NOTE: If you are on version 4.3.2 and above, click Cloud Connector Config SMTP Integration.
You can integrate Skyhigh Cloud Connector with your existing SMTP server in order to send DLP policy violation email messages, reports, and notifications from Cloud Connector directly from your company's email domain (such as firstname.lastname@example.org, or email@example.com), instead of from firstname.lastname@example.org. This integration provides authenticity and prevents emails from going to the spam folder. Configure SMTP integration via the logprocessor.smtp.properties file. You may also set the polling interval for emails to be sent periodically.
This feature must be enabled by Skyhigh Security Support.
IMPORTANT: Only one Cloud Connector per tenant MUST be configured for SMTP integration.
- Go to the Cloud Connector installation directory, and open the file logprocessor.smtp.properties.
logprocessor.smtp.enabled=false logprocessor.smtp.pollingDelayMs=180000 mail.smtp.host=smtp.gmail.com mail.smtp.port=587 email@example.com firstname.lastname@example.org
- Edit the following properties:
- To enable SMTP integration, set the property logprocessor.smtp.enabled to true.
- Change the polling delay, if necessary. The default is 180000 (3 minutes).
- Change the SMTP host, port, and user information to your SMTP server. (For user, this does not configure the email sender. This is the user who authenticates to the SMTP server for client-server communication.)
- Set the encrypted password for the user specified in this file, using the following command:
./shnlpcli sp --name mail.smtp.password --val user_password --encrypt
The encrypted password is stored in file logprocessor.db.script.
Policy Violation Email Example
When you have a Cloud Connector DLP policy violation, the resulting email will be similar to the following: