLXZ0ML|mRzd!h$%VFCHi@7fA29lOTPwisv#ejHQoIlFyn9v&Yjc(hJ`kn+ zi+rF}Oqrj02+F32nMNeMj(%-NI|0b&V}^HvqLJp}F#w|U7G0%Q;*ZptD;ANqZM4q} zZd94&B)b3pc_M%EHmB_W*&S-i%1@@Qob(nV|6b)E{L&i!1RD;sE}i!#hhh%pLnZ^V zbjOBnwPv}T1Vl2`kR{T=HNdy`Xp>J<&C|8iA8v2gs2;QyAj)#JeN%o@&o{!gLzC&c zS(yKSaq0mt57N5kKRffH!AsS0OoVxBs=4EXZJo0r&Sz#UBx~6YN1gG|u1`erzv6T7 zv#l%kXddHb6PQbPHx5$<0GK7~tbh~6Jj|9H$t8h1ECu4+=GKE7%MJ#Gul`3nR~irH z+qOrgWfTf!X$&PKMgI)hMG=vmvP~k(Ft)NUNemT6mdaRati#wDvP2IruTh5J|Caw(|dox&n(w{-RE^K$9bFwzN8d%`=wvhpbTX4@S?m{CHJloSPbv< zWIYAvXC4Z#DJ0KdesM~Qoyw_vo6+sX`bHgP2Wqi>e^k1h}`4d?IN0sB~-XZpXDGV)C-tss13oRICjFO#Joep zsuyo@q+e#X{=K%TKGk@PV|6_^P(ar8Fx7~5qek|@pI<+PbqTMolg=umk*7Ei5i)H1 znLr*VWHw^UkMN^-mwVnEul`}5x-M%-|5XB4P45;0ffzqweDT?UsUAiy#z-#;XW)-y zk2r|F5_}qUKU)PpM|rtc>I8>MT2#e3*aBuqcFtK_NNd@V%iPDD$48!&x9uqkThc*b68 zfOw_}=xh*3f2<0yp?|MlVpswZ;^%FySFAk25)ffo`17;9e?9WCS!4G%X$#EZpG3f#v7g2 z^7(1_K+lZ|UE!vxpI34h=$n+m!DUL7sEEnUeUN+7e?NhnvrqR{#1_c-H)`tDBXM9r zx7U;-RDgpv22*0yqr#pJ=7s~;E zmL75nV}D7ZlQ| z;;hSOC#oXw{w#mb>%Wo$nNRx;KG{09mVG|D(}r>QCa|L<5c}+PGXh$oqhQMKC$QDP%W)pg`C#kWF}QWgH7^l3;&; z^B!mOlQZUrg+Uq^iUP^ZM0Ej0?#Djnf;2Wr6V28gU4r#Ci5sYHUfvSNYV`1(b#ckA?7&(9n z$@Cmx6UTox@25m)$9#d&1&;|&^)9EJ2*IXZ@yYt&+UP`lq;;D#+=W!KEu_IlUJ(!8 z6kbe{f};l;0*wwk0&%C=jDrWnFR!!w>C~H{ycus&zo=HDJy1@zTvX+dr9P|lA(}KO z`FsoU+4QSg!Bf~HiVXHY>bI|DJiaXko;hUS;kbxoW38cts=>&x_t2@ge^Q$8p-bE< zf+|6c8*iORIvJB@D}I&LfsS6@jpmQBBVCmgptE9Eby1}kygwY6;Z4?6(-%1uEL?>T zI_ufM$ukWPTn$(5H{omQ&HtLDo={}x>+V)Y51IB?bZIh*^}4`1jd9s8w%lL z%v#RJhy97}6utX)?lg}?4y0@+;+I=|ww+0bR#0?)&!6@&!AfewpZkP4e=z=GrkdpD z0IUs!X6eK8xv>>YHH9L7J@lJXleg$~L$uwT0q|Le^k11LNUpCMtlS*@w#iwmx;w0G zN%BJx=JEu{gKQAURamarlWQ5AUNeWfpo1~K@QUTV#p{FH!Woo^w{UseD=k>)>rXj3 zW>~ngzePv11EOJP^c1a~a@=R{c{$oA_$PK2oGqP5&gcjw=yxooVR zy;!Xn^cn|Vd{VP%v88VcHHSL|hI?hR0X**vB1Q;zsggL05JXUqts7 z$}7pH;Y~Tt-G4LDdiUA>%B}hwgN2vu@Y}-nBYU`e<{x|#3+on~{Mwgxej?bEKr=M< zZ_s!?KB(e$t0+QA6!KD!Lw1;4?}FGTraEtOiWQe8*icZ|zl$n6DpbZ$ zd-0)q)m(eL;oPtzx@>ug0W&nV1824DVN1->Yd6Yqxsgkz2^aJNHk+?p#D6t)=VFs^ zB9w2Y?-YLBrD_JWVeuBg`mUB_EvGF8!xN$D=4KS zbYRjFQ@JTt&QT-!!L*3(DV+rPhD>XcdP`kO`f{Z%>2!^i->65eQ;SF7Z=}C<^7bpIDy8*(Q5v~5#?v3}s;~ZK16e_-pW2x0s)z_Zv9LMKWVyErp!q^2 z-o;ML7x(yeU8AmEKcV?5y{8a)Gr*0*P|Qb9@@j3!Bi^6+-J<66y1Om%XA|O#d+mm9 zru-w3mrZ~<+hNk`;r$qK5oeL&1X^|1v+$DN6hnMwjWJ}Hu3kH`?k=V=b{ur*cX?Ua z2q$XUE5aQN#BM(d#|QM5=hpg}J(Q1Ea+oPfU|pVR{2du7ZQ!)|=Bn2lYgy;$otEYv z`KCw#<${)?)PDvp6~K7hPN|bUdi>MKKxIv0{~qZHGn{MSbWaNF>}Pij)z5Ff(l1~Bt9%^-wU_>kkI+Y$G-2v z^2Q=DQ-uPmN(Z3JP59l@IJxWi35KfTah&}Qqm#?_{xw8(4So7y4Q419h>aB41~-)c zbedVI4d!*$v9;@4;U~f_x3_TUU;65e+^402D&xVSW8lsmg)pD2?2A_MDe_vKAQeb@ z!Vkpj@&+_WC+CCeot8vEAdBu*h#OmrJ-=a4rqrIkJG|ez9OrU3AcUiEfh24``d;in ziu!q>_B;VD-0i%9Oy2RcIiZ>8{I^jkvRPrwmZ&dREwJ4JCkQF^?=1t6L2!tC3Xc(OH_v(X2SOR~y zA|vjV(q1KN-{BownB)m}iIBk|jOfahpxsD9HAO&6e49X{YS9Y6DA?Hs}k5Jh;7c85r=EBVkW7uPO33 zjw_~M{WF7|il|a?Ne*~-*}riC6hkJU^f$EnUVUVYwaE^k- zy40(#AZ!OP-F{Zcsd=aR8MT=pn6kG_R~SlTY5T{cwq}mOM+dQ&we`B-?n`yx>rJ1k z00(cV^{|7C*JkZMq>*WL%wgrr_fePwU235&xWl5nCID<>e+0nLjvOmyj7lw60pX0~1k-jNABaNL@cMIE%6gH6fnZUsU56aXPp_CizU>CX+(HS4}b5~Xee=8Itt7MJ{ zU0~jY7|1K4`g*p}Z^r~M!=_rl(?y|@=4hC#NB$p!&8va2!=^;$>!cL$`=4HKTFB4* z^KyCv-0{x>H>;WT(&?pVnWVE?`wZV~Zrwugf2e-!?>NS>PWPi9T)^6q6&ppKgKgMe zg$sa89oIk`aBNzs0qS!Cn8CEbuXir^uJ$^% z40UIGzHUInTB7OT-Sw6GOd#%o##^0Kdnh9 z-beo1bCqswDHarc5}nb>4gzpjwuoJdC&Ic7d9~l6w`FQmp~uM#chg`;Dah<$j290_6{F_C zz$vNJd7H_yozejh<=T)eP>uZ30@a8*Gug~`VaHIBdsE56K_+E#ol8gg=zFs!RX-W} zmD7*o_O(P-`pT9XJ;ru*&C@+<=iM_(xEQ0cue$d#$IA?v4i*kloF~Cj6%ju?8FI*q zvEYuYjIBMT-b+eVzq-2hRqftbhpes`%wj(beRI?&62H%A7cx!n*;O;7!~!GsVgP6_k6b@;@?x0kfq`Btd<- zs;4b`SdmL6C`Z7GBsBB@Z{u>#@%?eUU`)>%bX8?qbM*7-Una}U zw9qSwqV`!MyQ>s8y0wCHg&zN1+)N#DE|I1@s=QXW(`8dJ=Kq=3k}<9TPD|30+p}uN z`}G;#SBOno3h}pyrkP(!1Ey?VpFcP3^7~KBo=>rsYtcMPEWM9Hp;a#iegC5`=DPgJ z2TbHb2-3hM%)Y)0_v_S*{l}6%GqV3Ig?aeG-?oVYgc6 z*%tyV%64}DzIR9fdZr4wEGdklt2OiHNvb!W$jto!^^GURb>VSok$iLzn7IWDj0Dgw zQs!4*8Ier29#c*(*Vt0ih-xG^Y2Ci_(1pH&&oM{sg7lCRIA#epmIG=Hg%hHp+~d$69&GSF6V8EXV0v)ysrS?dLj20o?kcvcY)9D1YeZ=lqtH@y z#AKW$P3cj-xJ`dm!&oinx&&*&2 z_%1m^PuHecxb8jcjl5`9PLvuAP6g$FS`x^w#Bo={w}&S@N2U*Z<{vXWoGj}AMi_Bp z8m|XVBX7+AC^D?gZxu+ z>2xfo($ZefdCLHA^xq;~0f_A;Hn-NsT1={*CbcD4#O)>ZVWv>=NiQ%%J8Lx#iXrNm zu6p(rpudq1w0G6My82Jq8wq$_?R&mvB5)>uy_>TZ<&%vMM%0}A4T?yEU~qRj^B%^v z2vL$Sv7z7IQH&%6J!AgC&17%~D!3OH9$O2)>fGdla{a6*HdIy>4XR&*H1Mu}@D`k` zFTGPzYQw&aKBWo!oz_#2+6pMBt9%tZ4P2}|z>;-oL;d$%mRz9MuG`wp^-pTV9Qp); zKmG}Lm<9yREVrOz%)f>IB_5m_Z~zph|E`4s;6iZy$EAg%r6K+>m7t-4g1ZUyzYGB| z4wm$7zMqH&IOcf3+_&sXAS^#6hq z?Fz)zDglGRBb6CD0og>5z}evSv$c-im8MuV#WDr@dgB3r@HcMpM4epWw>nYBavkps zpt0PGgOjrEqgKD{mVi2)^;*D-BAy!VRM2*M@PA==A3>;~{I~Pn)IwzG{Tpvl7AA4v zXptodPRZ(DnZj;g5 zkHiYmzYk1`HQKG!7MX6+a||p_MjmmW&Su;o@q2bWSASY54`+$xL-A}j4 zc{srjvY>x@q@yFK0jf*MiS5vMHt?|i?Hb^Q8ssQIrbqx*WDnMjZ$x7k&aqCFq$3$O zu(wb`w=I3Z2wM?t!55j%-KlRWc0M)oLCq`ha?BWM#44T=tl<7&k~o44rAs1*wsuv zmDbTkvN5{KzJqv_GsZwgI>)D zQeueMT_ltts-rLp7_1nz396~_#gUC^y?QIM2>-QPYj;*l&Y+C4X~eucj|tC`Hiic~ zS4Nv#v0oL71G%n%P2L60oLi0cyV0ZXX0ryzo;J3t?bEshJyGKX&v!PAiP^vlWpo2Z zNX4?1ZR`G*SxsSXfd*gW>2^J(3!8PKB7;##V1i1(n)fB$pS5u3&&C~38!>0GjF?Zy z?9yTyHLc3=`)VtT#{ensG<4Zh@5NGEf6)06!}`;+Z+L=Co@UI9f6~^g0f@*0CLkGA z2Pu5{&ZNW)vWk1QYZUsmU+WzEafvT3XEcyYfS$J;h0XejfZM#7=sS>~lQUfr+)OSq zEY84R;_Y59GdA1)SBIns)33Nll zw;b@3a!UoYCMZa73`b_z3~6CY^sxE?^KOIQi_2XT!O}qvK=0|5e@FOHk(-})?o}XZ zWTYdke2G3|TvT2Qyw!Km6@dOgK;~X_8I2<6+iAZo0b{^?5s-V*Ls>L*{fply+avX84TGUN45qnfrg+oVj>32`> zwj|iw?LH?-oBh&+iO$i_SwE)qib4Aczp(C;TAy}bg#-RmB4^qh3dBPBZgvAC3XHWv z2)y}uhCsRTKDVw6_sYHK7GP6bSQR0N1O`aHP1`dgjsypwkw{>0zIi8`XZC|PGD9lx zr$SeN?f?DxU-GXYhJnleUq1i;zZC>iaQ){H_dV72gu%K`w@%QR-=lrw_Vpt5dtv_r D-7h#p literal 0 HcmV?d00001 diff --git a/src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png b/src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png new file mode 100644 index 0000000000000000000000000000000000000000..b0ca16f94f4becabdc88b7712cc2358bc1f8d46e GIT binary patch literal 24240 zcmeFYX*iqR`!<^DgEpl)P_4O7XIiwzBBHdVgQ@13s#!!EGZC%gY1Pm{5lU4}2|RQ;dLC`ksNO8UTa;~bzbLrt`{ao`hs9F zFbD(^ykl_l0SL5z4g}iw`2ZjA&Zm5#QQ&gW-@pa|0v$U3`+FY%(*n5OBI358N5vh7h&(D6lHhCg0 zf&Spw-F+Qbo-dn}bw1SzK2+U5o~gT!0^^C>6sD{Pn8|!sHJN*A=DUB~M8167@XI~h zGQ&&fj2cy8$3C8YgE;fzt#!3q2cgSm&noO!UhgaAGo1!L36a!@^Jh8P!Pts zw+X+82?C`(Q2G5VAW*)ge$QzRK)7089(;br$r0Zt{QTp%NX>vVVLszhkwW3AT7ki_QSFJrRo9vlUN#NayefY;)3%`982 z!gn|Di{73%jtH+5Y>Dt3K+^in?acZ}&Ch%v%P}Pm!4zlpa+fuwvs|BkU`n)V31v;E z2_+C15h01ZK~m$RVeBigYa{>c14Rw2y}U)j0KwUBAx4!h0>U);N#{lt5Wlhara5Os z{u{2QWB*^mH0m8C7^67`0)6H6iagTZ2PB(M22nF>i2xpg= zD|llng6p00OC0(hEF zQQkMDe?O@++H|8{f`pI-vyER79q~>0h)Iu`5uxOp>oUVG2*wVF!-MlL6@$!U0G1;U)Y0X&|9JBr;j#)`rDXOTBxKjdif>Pf2bw9=V-^lR_ zYEdPUu7c;31XJ{ZTqiT5sx{_9M{=ucLbLXLHE$D~f6jbuiz})L#ESV+thz^V&@|W1 z_&1d4tsWv|(q3&`v44}=5A%B0!qWepH7^C1o%tZ02{M-!nr~1yQtvJZbxA0Jr@LIa zw+L%?3LM@Ptk7kyejce`%JFLb-ZC{~&1U6m`i4=Wk$%yg})cmv(C=_`CdWcUXc+8bLmtbd?t z!Sxeau^5uPg!96mQV=CO5cH*WD02R^CfnLA!$j>-7lldN`Ibd|7}FWC`B0awUW~6k zy?%=Y-h33h9)d#Lhy0lYa@fW#J`mm#iBoyLes{4;bu`)|+arOs`|m6rRVnH((}s1o&Z-=zFnqyvGZa%YI3U&=`G)3_joT9a9U)QAO&bC%YAxpFtqiPC z%(t{JIStpN8_ym8PZ2w2AmSGjpc0(@Z^Zl$c$QRvI#B6m5`#8v!<~j~X9vVV?;f_o z9le?2`lTb1VJn&RUDLXA-)Aa(U>XNcbH^)SKEiz>12ykXmJL!Pn79fv)fkHTT_93{ z`$xUAqXcP;DWNqLLxYybyyUEKl`|cwcIXmEjc&B)D@n&U!aZc=?y`A<6vjAzoiAO# zdw6rBA|6cXM@BN0Nzh}zBQ)xm1SD)g6*l_F(9kgG=hvqLaRFAI11vMzy~VvTX^YEp zwlDMp3n^^0pX!zJ5-co1W6V-PL}d zk?