LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG
  2. 4. Mail Settings

4.1 File

Previous4. Mail SettingsNext4.2 Mail Body

Last updated 9 days ago

πŸ“– Overview

The File module within Mail Settings provides administrators with advanced control over how email attachments are handled β€” by file size, file type, and custom YARA-based detection rules.

This policy-driven module allows you to prevent harmful or unwanted files from ever reaching inboxes, going beyond reactive detection to enforce proactive attachment restrictions.

πŸ›‘οΈ Blocking risky file types and enforcing size limits is one of the most effective methods to prevent ransomware, spyware, and trojan delivery.


πŸ“¦ Submodules

This section includes 3 core functionalities:


πŸ“ File Size

Purpose: Define the maximum allowed file size for incoming email attachments.

Feature
Description

Current File Size Limit

Displayed in MB (e.g., 99 MB)

Set New Limit

Manually enter a new max size threshold

Use Cases:

  • Block large .zip or .iso files often used in malware attacks

  • Prevent system overload from heavy media attachments

  • Enforce compliance on data flow and DLP restrictions

⚠️ Files exceeding the limit are blocked and flagged as MAXIMUM FILE SIZE in analysis.


πŸ“‚ File Type

Purpose: Define which file types (extensions) should be allowed or denied.

Example Extensions
Recommended Action

.exe, .scr, .vbs, .js

❌ Block (high risk)

.docm, .xlsm, .iso

❌ Block or quarantine

.pdf, .docx, .xlsx

βœ… Allow (if not abused)

Features:

  • Add file types manually (case-insensitive)

  • See creation timestamp

  • Delete or edit file types at any time

Use Cases:

  • Enforce acceptable attachment policy

  • Reduce false negatives in malware delivery

  • Restrict executable file propagation via email

πŸ“Œ No file types are blocked by default β€” use this to implement strict control based on your organization’s risk appetite.


🧬 YARA Rules

Purpose: Define custom YARA-based scanning rules to detect pattern-matching malware or indicators of compromise within files.

Field
Description

Rule Description

Short name for the rule

Rule Content

YARA-compatible rule body (syntax required)

Creation Date

When rule was added

Actions

View / Delete

Use Cases:

  • Detect malware using behavior or code structure

  • Identify documents with embedded macros or known obfuscation

  • Implement IOC-based scanning tailored to your threat intel

🧠 YARA rules allow deep inspection beyond file name or type β€” for example, scanning for embedded strings, hex patterns, or exploit markers.


🧠 Best Practices

Objective
Recommendation

Prevent malicious executables

Block known high-risk extensions

Maintain system stability

Set file size limits to avoid overload or abuse

Respond to targeted threats

Write YARA rules for specific threat families

Regularly update file policy

Align with emerging attack techniques


🎯 The File module gives you proactive control over the what of every email β€” defining exactly which attachments are acceptable, and which are a threat.