The analysis takes place in the cloud and currently applies only to Office 365 deployments. Nothing is required outside of the steps outlined above. There is no software or hardware to deploy and no interference with your email delivery.
You need to have admin credentials for Office 365 to grant access to the evaluation.
Once the analysis is complete, you will receive a summary and discuss the detailed findings with FireEye’s Email Security experts.
FireEye does not keep a copy of your emails once the evaluation is complete.
The form includes only five fields, and typically takes less than 10 minutes to fill out.
You need to have an Office 365 deployment and admin rights to grant access to the evaluation.
The authorization takes place through Office 365. FireEye does not access your credentials. The analysis runs with ephemeral storage, which is destroyed after the evaluation is completed.
The data is analyzed on a FireEye Email Security – Server Edition appliance within a data center located in the United States.
No. The evaluation takes place in the cloud and requires nothing outside of the steps outlined on Slide 2.
We typically process all evaluation requests within 1 – 5 days.
The length of the process depends on the number of emails that the configured mailboxes have, and takes up to four days.
By default, the evaluation analyzes up to 10,000 emails per mailbox (max 1,000,000 emails per mailbox), not to exceed 4 days.
No. The evaluation only analyzes the emails that have already been received and are stored on the Office 365 server.
You may specify which email addresses you want to analyze.You may also choose to use a test mailbox that does not belong to any specific user.
A FireEye Email Security expert will help you understand the results of your evaluation and walk you through a detailed report.
Yes, you may cancel the evaluation at any point in time.
You will receive email updates after each step of the process.You will be able to access your evaluation through the link provided in the email update.
Inbox, subfolders and user – created folders are analyzed.Special folders are not including: Archive, Conversation History, Deleted Items, Drafts, Junk Email, Sent Items and Outbox.
No. The evaluation is absolutely free.
You can configure the delivered email timeframe (start and finish dates), volume of email, and which mailbox(es) will be used for the assessment.
The assessment focuses on malicious attachments and URLs that link to phishing sites.
No. A POV is set up in your environment, which may not include Office 365, typically in BCC mode or on a subdomain in inline mode to analyze email before being delivered to end users.