+4dxi~u#K;!m_^rIlFMpg)#0sfb;cnrA18$c}_o#6BTAM;15b8`_=Jp9qP{h$y*n>OO zrCAj-omIUh5wGFYNhu$wT2TDUC)(8c*gvCu)x11j*G!BHu;?oYH(+Q{d%?*bi4j5^n`bq>6b791wi|lk|g->Bnso%KgfnWc3c8?WaI~xQxGk`|! z)JkfFC~ll4y4~3&jq9TxPmFf6My$gKVRTWU59R34nT!^>E1jbvT@XcDzjAm!j8pf* zq1MFBUS!RIA*CIMXWgR)8?(w}aDmnEG>f&bPhy1o8RL@BtDB2%*M7$~@T@xRF#BQ8 zuK{n{>7Z!JQe7*?UA8?XpaE z9+nzbB)lfF+dt&{JFfl!zR&1qj~|2>z+o^I0ria^+jB!+G|ljPVw2p}(YYoA5kYVP zsHE(7Ug$kNLQ|xYT!Id4PvsYbwD8$?7-|H7O(C%Jwh9@jM zJiInxBMqHTlXZ8>D^5KhbNeyeN19r=1fEW+tft@-S78mDxc$&>2RLaA6Ek~_3Z&$m zhAr#Cxw}7HaMO!CjhHJ1@qRcGGtr0=zG&b4>raZ48O$eK$6IxZ^r(!FP7uSdB!D}k zwH=Qiq~XN$2<#ZFaV;9F)+u%>*`j=6rRcET_7wXiaKiEmnnG z{bYOlQTEN9&%ZxgN)~3;YwZCiA)W{L1u~Cdw37@RlS|e4Tli87(08@xMGM!lwnN6F4VyWX`{u$ zVn=Xem=b(lzFU9hWJYjyMQ#bPdJP>$326SR^MqjdKHnz&$bi*YnCw_-q>Y}rX?N^b z(z%(z|B+?PUDZ=(c{eQO^Ii=(0tM5p+pp5Ffqfav=iP$4^h5ZKoALUFc~-o&t~&LLTRd!>Fxcn2hb(|aPS14~QMy@nZ+tnMFE9t^n%3R^IrFFZ zpBt`yoLgd#za{`q4ay*G*X9|9dt~n$eEFyBMIE!yQ|C|C`VCDC@cXTR&%6j|D*880YA`Pz2EgqB-ov9VQFKNu`vm^ zrpH?jH`C+j@MV0LENs!Ig3nn!hAHHv)_uR`z-h^gf`6v_>vO>v=8Zb)lhE4i!>75{ zcBL*~d*?jLor78wwg1!19e*RkNi$~`$K(diEcOMZf- zsaUrZT7oW40JV(XTQPI+T}%^RF4({+(kA!Z9p)!7y9UqL)1m*@)CbvXw}L(j!%;VK zx!+$`sG7RQAgsEQNvk3=l24@u<^G#moY6L{XEv&(q!!Xvg;8AtaecRcbW_MttAFAs zy}%kg-+5?3&j7AD;+p5}*yAjY+W6aUukZYR%zw61TI`U#mq1Nh<%UXplb}xI|6}Kx z{6y0@Gs*7*fQsb}{#$D)s{{DC+rPJo{C~&tKl@t6PBD*O3_pfcWOT|BdHf^w)d-6x_%+ zhPuFvH%A}+qgD#fvC#zG|F<_+A2x`wIOE6Jq*ttt;t>TU4s}Cs=6Z7UCbz4qsuJ+a zvz-~ug8#+=S;inUxHwZ>mWFYsuBW$_^o?dMl~cLc3(aJ^iM8UnEv5iSF_KQF2d(_P z;p6T7Wp;KpCxaxd5ED86rm(6?MT`3I>~^U0Lhm<8P_jV{^+`H$ohuacdR&ch{V2N5 z>RHovDLh=+USK$+nTPY!PW}so-&h>vJf-S4=6U7Hm1Zfkl+f-hNOjnTw;d^ByN9(n zRC4IFBNc0lOD=_Ngk(0Ayq8<@*&A))V~JD!X4+F+(ub%GD3p3u;+a)?C8@f9bJTBl zXFF(TYqiXX#GTDD#%(eCA0r#^luJE6kSqO!$ko3iwKeqj@LSBDP%j5qX**GY%(9hd z<6Dwy!dc5@xa$6C+r&qAkviR3P}oQ-L+RBO#QcK}$%hRqd_E=b`f~DEkVo0I zxsdyzmM?BhPXtgDbk)fp1ElL$|K1NWe;;>e{IG<&Go>1K$O%63<=pc=5jo4}GDS!5 zkz96}FB#|HVi!Xe6jyzYycmFKtH+Q>jSPQOec)jXmDn|Fj5a(gA(7dm1tc=?!6J5~ zJ~7AD3sNAnM9ZaDF6SF&G;LC9;0jwil?l?_3hHx<-{VDv9Ey8fy=QSV8aOF3eqnn) zgy2-+Za8dI1AwaMfx%0|N2|%*ccJ_+8uZYfBdutoQV7D&jR@4%2&Oh9ri4%a)t1bT znm~}_iW$RXLD!7c%~I?9?U~rs`JD=PJr||D%Fd`KW}cQa_9E*U+T2?1%9;3*P}A)R zf+|D%C||BwHj4r${y@9uRnW+9IQ;Cc8plpvK2Y1I9*F{zVx6L>A~$dmI2D*?!48r0 zB8nn1kmN86YhlGI-22d#^++msbv1w8Hh<%TZk29nQ*B}iS5|p3JjUt@nSJm5Ia;&3Ps%^nJ8obFy2HmP7lL!Go`n@7bQK9ZmIPr+Z}+ z=EI@JlHCfAJSFL7`y51t*OgW+_d7n$J`Cg^>p;UXC1z>a{eBU?Lst%caZv8RT!ZdN zwHXg=aQ#O<8ObWW!Wr1lXWkd?M17>66ddDDgA?diIbB0??Z-Z=Jmg$h_7zHD!{PWQ zv}oVrAyB(vj@m@#Xmrjq3{M_Ut!{dgdHW7-OodRQ|o}82F;c87y zt`8KMO*$I>xb<{IuRc2|Zc`niZOJ>D^j6{DR?al`5~U zW@Od*73L;L0sPB0pZ1Zvu-*F&g2yoW4O)sP6KV`O$rIr$S_y4SNMOc-GiGH?ji%O+ zI11$iD=x{+{YUxyMarNHB-r=RLWF zT;_hAn2QHy4}Af@)BY!OS>*gimEWpKNvTL|EBGCz3Hxx#;z`U#2x6oBTT;5_u{zx{ ztF7^ye03d=EHf%A1iBvK#QDyTl$Q4FQn(y)3u2U%trdE$m;n`~BP!k5X&M$vFT=;N zYBsZP^4`Nx-w4{l(Hq=#`3zhbX(Oj+-Dx2=`(EcmbXDp-`kLCU(yHLw`?&IpB<|1= z^MZ_}`Bwg{aN({+Cq(?9{Jq(L3x)FgEtWf)iR@fPJ@a!yDqoBlBDD7(ddeI*G2%-K z(XE0{CUoG{7{_#RcGAkic{P6;6A|B3FT_(2I9O_1Q_izm?%Eowi&+jVepnb*vN3qp z-okynHM(@OfVtAzt}>Vb)gR})^C29VOo@OW{Mk7|Y{%tqM>gt+s_xJVVO-rfID<2& zIsvEhr|CVhFl^HiVYXy21RBi;rfjNQT~S?O217o1p)7qy5Z zY|@IV-uA$)r^-sfuQzu4oorcF6JCNoQ1|rE)X{*SlVgN#+vbc(jds8T3II->OVl%buF4kse$G^dI`9a;hTd;Uk5iJ^h zU8pN;ETbX3!8^u`Q9(DPOmiFbbAQfv)>b8`WlP61sI>Fs>)$eJIolx@$?WgzQ0e%r zn#dEo64P8-70QATxNAFG!n4B@$1)~YV`8xf>#E7yJ|OiMR@^FL7d2yk@$Y|HHN z7ODDbRNlc<$I6o|^H@dTn3|v1S=^*yjZNo_!a*wb*%-GI#=g=n-lvq%{ZjkNke!%Y z-KT{|PUMx=EcW(KW~YEQ^&Ze-&W(q|-ICSc#h^>&BIMMugb&@)%aO9?JtD)Xt#Y}0 z3rV=6lY{piqr16txmG9ajk)82r=2UA25+iL3QCHqTY?;}L+Zwz!`g2$^xv!{eYyCR zW0I(H(F9KqL)RkuhI_uF|Fh(ekjC=@KEib)~B_;edn&r)MD z|LoFsf&Ozu%u1GK4O&J1fas-bh(e8r3lS0A??Edh#A(mH$>rml+rbVG27>Tss;%A< z@4bP>%uXIBT6*2f@P-*7g-63Qe`uU{0T1Q-2Oej|E!elRn}+q)|6YWg+^|G2Kj;m*TBJ5ByIP#EZ+7;N=5`J~`?$;& zx<=kU+qdY|qDeaD=;6(FD9|41Mt=X=POT&DbQP?qAN*hGyLmma=5 zU;Q*5+KZ@~=29)OX?$X)PmU zFEP6s)8&<)zXXm3)5HXfI#~y4X7?IZ>bpM4P?+7>2OERZn8rfNlE$BQvn~ce?bS1V zB=`f5=D6`4yZv;G6NhaG;ox_VE-F3*`UZoy7@;|%{ol9$S@u4*9Q|)zg7F#A+uqsG z9^H>Y{{C9`A-p!kE@5A0Y=A{k1^4|)sV)RN6MLsFE85ome%y@{uN}p{8Qvh$Zzd7v zU6TauPDqzKOlBUX>;via8D>Pu2S&T-S$HI@<1V$CCm0df_s zFetA*@3>2t1|QF3;a3Ir)a^zDUeW*UY@n4>*oG!q8Cm&5N35`@jxSO(0PZp8BM+Vd z)4!j=nH?HYV z!{(ol1^80s!SkQqi*YYVolH}TX!+^6Y+9v3IqL8z9r690Ve@->qWt|p?d!#8=~?v# z*Nl<$<2jVSt|%p+5Zj_}+GR=Ro0vH<-{)2MQX!J3Gv#Wr)X*vbr|XEOBpmV(!$cdO zo_%@h24UDVKmJr3J}vNsf}{O=?mH%a-yf#AV8-A&MuYP&WkP{C+0t#>d9JPaHtXi# z?nLAHZD4d#E`)|{D{B^&`f%JSl(vHJ)9YU=Iymo=h)5WcLfxO#!erV7UjPPl7fp`f z5MruByI&~!XI{)ydZ>ws>4ph_3jN-)i`-_jt8E@^{Y!zEhCDb&T&z%gKFh$AU5G(b zIoo$UpG3f(bP2hdi4d+5R*vVp^xMzlPji2)-uWO05in0xvUb=k%C=*v)x;d)Rr1@t zJ!p9ApZRHGDf|o9bY|x#a=+n-xy6OdGbLX}Ce3O^j`ze1uEJn2R~!NW!C#gN(gNGJ z$3Qal{EZ8uDo3qm?76*z!ZwEgio9GrZj!Uv9ytfcHU9j>{ESIA%K6^%Q`z^7F8gd( zN)|kkxvQUO)BVA&Q%qFAyz8C-ZJ}a<^%kWpbMSXd(mTC>zm%U-gQEH1Q|}wc8Lywz z0b5Na%`*C%$OBRFB8`L5t!~l{@DTNaw#N%GC&YUja@`h6IC6}am?0qnryGboD{nDX zhri}R9^F(Y>-ZC#oekrgd7rPEcZKiGSC>gUW4yj?sv(y|_0Ci`u=t(d727oZ#2Lm+dPiu)OoL+{Y<|TN{1+jmO2$Y7SlwPLZ^Kov~iS%KmoO6Rx%5 zZ>N!?q9=KJ)cGU^wAoTSB)8eam3(ukDee9Fx)I-kIuY8E1!k1UkxYM}w-Wusr%6pm zw_f_(nvrIFLXeMkrpiZAU8TX}^XAmj7`~z~($B0@k04Kaj&DKG?lQa;sP^-`v+Crl zD!iHUcfBSySL<8Yi4)qjNi}xOaHPib^`5myV0rI-bQ-&uHK2nnm>(@hcJ9Rf-~TYH znLo)a3Va%ZamQjD?syxO`YS0v&}15?{+jE}t@i3aZ&&{C)|SS6#L|A=M=@hZPZK2& zc|M6urPjF4$5KHh@jSg(7hT6S?xsLi5sTZjhU(E7_!oi?RVqKJU-`+VLm|2w|;LuZQgE$CT|EB1boM|C;P`Wy#%J=NyESH^dH|=GJAOBKiB{)>oeg0K=$G=zcsg2ry1&73>%G zpuVjGaC%hMV3Ax)39k0NVvuQAIDNmd)(_ej~`Oi^|NbkmV0Qs->uCBV)%iV6>utPV8`!O zT)vGR`5L^;n0;m_5+~qr3z&)XNB1EGz$Oz45bY?+&5ah_`<+v%N+<14UHn{XQ*r*U zWhEsd^jWajiVpvZ|9EHPz9CXO;Qd;wSp} zX?MG4@4r2fYB8wgfv#RMgGwKusccO9eK?Al6pNc&q3LBKHdMMxGLu5&ySal$rbbvSTYzxrZGnP1eug=cSBF^~5_esBS;TF9aqJwdyxeQij*}U`M{(`3eCV36HiZ7@m zNzZ(aHDQxT<9V+!*|iGKPb5T@H2!)y!yV!9VPEDb_=DLQ9@o-yN;A;trYou1TQsu; zcD$%U7boNr$I5_O=Aw5}(dfpnuTS^$))*gy-|5|msfkIJLci{=TWCnE7$%rQ2XD2O& zJ&N~q=a@h*l)4mA357r%{^?-|h<-kw9cjE?_j6LqutEI$R`bPwu--W5-PMglxgRGy z6p&QC%@>-ZC0>?>Y2rk5RUivkh?Bo*A2*>n8g%=vT)}8+{fL+))&0)Lx_PY`DAdaHCr8~FHO^BQ|%WQ68Rsov@F zrG&C)vv&bi(S7#Q(^&?XcD=vwlCV$Z=8tpt^kE-zR!Ycu^6DFl+Jp`0dUQ^_@98ur zmgaVJsP$Z!c%fJKQVuoKnSl4wayQ0#m;zI%gO|@)R;{7P5 z`>t1pA^%9%p?-rR^hEFuzv}drY{{ebgXXnr+H~`lCPJWLp3qRrUwNuF+2B>}>V+gy zFvIa)#*se$j5@5CpMyt9(DvvdxnHN0{VrxY1@{jlGKEM|DhmW%d?zvB2Wdu+rs{g* zz_0ghr<(o_(=vm4_#bBNnAsPhrAq(x$ff0x){v|{*TNmwC+7DItkkU<5T?h2HXz-3 zug57y>#?$Rw}Y%=J|qL=^BaJ&zWZ5rYrFAA#elg(C*_c!RI295Og7a!)N|G@Cv>o& zZp=Sxw*8}QdsXzfOxW(W(&;GCPe)4qrG8u_p=vOr-nvfa>a6p0CDB9y+G^mesu1G> z6f7AmQ`zwCjlr~n`68_C%{jd*hC8hDuzKqDm)TRBjWzb>{=}rx26glP=6{!KENK5O z0}g@7|B|6@&yTIwaK91;%^~2ioFaBYwjkGY&{$hLBolptrEjqo0f6w^DW-5SDyyPy z&2s#z_I6V!$r~j$r;>kuE=+Q;A(Mtl-WwdQ|}dmgTko~WeXEWc#(qdVpf?)DT7o8M2^o{)<7&m@Zw3Ld@(a1O&X#d9D0E2k#)eZzgdE2 zs!ks8Z61nu3=X@psV^GuUXRS2mMnyaawR$j^iwtnkNJdoIX0<>|Kdy-b;uUdUa4jW ztgeb;40oQrR|_pY8#Cn;M%BAjx_3G}e=D%Ta)*$Ib6N_G@aPc9xhn*)!$<#Gzxqus z{o3e&=W65hZE*o3i{LB$J3XUtvIqQPm~zOgUpMq7BgP4V)!{6^dvfr+oMcHyXgR)P zL+liodO=FDALKLs;SAX<_~qQEWO<&HfPEJ+5pg;Wn$t}`;WHnRDgu_1d5j3*q3)YB zRG*^CS`71UFz*Pmj9~X*sjlFU>UREBl=jQ9Ub4zK#o8?Q(oL^%^wrt0&DVs%f$@xb z4`awNv{L^sqB4iYD1GTKW$ScvQuBUNkn1i^2uuyD2U=fKHx2Nr8p?GbUPtVak!V!F zssSZY)=V5TD`G`CIZhBXbCqqvdmgEoz7XaMa8Avv1yRy!Ebn_u^pGL)CqQGwIg@5u z7P35u5?>l1FG|p8oJt)j%asADL{{*u{D8?Umq-6P6uES?j(L+S3Ry3|#{~5rus_j4i5Ce=P zaSh-vFaH(TJK#wnZC2*J?