Fortinet black logo

Cookbook

How to encrypt emails sent from a designated source in FortiMail

Copy Link
Copy Doc ID 52bc7503-6454-11ed-96f0-fa163e15d75b:101780
Download PDF

How to encrypt emails sent from a designated source in FortiMail

You want to send emails containing sensitive information, but you’re afraid that someone could intercept the message and read the information.

Thankfully, your FortiMail unit can encrypt all email messages sent from a designated source. For example, you could configure your FortiMail unit to encrypt every email sent from your financial department.

  • Content-based encryption: The FortiMail unit can find key words in an email’s subject header or message body to determine if a message should be encrypted. For example, if you add “Confidential” in your subject header, FortiMail will encrypt the email message.
  • Rule-based encryption: The FortiMail unit encrypts all email sent from specific sources. For example, you could configure FortiMail to encrypt every email sent from the financial department.

Both of these methods are considered identity-based encryption (IBE). This recipe covers rule-based encryption.

How to encrypt emails sent from a designated source in FortiMail

You want to send emails containing sensitive information, but you’re afraid that someone could intercept the message and read the information.

Thankfully, your FortiMail unit can encrypt all email messages sent from a designated source. For example, you could configure your FortiMail unit to encrypt every email sent from your financial department.

  • Content-based encryption: The FortiMail unit can find key words in an email’s subject header or message body to determine if a message should be encrypted. For example, if you add “Confidential” in your subject header, FortiMail will encrypt the email message.
  • Rule-based encryption: The FortiMail unit encrypts all email sent from specific sources. For example, you could configure FortiMail to encrypt every email sent from the financial department.

Both of these methods are considered identity-based encryption (IBE). This recipe covers rule-based encryption.