Answers to frequently asked questions:

Where does the analysis take place and are there other requirements?

The analysis takes place in the cloud and currently applies only to Office 365 deployments. Nothing is required outside of the steps outlined above. There is no software or hardware to deploy and no interference with your email delivery.

What level of credentials are needed?

You need to have admin credentials for Office 365 to grant access to the evaluation.

What do I receive after the analysis?

Once the analysis is complete, you will receive a summary and discuss the detailed findings with FireEye’s Email Security experts.

How long does access remain open?

FireEye does not keep a copy of your emails once the evaluation is complete.

How long does it take to fill out the request form?

The form includes only five fields, and typically takes less than 10 minutes to fill out.

What do I need to authorize the evaluation?

You need to have an Office 365 deployment and admin rights to grant access to the evaluation.

How secure is the process?

The authorization takes place through Office 365. FireEye does not access your credentials. The analysis runs with ephemeral storage, which is destroyed after the evaluation is completed.

Where does the evaluation take place?

The data is analyzed on a FireEye Email Security – Server Edition appliance within a data center located in the United States.

Do I need to deploy any software or hardware for this process?

No. The evaluation takes place in the cloud and requires nothing outside of the steps outlined on Slide 2.

How long does it take for you to start the process?

We typically process all evaluation requests within 1 – 5 days.

How long does the actual evaluation take?

The length of the process depends on the number of emails that the configured mailboxes have, and takes up to four days.

How many emails will you analyze?

By default, the evaluation analyzes up to 10,000 emails per mailbox (max 1,000,000 emails per mailbox), not to exceed 4 days.

Will my email delivery be affected?

No. The evaluation only analyzes the emails that have already been received and are stored on the Office 365 server.

What if I don’t want to analyze certain mailboxes?

You may specify which email addresses you want to analyze.You may also choose to use a test mailbox that does not belong to any specific user.

How will I understand the results of the evaluation?

A FireEye Email Security expert will help you understand the results of your evaluation and walk you through a detailed report.

Can I cancel the evaluation?

Yes, you may cancel the evaluation at any point in time.

How do I track the progress of the evaluation?

You will receive email updates after each step of the process.You will be able to access your evaluation through the link provided in the email update.

Which mailbox folders are analyzed?

Inbox, subfolders and user – created folders are analyzed.Special folders are not including: Archive, Conversation History, Deleted Items, Drafts, Junk Email, Sent Items and Outbox.

Will there be any charges later in the process?

No. The evaluation is absolutely free.

Can I configure which emails I want to analyze?

You can configure the delivered email timeframe (start and finish dates), volume of email, and which mailbox(es) will be used for the assessment.

What kinds of threats will the evaluation cover?

The assessment focuses on malicious attachments and URLs that link to phishing sites.

Is Email Threat Analysis a substitute for a POV?

No. A POV is set up in your environment, which may not include Office 365, typically in BCC mode or on a subdomain in inline mode to analyze email before being delivered to end users.