&1KX`q3u5{Iv)V|K&hH(|a*>{8nPmXNTNk{inBu(_|rV zJU>oRtp4_kyQ%yPu26rOn>8x@vyGWl8{Ug=&tl!zLG62XQacCotmhCR~@;=@Aib#`EPM$K4 zLlofK1~2az)^M9PrL}z&V91NB%(noq9)B=ynJ!SWPg~02(Z6a8w)x18wSKLW(jGu# zgZBT?XQT(hmllVxCdHQqZqM(x_j37&FMNYLIxRB5i3}re=}+B$I8Rl1wOQKuv&FN| zQ6AW`VHa}o;U0A(PB_K>?@z7Z%J;8y`jr8>)W^%~&Nl&m^z0JFPQJ#8y6KsAjZUtC zJj_Os&%KcFG^7>89~65*3NPjTNh9DXpIpJuMl-Vjh# z5fXiN{!*qU(7%_Kyrk5OETyYfWJ@cbjn)l&lP~S-Xbp$%{F_qEcB?1>8fmVraNpY@ z1&17a(W6?K*gj)*pq8XuD-sFVD3Q0I-N-y->lgXg?Tgv^ z`FMd`;xEOZLI#zmb_}y4BRoF`eYgM>;!-2NZP(*lX$~qYFj0 z6957fj6qmjYnJ$R>EyX_&SAN+?K$cXpAQklXar@E@r-cU9I3uHRQ(i8Kvy^TVfW>& zHBJvu?YMnT?A_^{qU}c}W!~D`w=D@B zKB?%a9WvG;enQ|re6ze&7N~r;y~#3x;fJ#hbEi=2y>iD@5`a!7O)CGE4mrS$mg|p` z!GhgKGfrXK!V7owMa7gIQoF|!ADP?}6#Sb1UQDlo=WIzz%g^mc#?Z%;<-Vxh!1z-! z4i<=nQF$?8+_y-YMv`*nqsCtc5ecOYA)aOG7FB~#;xWGb&^pBj93dzn?e*wB(ARf` z3sK8A?ws+scP!sTPITh~YyJzc6uKn&o6g>$to;cCIC)_+l?NPauu;W(@jex?I`%v4 zJlm60?;`Wrhs5+DQ_|SsvC`F8*C+XrdJBawwgKHy&w1~gBz^N9Bm5$GfM_ZITj5kd z?&;-R=jt%oa-YDv0|NJfxG<^OH%=3>GU*fc#;9LVxtx$HudGaBh3gqk1fJHdX-m_T zIgR#q2V907@XpAS1{$1l}CwDMiRX2ZW{AB z!iluY^Vi}Xow=sG$l>e}k{0}Aj4q)GFU4fU(}QvD>qweH1ZD83?6yj2NWs2bQv=jb zvrd=DCl(EG_WJbZIu2WG?me_T8Np%4Y)**3tS@`#%&$oh1SKC9*A5(duTYdQ5#18} zI`kU-dXI?wMdi+};e4{%?R^l3GoK1px#iwGVRLaMPk%}^D46pt+N$RHz1w^N&aJ0L zcohD^cs1NU;;~ZOZd$fPbj5B!wzzW-dnmbN3MJP$a`cPj{M^H2{M_}Sy|*ZdU1wHN zA(-Uw}oKL)yR!ZIy?IM zQ2j+bLlUTT2Wf=)*!1c>DS1BQSj_g>oJ*~`>c;cJ-ZP&TV9nxiaaECw{P%jHMR$T& zsZ=j+((dqr6QV;$-8g*|>v&ZD+T3*k)4)2D4XPf2b*I6D<=nu$V)-U3(S^EsOZ4D+ zxEljZ@#d+H;ZV7_&BTf!_VDo_r^V)=>IyB+Um)|E*%*~-lH2VA zH1S>g?8@=w`Y3*GQ~qcjIu@#*3VT91^dE1KS6JHj)`ZBI80vZ`P!mKxb25>j8FMH z<3grKx0Xwwf=lsV@2pU&KF}>z_Hd?+68&7ak5u4zTy}`8`By9M8mc^&&;*YkClZ5x z#_jpt%gA=^#{Zf!WrZ$5?dU)7M&aL4p|1xAdX@lNLAGpvI2GDj9a+_1eXHh*nh{Kz zkqbitOsMZv#)MVH0Dpkt2g|($!`QzS69%8h_-nI{Ve8l`Lwj>qEA+2y)TeVyL?9Gt zNKoH3@O;e0&x@8XO(0N}rJS5udZ&Wg$4sfnsps5Ar^ulb4$9O`?ssX*k5huYfVfw_vch4Lr1udg9CQ>=L?~}VF01SsN0jrqNZVd@9d1>P63Nm zSy_&YiGI1f0fJHmFT<;$nhV;TFivhDr-_~08_CW+_0xpB{@#yagLN!^8NcXL06J0$6$fkiur0K~?AwkRTMaw=2@62k$-iH39 zrF<}zqof(|YoaH$-ku~*XLO;sIr~70VvN+tHDA^Bd!@n~YAkQaq}KHVbBa3sYi`+L zGRlF{`OKS>UgVeWEN1FaTkEICYp8cOB!I3^cp;Tkj0gVCDz7ecfEv*%`60))+u6UZ zsev!bc|wuHKnNOhz`r0i~K2=|| z5=9<4#A6pRubVMAthi7u_8PgHX`>47ikatCzY=QP zxrcQjyJK@&v#->R&PmXhs-h*QIS^jZ*;IBOCt`jE47g+?*X)CA0naet0UEsqIDR5^DSO%6pz9Qz9%wE{&i9u$gaU{PI7x6o z`ApL*aj3XOy=IA8@H=+lGhDKx?>UH*x|JJ=mhD#okXrNMiC_A6X7J1exr?pM+r{Y# zn^Why%j0JiUOnW*2&t*0|0wfco|+`|JT^avYD`I`e4#0nk0^=9Nood%OM1+{I>iUl zDbh7Sv6ddQ?iDnIhOLzDcQ%;q%d^}g2-yNs%{4_TClKCHW&%hkk2`)428u~vg(Wc6 zG_N6?KR^~?zQ)Caz6zUo?tYV=@SPb@4o)23o!sjH$&7rlG#vpmr1b_AkgP^|J5H}s zHIlpZiJfFMy)!%bD(bLv+Nc}6nr)V3-JK&j$#FUDu+JXZ2V_2rF$8;3_N$ML6S*v| z!a;Hf*{WKxY?SesspdI)81(h*9}8aI;N{53S|{b;qVe@Fb%H4sB)8bA%Owilq<~p9 zV`(0ZsG|Uzu@)Qf0`qHRxnGal*Bs!B$@GX5ay%wW1JgW=p5K@}K+_>q)%>yW!no{> zYQJ$pPAh9^#I-J%QSDF{WP?C33pv98t!nK7__A|xHK9y*&9HUP2{*tnRP);)J~~G$ zpjboCd>r$3s%$#n@oMyXkXwIMZ2MZ|Ja}Hr0O-pI?2JJemT z3+y_tshoL+7f|s5WTeTRzC6DB=-o)o4TU}ThOMPk`dGJJiQj~M-BeO!w>)8Ya43B3 z9c1f*^dT&Sg&Ok?G-O_(P<)K(-1m^(7`S!!TVu*AnieIC^IB;52lj*zoso`Ge`LHv z*IwM|w!}JxyjIy8xuVKSb<`@W#Zt0%)*>}m6ZT+`3t8nh3K2L6C%&nzb40PWR?%pkryip$J%joYN8|xVCk)I|1@3;(9hC#Bhk?dL1~)BP=X5{~s8^ z)PJ8IJin5%_8ia;ClEBtiWXi|b?Pnk*3aP)EVAx_?jWbFvVh&jxF#gZI4N*v4$4Q8 zvY*%;Z{B1YQkuw0PAg+a`Z!&glEaE%nh>{VfKl& zqLuYHV5JN3-B=hL8W>Rag^H{BNw97AAv@73dKSUF!BiSx#%+2WpcR9nn{`w`O}vj>(wQ!)+GW3obnm*c$25U z`WkW_&Ae*;1I8UBExm%BpshFuYqcX?LdH$s+ZNx75QMuZnqPpEG?O8Dv$J&*N~`m# zfmfZG%N3@95wkr}@CgNn8}?>}UOLw|)SPxn_|x@_>~SUGpBKWGAp8X1X?Wr;2~k-> zK70%McJ`K;9nrXt<5~__E^p^0<6e`)H>t<+ow2CS5=+GPJur^S9PfU{vDjfZOE74Ju@`ipH=WSbU-E&=%C_FymbY8C!_q@Fs|D;> zW5&_~DO>1RzPdF%MtRI$D@xE}YjkA4^cSN@j?+@QW`nDeeBC!3dy5}7G-x$)+-cM& zX=$e(veq^}w2rp2olZ#|3CM{e1uhO9vDYeI2p`uIhubNm|UO<^1sic9~JU@!2(duXcPszm;#FtNMg;;${>O1NqwlZn5%c zUxs^kB@7ijab7p&vBkf^0DP2~odDDk$awR!+MyAWi)GvX4v`1<8-jy(Zf55M+y^|x z_p21@C)~#(3T*Nx2=IpQVYx?e=a(L1(80*<52rK94#CHfU02<@YP5YFk{~V!$F;xf z*0>FD!Blwx!$EOT(MU*_4N3VgKNU0RnjAJ)XBS%1fcU9r-rCD4rp>=qWmrYFWpV4^ z73_G0FX`P*4+TwSQa2e9Q1c-LE(2b{TZ+uDFjt{qz38Hu)p2`4J0 z|L8HKrrynQXG{&j?gCo&xabFpg ziBkQBIg}dHIkI+TLSg~4=c>6yAb0`Hv~9)id}2T<&wN;C_xar3nCihkcHd_MBk=2Da#(MvY@mnN9c-M_2oK zO@w3UEv(4y1uMTV6BnOj0g+-Q0uF$n= zr8R?mJ@=$4iS1HQd5gh?{6i4J+|+5LR;kN^#|@-}g#R z0a)G>!y|iJMIW}J5}1`iiiw#F6LE1Ic>cs+fmaGbLI_eV!4u$H{w5NtVfsae4=`m zZ(}3B0|EA^)son`yV34co;|Vi)ZbKR|F=*bMrb}{OxC5}RkC`!yyE>|QbU6h_D^l1 z@iPw&Sep5dW2H;0(><$33KYz4)xBd`^Io>-B0}pok2Y9;7)=cLT2xhm{WX3p=Fc}(~M9DK|Z&^5aw_HPS+Va`E`zPp2Ke6q6!=t49% z)6VZO@>}*WQ&5xjHrtLqc74dd?YmxwcotF7oanQ_H^H}2b=#2v3DsD)L3Lf(D{$ED zqMouoQBv^>Rj**)r=n4R+rKme+U-pfvQNfjK*^3<_@v=8l)Z+hUPD=7=fNA~=Z*97 zjvR5(E;&qb4T|IBJ84ICo~hm&&@pSHr*>8s%_1`8$`*)f+G2HP|7`A#ftweaA-!Ni zVlKXa@WMn!h3N5j0rC^djsa2&XQWWt;2o(cA{1ZfL`W=(%6AK!$W>vH%hwUT8h~0C zse19lUPkLY^$bfTg;5?+0-bV@0mD-3N*qPmzO>Wh{D=MmoBlk^OhYaB7ACfO9Z@$- zvRrcZoz6pIp`4-8pxZaN#jw!D`#xxuwGd1e)+<8n+&s73I^FkM{yt*)LX!J~EF1<* zn9|OA3P>0K*ge@(nj~#3#9zKtk7s!{+A%t24qu%fFX$p;SGuq{-aODz=ISBA?~acO zzcI5Cg@3$l=Ra`&Nb-WH~o#4#+!VY4KcchO^ zczJxuxg7@CI%(Vb;N$O0*moOIy%&3Yx>h>tx<`749PL64i7-OWRprNI*cau__UEK| zIX{TVvQra@Eu4On;<$hrAWa8T8<`x$)%T*;q39O8cVC^Z|ua158AE_6(SqrST zjG_hBtp@!Eg_la?pUwYmCr{6{e`<@8-eEkK|FxajN$?k?nW=1VZv|+-<>pN68HHL& z>``vk8e}P39_Z6)z!n&N_;g95MVNuYHKekOQ$IJPnD@xR>qXYLHe0jrPZUdIqLK>I zAtLLm8Sg~`3d)Lws8R$A3$nCXj0+qsoK1b;6t2#41Mg~g#xk`%7rOK5^)KEINy4)3 zb8lFMn5a0=^1TUCOlEJ~qZdi?hn&@U9l1t}tQNb5xp3)myot#Dh752n`$LAO({OK> zAxeB;?KTP;P#+=va|fQ79k2VW%L#Q)HqdYT;=4JC9iEuo*mET#=S}Y98A->@UsB7& zMqNusVNE5|NCJMg`~iDCMM522ayM5)4Iw8Nn=3;GZ96Knw6$6@l)tCOqd?M&cQNpS z^GjX(ky^^05Xs{@k>Dvd(qhowLI6JU;76Je!84U|?N&n^!T$u~#I(bG^Z64oBOx7P zkmVB3$`3Wgs~lbFiOP~-kJTGj0?Ti-ZnRbr<$unH(=SB&_A&=~^{@1YvZ)#lg*`v@ zr8IUVHkj@7Pt#0Dc&Y@WI=8e+n(^j1HJcH=toD}i)#CX+XW2PMSrdL&b%9YafdCq{ zCxD0Su`U04#9F5hM(D#T$!pb3YEEvWbr|~VTDPo;7Sf<^zz|$LF?CZKeYPga*{{KD zL;n>^Zh-MoXs)n%&o$f32B9{;Ud)3dHltXi#$=AxfxbZ170`Nwl-!rBefv;^zSTM zzhSRL$eN0pqK~ZN$ke1g>iDHBP}^I8Z&gLeX4X?Yge~J_!FM9e&(yeZ+|7v@y zX8~&{0+)U*2G=H*e6{-#V0I&R7Vaae|6VU(ie9lnm2^KwdiP{3e&odzd}^rrh2Qj7h|if{2cF z7s4BJ?wT`B=(~nHsj(Pj|MRJ(mJFM>bc^A;{Jm<+**9jkVUrL0m?Vj|>jqil?AbR$x1E;gE*VHg&(hHYm2KDfTWe}3m& zzjMCl{LcCP&iQ@*+}Y0O^Lg+6e!btX*X#Lwq|GEAgk@0RcY(iL4Wg+ZHMa{jiiw{R z-E*Rb-!*7g;)^X0lDHgaZM;9S0RywQM0=lN@(a-j@YcvjUzH}e2lxLjTd=!yV>O}1 zahr3bSG+Pf*S4s1^cWWQL&7JwTEF+?@@37|QVh1xxayhMT3-1xHN>>`t3S5ygH2;+ z*!*CE&b*-R-8^NLgWa^TtEzUpQSjb`>71Ledu_$$el5@3?fYK$DdhtT3%sP>oZt&;hP%4c6T)!OYJ1wC*_iE@q z3Gh&~uY1ahVr4d!=-$5>TGUd*LD3`Q_<+SFhnpw6Mmj5BB!{b8r_stOTOIct{+6H| zjOV^_f#wszbi)WwbAv_FCj;LnF@_4m@5U2n|0TFIOnXq3zs3QKXnSZYf29-@TyY-h zEaznDRQ^{d$Q!1HeEGt$1o}f(s?xOguQRd0i4F>f81^XiL`+2eSlqhh5nk7B(h%fa zY~yj5br8|;GEF=S{Z*KEmIAOqwoH29sZDa4@DYSA#9@+(PW7rS*N@3F3A(YYYfn?T za0Bw=?MM=Vd40o%C&T?f0USuA$}$Hfy+AGaq@wyZCCDpiRgHV=UP^%Bt9qXEDRl#% zBzNZvWrdePr=Y(lNxo=I_}scx6u`4vIDgqWG!xexcHx6G5_9AJQ9P+F-EJsSO<5K* zA*l-^*O>ys#?Npcs1st)k%~Z0MkPD)m_@#4}RW%0- zOxQUAmpU!_TOjZwDXrGhX+QDK@35n!S;OxP^piW@jdM|=Nn_wiGPbRXkq2!j3AIvS zcVpt2*B$bmtWJb$#~!#mflaje%L<T|7xPQ|51mwK!VgZ#(?W`mDX9t>3-io>Q zoc3FP9umV0@^0+70r~(sL&|$t(mWRK$1|C8mpvh*5(VKi@0;S#2vk}4R07Tt7w*)> z6b#ZFxj+Wz2O~UN^sIbvw3>FOEW87{5MvOjwtsiyaT_ww$gB@tJ-sS!`Z8X}<(_iQ zZjd>2^fuB0FE#_6Zl*wt$_}UG(6QU z>9`1*Vd2jj7w}QOhKEkM?C%uB?LU-N=*?qc&Tev9Kk-rNU^^@;wJ4z0o3?O35F#HF z!m6XrBEQI=`8JN+kpAa_g4~%bzhFwTyiFdq;pTUzMd~sEWNsT+7xwC+;=Sw&rg`%XAO_4=f$~Ooc#PrQMb$%L-Ber88@VB`;5<(6Nf>Ye!s+zz-cAiZ;&_d=fp10F3;9zb% z@+%#F^Xn0Pte;#$QTyA`nIb*`(EPjqxU-LEtzAd4TqBVB0!}ZCxtqJ zBzO;}C5D15H`YouHq`I9zisSs?5-21ugMQM#f%Yh%JH2~X-Kd2{Cfjl24sWs7cIIO zk_Lq&ju`p*!p@4?;_Lh`@AX#padc{sgVghVU(o6Bl4v>>zf7u9SZhvXy z^gx&NSKhJORkciK0^LG0FrHf4b>-7ZoY>btx8Cja9)`!+KU~Xw{p0hetcJ*ew{PYt zs}*);QALRyaK9NnHZ3X%2{~`iDms%ULx;dIFua=hylWM`W} zjRZL!%Rk*;S2y?Ej*+xRww_aFGL0DS1x2*>B_)HPa%T|V+1a05yzM&ohJX%g+N~Y+ zqbqesKWvrd@Yu22z8Le%sqlAx&hN~=wb97Xeg2=15so^NzerudKftpQ12!U%Xa3=E zxaxZT5q;RX8e@oPSnZ)h#QM6XAz3HNi|?dg+$2TMRD1LCZ%3FLm*G*oi;4OU5=8~d zLb!*|Ea6vrl1ZKBfZo-(OYx2t^F2&eRuz#!Ngs0G%wO7O)O(_vNWZaV z6WhB{&^doxbY%Nr9ag{Q;bx6?$|8;z1byBO3e8JN|4XL>AmeVZu|C2++Im4#GDnDUjrDIi$h% z@V$FBPqh$Rr^5}{46&#Zk4jmELrDy;T6Q}M*}D|$&#n1js|GRFWG8J@ZdFS=YBz8w{Mh`_+r|Qs zyzuxdH)BB~IrBEA9*5fZ4bWrLCoDzz-u+X4(V?9b%!U3z)i8fnw*HZ9sA}&LpWxGy zwH!98IQntS{{l2>oX{h|bGnNS@FEFAX)xO4PekE87wWwo4jaG+OD>cfA*|C7rSe`0 zQ|~oZT2Wq$G7OwzzAcug7|cO^=BUa?w6lNl8fu4*LvT9P@Sni>06fU;M**r8xrgh| z(|YJ4<%&y}O3x z)YOSa`I6f7uZ!8+2-9DJSMjx4c&lEemie91zNNNGPA=!|n;eDuZRE{3%d&uKObnzj zw3KNCVoOeZQ+4hn7&tc*sI)AcB^rpM8?z~p+S%cjHjMg_!v`su7#t2YCNOz0iCec8 zTGz8~^_+L3(|(b#eeT+12ryS1f{omu)(VzxNIB6xA{9Q<%f-^N7QPjYd%gKiGSDqJ zWdBO03blC6ek{fQvO;i>^R-;*lvzH1z`(~=woR`~8acOWCK`j8X3e}LG0$fj%E^UV z0blxMRL%h~?FHPR27NbD(0O&)o&spV2A0%#TL8!waBWWbXGGWQmj#amMVElREa6|E zAGzJ$v9Yzm-NY7`QrAr(I}Qhx6N$tNyisXOrg8V3uhO%7yh0p2 z!6G1OT5PJY4eGACZ|gE5!g5f1G=O!^&Zj0$a{Wm3l<(Sc8;piJv6YIF25~+=VD|I` z@jCI4t*;3S0CXo9XdVp2>UE-z%X|3%&V43=1f~FFC=Rr;+5T&sZE`1b{w^dr!&rE(5>lKvW+uPdX8e4v67%i((NM z@iOfuUKrvY9`&cYO7wvkuOND7U$G@kPvrS9Xaz+w{2-Ef{_CMAIYvv#U|6wd3XuQ0 zTfxEUk-|pnL|3~Wl?*}|<1|8n9svO>-a#!UsW~Zsq6>A_bZze|{nA7thuGfPP z`$#*e1kVfJPlJkn{$O{|CM4iska(DI8*K8Pp7@l6g8?J zx$(yjTVCLEVw)cN)rv&>8DLQa$dB&i?=dfRzJlITJ=wZDrE+1Q&(sHZ#L*d@H#7=V z?wjvy>~u;(8z022f~4}i}%JRxyrkIjda@2fYyi#1m23G#DVi(BKe`?D*hAg(#Nq* zKjZ9pw)t0h=reA_pzrj3g5v1F=h%1fZh{?oj*nufd?HYFq`ATw*rb}PJtMpfzYYxR z-+6BLx}}@_qUxOd&M~@0=fmjMB>IopiS9dPTaspiz^Csp+vZrU6TP)jT|f7UmGzDw ze_lEaB7B_1&j_>bq$7H34#nYR*NznWjT-_h4$d8xGCC)l9%*T{!np&DQ;~TOHK?5w z3tAk&a8UJf*hc(TWd*%7Z2?GiB@s(H z!YzlFv4W(m-&-^9?E#9M0QzSC^4_w{s`?_M-Ig*-3;=D=@~7)J0|#MXW&Q(+aU8JY zy=KjR9RWC?%l4T2gGa-Kec>4bGvW^dEu-D27PJMK&9Z=|h-MZ|*FC@#w0tZ`Fxsvqp& zI8``cy0y!c7WPfpZ<@ONrK@CG1&Mm4-`vQ08M?SM5ZVozVM`+-_iy1%9RR@&FeX-4 znckP5J|(z87LplM|0MGsbl1X2Hm?+@yB-d#zm$9P@8SQy16h4|4#3GIk6W$a_KdpT zUB#5S6Pj5pR zhHP;hb=_wNfGB~j^7iGj+_x%yi@P1dBb@Qi^gONvGE0BKXm@EqBboq4jY(zphj&bX zd;`Mhnn{TOaBn@2XE?zH(k*~P<7~-=6i4YVbCK`aShTEz9m92P`Mt|9qHOpEfT1E>4}KuLH;^5mW0Acu#;OC3^f${}8)$aiVh+-z zufp$+x=E<-Xlzn&T}BRGhP-BeNFd^p0ccGqUg#ob#%PpM2#K>Ljg&D;>Z|ZJBMT)9 z$i!KmzT4YNU6R+E{(jP>>1mg~oe=(`xgb!l2n-HK$~m9xt-R*6wxUM+p-w&2oEXLL zE2pMw=fp6&szl9IaBM?nMxaL-Cy}sGk9NuE7+bd^rkWwq78n0jCZuJBx_M!@;3J}aEUrnTDG%|}vmFSAw%fWGcW z;&MB6g0DH1wG?5FUPjz;Yecz(amZ_P9;zV%$~1Z4(<=L%O|vcH(a~oZp{ji4$(BZy z0`nYI5H=uL-#cHU#D}Ca1QH7PS;c*z#o|6GR8X!SpB*OPAoui&%KA&Ow|p}8Rc0|~ zh6U)KB%Va_=H6t>9Hl7!#Zu@6P*7cwQIW3sy(rnv+8Y;oEln)qvYdNnI6M(A7c&g#sj17WRlq5u1D4-8SOFqQEUN-@2IGlllliwW(kX{R#BK<6}i>S ztiYXtcfD-2;T8+qT5QtKzB_Z+Ls6&# zyaB+KeqN`C`ZRTJ!=W&Q#mmvXlMN1XaEAvX1x$*Ft)B!>(>3kwif#=yt_1&|~{{hkJDn9@K literal 0 HcmV?d00001 diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx index 714c4342837de6f..ab780e19fe8b025 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -7,6 +7,7 @@ sidebar: import { Render } from "~/components" +![A schematic showing where Email Security security is in the life cycle of an email received](src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png) In this tutorial, you will learn how to configure Cisco IronPort with Email Security as MX record. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index c41c98371ad8b8f..f5941725e88e22e 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -7,6 +7,7 @@ sidebar: import { GlossaryTooltip, Render } from "~/components" +![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Cisco_to_Cisco_MX_Inline.png) In this tutorial, you will learn how to configure Email Security with Cisco as MX record. From 0c3fa3fe554d05e58da38b505566a181e56ec28a Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Fri, 21 Feb 2025 11:52:16 +0000 Subject: [PATCH 14/26] Remove submission addresses --- .../insights/email-monitoring/phish-submissions.mdx | 13 +------------ 1 file changed, 1 insertion(+), 12 deletions(-) diff --git a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx index 1d058dd936dd53d..77acdacfe403229 100644 --- a/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx +++ b/src/content/docs/cloudflare-one/insights/email-monitoring/phish-submissions.mdx @@ -53,15 +53,4 @@ You have now successfully installed Cloudflare PhishNet. 1. In your Gmail web client, open the message you would like to flag as either spam or phish. 2. Select the PhishNet logo on the side panel. 3. Under **Select Submission Type**, select **Spam** or **Phish**. -4. Select **Submit Report**. - -## Submission addresses - -To view the destination addresses of user and team submissions: - -1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). -2. Select **Email Security**. -3. Select **Settings**. -4. Go to **Phish submission** > **Submission addresses** > **View**. - -The dashboard will display **User submission addresses** and **Team submission addresses**. \ No newline at end of file +4. Select **Submit Report**. \ No newline at end of file From 5537233e4a8422a0c11a78be7cdaef64f2cf81bc Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 26 Feb 2025 14:57:40 +0000 Subject: [PATCH 15/26] Apply suggestions from code review Co-authored-by: Jun Lee --- .../setup/pre-delivery-deployment/inline-deployment-setup.mdx | 4 ++-- .../setup/pre-delivery-deployment/inline-deployment.mdx | 2 +- .../prerequisites/cisco-email-security-mx.mdx | 2 +- .../setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx | 2 +- .../prerequisites/gsuite-email-security-mx.mdx | 4 ++-- 5 files changed, 7 insertions(+), 7 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 8fe6f79c62ac05c..149f86c8d122444 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -11,7 +11,7 @@ To set up MX Inline: 2. Select **Email Security**. 3. Select **Monitoring**. If you are a first time user, select **Contact sales**. Otherwise, select **Set up**. 4. Select **MX/Inline**. -5. To start the MX/Inline configuration, you will have to completed the prerequisite setup on your email provider's platform. Once you have completed this step, select **I confirm that I have completed all the necessary requirements**. Then, select **Start configuration**. +5. To start the MX/Inline configuration, you will need to have completed the prerequisite setup on your email provider's platform. Once you have completed this step, select **I confirm that I have completed all the necessary requirements**. Then, select **Start configuration**. If you have verified zones on Cloudflare, continue with the following steps: @@ -26,7 +26,7 @@ If you have verified zones on Cloudflare, continue with the following steps: 1. **Forward all messages over TLS** (recommended). 2. **Forward all messages using opportunistic TLS**. - Select **Continue**. -3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types incoming messages from reaching a recipient's inbox. Select +3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types of incoming messages from reaching a recipient's inbox. 4. (Optional ) **Update MX records**: - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select your mail processing location. - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx index eea55f3a23b6ee3..0cb604963c35a8d 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx @@ -11,7 +11,7 @@ Email Security becomes a hop in the SMTP processing chain and physically interac When you choose an inline deployment, you get the following benefits: -- Messages are processed and physically blocked before delivery to a user's mailbox. +- Messages are processed and physically blocked before arriving in a user's mailbox. - Your deployment is simpler, because any complex processing can happen downstream and without modification. - Email Security can modify delivered messages, adding subject or body mark-ups. - Email Security can offer high availability and adaptive message pooling. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx index ab780e19fe8b025..9398630787de313 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -7,7 +7,7 @@ sidebar: import { Render } from "~/components" -![A schematic showing where Email Security security is in the life cycle of an email received](src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png) +![A schematic showing where Email Security sits in the life cycle of an email received](src/assets/email-security/Cisco_to_Email_Security_MX_Inline.png) In this tutorial, you will learn how to configure Cisco IronPort with Email Security as MX record. diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index f5941725e88e22e..6b0817ceed762bb 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -40,7 +40,7 @@ To add a new SMTP Route: 3. Configure the new SMTP Route as follows: * **Receiving Domain**: `a1s.mailstream` - * In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on what MX hosts to use. + * In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on which MX hosts to use. ## 3. Create Incoming Content Filters diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index 149f8c4de720ba8..c806214fbe71b41 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -32,7 +32,7 @@ Set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?h - For the **Outbound denial consequence**, select **Drop message**. - Select **SAVE**. -To access the newly create quarantine, select **GO TO ADMIN QUARANTINE** or access the quarantine directly by pointing your browser to https://email-quarantine.google.com/adminreview. +To access the newly created quarantine, select **GO TO ADMIN QUARANTINE** or access the quarantine directly by pointing your browser to https://email-quarantine.google.com/adminreview. ## 3. Create a content compliance filter @@ -46,7 +46,7 @@ Go to **Compliance**, and create a [content compliance filter](https://support.g - In **Match type**, select **Contains text**. - In **Content**, enter `X-EmailSecurity-Disposition: MALICIOUS`. - Select **SAVE** to save the condition. - - **If the above expression match, do the following**, select **Quarantine message** and the **Email Security Malicious** quarantine that was created in the previous step. + - If the above expression match, do the following, select **Quarantine message** and the **Email Security Malicious** quarantine that was created in the previous step. - Select **SAVE**. If you would like to quarantine the other dispositions, repeat the above steps and use the following strings for the other dispositions: From a09e57328d8029123feacbd757e72ff23a8a1518 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 26 Feb 2025 15:07:54 +0000 Subject: [PATCH 16/26] Correcting UI component --- .../setup/pre-delivery-deployment/inline-deployment-setup.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 149f86c8d122444..a53c081fdb45bf0 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -28,7 +28,7 @@ If you have verified zones on Cloudflare, continue with the following steps: - Select **Continue**. 3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types of incoming messages from reaching a recipient's inbox. 4. (Optional ) **Update MX records**: - - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under your mail processing location, select your mail processing location. + - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under **Your mail processing location**, select your mail processing location. - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. - Select **Continue**. 5. **Review details**: Review your domain, then select **Go to domains**. From 5657b487cba25d6a411b0c6cfb8560fc559a0c11 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Wed, 26 Feb 2025 15:09:51 +0000 Subject: [PATCH 17/26] Update src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx Co-authored-by: Jun Lee --- .../setup/pre-delivery-deployment/inline-deployment-setup.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index a53c081fdb45bf0..3e0e40b42ba9b49 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -27,7 +27,7 @@ If you have verified zones on Cloudflare, continue with the following steps: 2. **Forward all messages using opportunistic TLS**. - Select **Continue**. 3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types of incoming messages from reaching a recipient's inbox. -4. (Optional ) **Update MX records**: +4. (Optional) **Update MX records**: - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under **Your mail processing location**, select your mail processing location. - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. - Select **Continue**. From 70bfd2e95dabd28fd86b9414cc88899fe25ecc72 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 27 Mar 2025 15:08:03 +0000 Subject: [PATCH 18/26] Correcting table --- .../prerequisites/cisco-mx.mdx | 34 ++++++++++--------- 1 file changed, 18 insertions(+), 16 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index 6b0817ceed762bb..62f83e50e00e588 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -39,8 +39,8 @@ To add a new SMTP Route: 2. Select **Add Route**. 3. Configure the new SMTP Route as follows: - * **Receiving Domain**: `a1s.mailstream` - * In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on which MX hosts to use. + - **Receiving Domain**: `a1s.mailstream` + - In **Destination Hosts**, select **Add Row**, and add the Email Security MX hosts. Refer to the [Geographic locations](#5-geographic-locations) table for more information on which MX hosts to use. ## 3. Create Incoming Content Filters @@ -79,20 +79,22 @@ To create a new Content Filter: - **Description**: `Email Security inspected messages for final delivery` - **Order**: This filter must come before the previously created filter. - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). For example: - Order | Condition | Rule - \----- | -------------------- | --- - `1` | `Remote IP/Hostname` | `52.11.209.211` - `2` | `Remote IP/Hostname` | `52.89.255.11` - `3` | `Remote IP/Hostname` | `52.0.67.109` - `4` | `Remote IP/Hostname` | `54.173.50.115` - `5` | `Remote IP/Hostname` | `104.30.32.0/19` - `6` | `Remote IP/Hostname` | `158.51.64.0/26` - `7` | `Remote IP/Hostname` | `158.51.65.0/26` - * Ensure that the *Apply rule:* dropdown is set to **If one or more conditions match**. - * **Actions**: Select **Add Action**, and add the following: - Order | Action | Rule - \--- | -------------------- | --- - 1 | `Skip Remaining Content Filters (Final Action)` | `skip-filters()` + + | Order | Condition | Rule | + | ----- | -------------------- | -------------------- | + | `1` | `Remote IP/Hostname` | `Remote IP/Hostname` | + | `2` | `Remote IP/Hostname` | `52.89.255.11` | + | `3` | `Remote IP/Hostname` | `52.0.67.109` | + | `4` | `Remote IP/Hostname` | `54.173.50.115` | + | `5` | `Remote IP/Hostname` | `104.30.32.0/19` | + | `6` | `Remote IP/Hostname` | `158.51.64.0/26` | + | `7` | `Remote IP/Hostname` | `158.51.65.0/26` | + + - Ensure that the *Apply rule:* dropdown is set to **If one or more conditions match**. + - **Actions**: Select **Add Action**, and add the following: + | Order | Action | Rule | + | ----- | ----------------------------------------------- | ---------------- | + | --1 | `Skip Remaining Content Filters (Final Action)` | `skip-filters()` | ## 4. Add the Incoming Content Filter to the Inbound Policy table From 20a9705af61239186609c6a95a87686c8b1cffad Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 27 Mar 2025 16:39:36 +0000 Subject: [PATCH 19/26] Making steps optional --- .../prerequisites/gsuite-email-security-mx.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index c806214fbe71b41..fb4cbb5772c00fc 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -23,7 +23,7 @@ Set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?h - Select **Require TLS for connections from the email gateways listed above**. - Select **SAVE**. -## 2. Set up an email quarantine +## 2. (Optional) Set up an email quarantine [Set up an email quarantine](https://support.google.com/a/answer/6104172?hl=en#:~:text=Sign%20in%20with%20an%20administrator,t%20access%20the%20Admin%20console.&text=Manage%20quarantines.,Click%20Add%20Quarantine.) with the following details: - **Name**: Email Security Malicious. @@ -34,7 +34,7 @@ Set up [Inbound Email Configuration](https://support.google.com/a/answer/60730?h To access the newly created quarantine, select **GO TO ADMIN QUARANTINE** or access the quarantine directly by pointing your browser to https://email-quarantine.google.com/adminreview. -## 3. Create a content compliance filter +## 3. (Optional) Create a content compliance filter Go to **Compliance**, and create a [content compliance filter](https://support.google.com/a/answer/1346934?hl=en#zippy=%2Cstep-go-to-gmail-compliance-settings-in-the-google-admin-console%2Cstep-enter-email-messages-to-affect) to send malicious messages to quarantine. Enter the following details: - **Content compliance**: Add `Quarantine Email Security Malicious`. From fe3855cfd8342ed7983979c2113b5e4d5d227d82 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 7 Apr 2025 15:03:20 +0100 Subject: [PATCH 20/26] Open Egress IPs to new page --- .../prerequisites/cisco-email-security-mx.mdx | 2 +- .../setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx index 9398630787de313..78c16220df217d6 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -30,7 +30,7 @@ To add a new Sender Group: - **DNS Lists**: Leave blank. - **Connecting Host DNS Verification**: Leave all options unchecked. -4. Select **Submit and Add Senders** and add the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). +4. Select **Submit and Add Senders** and add the IP addresses mentioned in Egress IPs ## 2. Configure Incoming Relays diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index 62f83e50e00e588..0580668360f09fa 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -28,7 +28,7 @@ To add a new Sender Group: - **DNS Lists**: Leave blank. - **Connecting Host DNS Verification**: Leave all options unchecked. -4. Select **Submit and Add Senders**, and add the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). If you need to process emails in the EU or India regions for compliance purposes, add those IP addresses as well. +4. Select **Submit and Add Senders**, and add the IP addresses mentioned in Egress IPs. If you need to process emails in the EU or India regions for compliance purposes, add those IP addresses as well. ## 2. Add SMTP route for the Email Security Email Protection Hosts @@ -78,7 +78,7 @@ To create a new Content Filter: - **Name**: `A1S_to_ESA` - **Description**: `Email Security inspected messages for final delivery` - **Order**: This filter must come before the previously created filter. - - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in [Egress IPs](/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips/). For example: + - **Conditions**: Add conditions of type **Remote IP/Hostname** with all the IP addresses mentioned in Egress IPs. For example: | Order | Condition | Rule | | ----- | -------------------- | -------------------- | From 4f7e779a2aaaf374b63e3e355808cc3ff3d7a674 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Mon, 7 Apr 2025 15:19:08 +0100 Subject: [PATCH 21/26] Update copy --- .../pre-delivery-deployment/inline-deployment-setup.mdx | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx index 3e0e40b42ba9b49..15791a4ee0891b8 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx @@ -18,8 +18,8 @@ If you have verified zones on Cloudflare, continue with the following steps: 1. **Connect a domain**: Select your domain. Then, select **Continue**. 2. **Select position**: This step allows you to choose where Email Security fits into your mail flow and configure position settings: - **Select position**: Choose between: - - **Sit first (hop count = 1)**: Email Security sits at the first hop. There are no other email scanners or services between the Internet and Cloudflare. - - **Sit in the middle (hop count > 1)**: Email Security sits in the middle of your email processing. There are other email scanners or email services in between. + - **Sit first (hop count = 1)**: Email Security is the first server that receives the email. There are no other email scanners or services between the Internet and Cloudflare. + - **Sit in the middle (hop count > 1)**: Email Security sits anywhere other than the first position. Other servers receive emails _before_ Email Security. There are other email scanners or email services in between. - **Position settings**: Refine how Email Security receives and forwards emails: - **Forwarding address**: This is your mail flow next hop after Email Security. This value is auto-filled, but you can still change it. - **Outbound TLS**: Choose between: @@ -29,7 +29,7 @@ If you have verified zones on Cloudflare, continue with the following steps: 3. (**Optional**, select **Skip for now** to skip this step) **Configure quarantine policy**: Select dispositions to automatically prevent certain types of incoming messages from reaching a recipient's inbox. 4. (Optional) **Update MX records**: - Email Security can automatically update MX records for domains that proxy traffic through Cloudflare. Under **Your mail processing location**, select your mail processing location. - - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. + - You can also choose to allow Cloudflare to update MX records by selecting **I confirm that I allow Cloudflare to update to the new MX records**. When Email Security updates MX records, we replace your original MX records with Email Security MX records. - Select **Continue**. 5. **Review details**: Review your domain, then select **Go to domains**. From b18dc371598317bdeeb589ac916b9e9c4693c5f1 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 8 Apr 2025 12:19:08 +0100 Subject: [PATCH 22/26] Add instructions about quarantining on MS365 --- .../office365-email-security-mx.mdx | 60 +++++++++++++++++++ .../deployment/o365-use-cases-antispam.mdx | 35 +++++++++++ 2 files changed, 95 insertions(+) create mode 100644 src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx index 1680234e1ce4020..db1850296c4a008 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx @@ -5,6 +5,8 @@ sidebar: order: 3 --- +import { Render, Markdown, GlossaryTooltip } from "~/components" + ![A schematic showing where Email Security is in the life cycle of an email received](src/assets/email-security/Email_Security_O365_MXInline.png) In this tutorial, you will learn how to configure Microsoft Office 365 with Email Security as its MX record. @@ -41,6 +43,64 @@ Now that the inbound connector has been configured, you will need to enable the 2. Select **Automatically detect and skip the last IP address** and **Apply to entire organization**. 3. Select **Save**. +## 3. Configure anti-spam policies + +To configure anti-spam policies: + +1. Open the [Microsoft 365 Defender console](https://security.microsoft.com/). +2. Go to **Email & collaboration** > **Policies & rules**. +3. Select **Threat policies**. +4. Under **Policies**, select **Anti-spam**. +5. Select the **Anti-spam inbound policy (Default)** text (not the checkbox). +6. In **Actions**, scroll down and select **Edit actions**. +7. Set the following conditions and actions (you might need to scroll up or down to find them): +- **Spam**: *Move messages to Junk Email folder*. +- **High confidence spam**: *Quarantine message*. + - **Select quarantine policy**: _AdminOnlyAccessPolicy_. +- **Phishing**: *Quarantine message*. + - **Select quarantine policy**: _AdminOnlyAccessPolicy_. +- **High confidence phishing**: *Quarantine message*. + - **Select quarantine policy**: _AdminOnlyAccessPolicy_. +- **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. + - Select the spam actions in the above step: +8. Select **Save**. + +## 4. Create transport rules + +To create the transport rules that will send emails with certain [dispositions](/cloudflare-one/email-security/reference/dispositions-and-attributes/#dispositions) to Email Security: + +1. Open the new [Exchange admin center](https://admin.exchange.microsoft.com/#/homepage). +2. Go to **Mail flow** > **Rules**. +3. Select **Add a Rule** > **Create a new rule**. +4. Set the following rule conditions: + + - **Name**: _Email Security Deliver to Junk Email folder_. + - **Apply this rule if**: *The message headers* > *includes any of these words*. + - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. + - **Enter words**: ```SUSPICIOUS```, ```BULK``` > **Add** > **Save**. + - **Apply this rule if**: Select **+** to add a second condition. + - **And**: *The sender* > *IP address is in any of these ranges or exactly matches* > enter the egress IPs mentioned in Egress IPs. + - **Do the following** - _Modify the message properties_ > _Set the Spam Confidence Level (SCL)_ > _5_. + +5. Select **Next**. +6. You can use the default values on this screen. Select **Next**. +7. Review your settings and select **Finish** > **Done**. +8. Select the rule **Email Security Deliver to Junk Email folder** you have just created, and **Enable**. +9. Select **Add a Rule** > **Create a new rule**. +10. Set the following rule conditions: + + - **Name**: *{props.five}*. + - **Apply this rule if**: *The message headers* > *includes any of these words*. + - **Enter text**: `X-CFEmailSecurity-Disposition` > **Save**. + - **Enter words**: `MALICIOUS`, `UCE`, `SPOOF` > **Add** > **Save**. + - **Apply this rule if**: Select **+** to add a second condition. + - **And**: *The sender* > *IP address is in any of these ranges or exactly matches* > enter the egress IPs in the Egress IPs. + - **Do the following**: _Redirect the message to_ > _hosted quarantine_. +11. Select **Next**. +12. You can use the default values on this screen. Select **Next**. +13. Review your settings and select **Finish** > **Done**. +14. Select the rule *{props.five}* you have just created, and select **Enable**. + ## Next steps Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx b/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx new file mode 100644 index 000000000000000..322722d51e259f5 --- /dev/null +++ b/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx @@ -0,0 +1,35 @@ +--- +inputParameters: spamQuarantinePolicy;;phishingQuarantinePolicy;;highPhishingQuarantinePolicy;;img + +--- + +import { Image } from "astro:assets" +import { Markdown } from "~/components" + +To configure anti-spam policies: + +1. Open the [Microsoft 365 Defender console](https://security.microsoft.com/). + +2. Go to **Email & collaboration** > **Policies & rules**. + +3. Select **Threat policies**. + +4. Under **Policies**, select **Anti-spam**. + +5. Select the **Anti-spam inbound policy (Default)** text (not the checkbox). + +6. In **Actions**, scroll down and select **Edit actions**. + +7. Set the following conditions and actions (you might need to scroll up or down to find them): + +- **Spam**: *Move messages to Junk Email folder*. +- **High confidence spam**: *Quarantine message*. + - **Select quarantine policy**: {props.one}. +- **Phishing**: *Quarantine message*. + - **Select quarantine policy**: {props.two}. +- **High confidence phishing**: *Quarantine message*. + - **Select quarantine policy**: {props.three}. +- **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. + - Select the spam actions in the above step: + +8. Select **Save**. \ No newline at end of file From 3b14de2e8308f6499cec08b7b0ddb23d733e5c53 Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 8 Apr 2025 13:25:27 +0100 Subject: [PATCH 23/26] update links --- ...eployment-setup.mdx => mx-inline-deployment-setup.mdx} | 8 ++++---- .../{inline-deployment.mdx => mx-inline-deployment.mdx} | 2 +- .../prerequisites/cisco-email-security-mx.mdx | 2 +- .../pre-delivery-deployment/prerequisites/cisco-mx.mdx | 2 +- .../prerequisites/gsuite-email-security-mx.mdx | 2 +- .../prerequisites/office365-email-security-mx.mdx | 2 +- 6 files changed, 9 insertions(+), 9 deletions(-) rename src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/{inline-deployment-setup.mdx => mx-inline-deployment-setup.mdx} (94%) rename src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/{inline-deployment.mdx => mx-inline-deployment.mdx} (97%) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx similarity index 94% rename from src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx rename to src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx index 15791a4ee0891b8..9a6e042009a5088 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup.mdx @@ -1,11 +1,11 @@ --- -title: Set up inline deployment +title: Set up MX/Inline deployment pcx_content_type: concept sidebar: order: 3 --- -To set up MX Inline: +To set up MX/Inline: 1. Log in to [Zero Trust](https://one.dash.cloudflare.com/). 2. Select **Email Security**. @@ -44,7 +44,7 @@ If you do not have domains with Cloudflare, the dashboard will display two optio Selecting **Add a domain to Cloudflare** will redirect you to a new page where you will connect your domain to Cloudflare. Once you have entered an existing domain, select **Continue**. -Then, follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/). +Then, follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/). ### Enter domain manually @@ -53,4 +53,4 @@ Then, follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setu 3. **Verify your domains**: It may take up to 24 hours for your domains to be verified. Select **Done**. 4. Once your domains have been verified, the dashboard will display a message like this: **You have verified domains ready to connect to Email Security**. This means that you can now set up Email Security via MX/Inline. 5. Select **Set up**, then select **MX/Inline**. -6. Follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/). \ No newline at end of file +6. Follow the steps to [Set up MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/). \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx similarity index 97% rename from src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx rename to src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx index 0cb604963c35a8d..7d3dc4e9eb02a45 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment.mdx @@ -1,5 +1,5 @@ --- -title: Inline deployment +title: MX/Inline deployment pcx_content_type: concept sidebar: order: 2 diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx index 78c16220df217d6..81a6015519fbbae 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-email-security-mx.mdx @@ -52,4 +52,4 @@ Refer to [Cisco's documentation](https://www.cisco.com/c/en/us/support/docs/secu ## Next steps -Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx index 0580668360f09fa..236ae26534ec4f9 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/cisco-mx.mdx @@ -106,4 +106,4 @@ Assign the Incoming Content Filters created in [step 3](#3-create-incoming-conte ## Next steps -Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx index fb4cbb5772c00fc..a766aa2bbca4a67 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/gsuite-email-security-mx.mdx @@ -60,4 +60,4 @@ If desired, you can create a separate quarantine for each of the dispositions. ## Next steps -Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx index db1850296c4a008..8c58e8fe9628df7 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx @@ -103,4 +103,4 @@ To create the transport rules that will send emails with certain [dispositions]( ## Next steps -Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file +Now that you have completed the prerequisite steps, you can set up [MX/Inline](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment-setup/) on the Cloudflare dashboard. \ No newline at end of file From 25c51e80f9416e8045d799307d39ee3915ec332d Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Tue, 8 Apr 2025 14:08:29 +0100 Subject: [PATCH 24/26] Fixing broken link + updating note --- .../email-security/setup/pre-delivery-deployment/egress-ips.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx index a4d7adb676cd8ea..9b10211a50ad78a 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/egress-ips.mdx @@ -5,7 +5,7 @@ sidebar: order: 4 --- -When you set up Email Security using an [inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/inline-deployment/), you need to tell your existing email providers to accept messages coming from Email Security's egress IP addresses. +When you set up Email Security using an [MX/Inline deployment](/cloudflare-one/email-security/setup/pre-delivery-deployment/mx-inline-deployment/), you need to tell your existing email providers to accept messages coming from Email Security's egress IP addresses. Refer to this page for reference on what IP subnet mask ranges to use. From bf82701b4293f33c4bb9081f4304efd3dcda57de Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 10 Apr 2025 11:22:19 +0100 Subject: [PATCH 25/26] Update src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx Co-authored-by: Jun Lee --- .../prerequisites/office365-email-security-mx.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx index 8c58e8fe9628df7..e5df409a1b35a9b 100644 --- a/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx +++ b/src/content/docs/cloudflare-one/email-security/setup/pre-delivery-deployment/prerequisites/office365-email-security-mx.mdx @@ -22,7 +22,7 @@ In this tutorial, you will learn how to configure Microsoft Office 365 with Emai - Select **[Edit spam threshold and properties](https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about)** > **Mark as spam** > **SPF record: hard fail**, and ensure it is set to **Off**. 5. Select **Save**. -## 2. Enhanced Filtering configuration +## 2. Configure Enhanced Filtering ### Create an inbound connector From 462bb7864dca26c00142f3fc6de9f616f80f7e8c Mon Sep 17 00:00:00 2001 From: Maddy <130055405+Maddy-Cloudflare@users.noreply.github.com> Date: Thu, 10 Apr 2025 11:22:48 +0100 Subject: [PATCH 26/26] Removing partial --- .../deployment/o365-use-cases-antispam.mdx | 35 ------------------- 1 file changed, 35 deletions(-) delete mode 100644 src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx diff --git a/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx b/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx deleted file mode 100644 index 322722d51e259f5..000000000000000 --- a/src/content/partials/cloudflare-one/email-security/deployment/o365-use-cases-antispam.mdx +++ /dev/null @@ -1,35 +0,0 @@ ---- -inputParameters: spamQuarantinePolicy;;phishingQuarantinePolicy;;highPhishingQuarantinePolicy;;img - ---- - -import { Image } from "astro:assets" -import { Markdown } from "~/components" - -To configure anti-spam policies: - -1. Open the [Microsoft 365 Defender console](https://security.microsoft.com/). - -2. Go to **Email & collaboration** > **Policies & rules**. - -3. Select **Threat policies**. - -4. Under **Policies**, select **Anti-spam**. - -5. Select the **Anti-spam inbound policy (Default)** text (not the checkbox). - -6. In **Actions**, scroll down and select **Edit actions**. - -7. Set the following conditions and actions (you might need to scroll up or down to find them): - -- **Spam**: *Move messages to Junk Email folder*. -- **High confidence spam**: *Quarantine message*. - - **Select quarantine policy**: {props.one}. -- **Phishing**: *Quarantine message*. - - **Select quarantine policy**: {props.two}. -- **High confidence phishing**: *Quarantine message*. - - **Select quarantine policy**: {props.three}. -- **Retain spam in quarantine for this many days**: Default is 15 days. Email Security recommends 15-30 days. - - Select the spam actions in the above step: - -8. Select **Save**. \ No newline at end of file