Skip to product menu
close
  • Sales
    Press Space or Enter to display list of options
EXPLORE ALL PRODUCTS

Sales

 
CRM

Comprehensive CRM platform for customer-facing teams.

CRM
 
Bigin

Simple CRM for small businesses moving from spreadsheets.

Bigin
 
Forms

Build online forms for every business need.

Forms
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
Sign

Digital signature app for businesses.

Sign
 
RouteIQ

Comprehensive sales map visualization and optimal route planning solution.

RouteIQ
 
Thrive

Complete loyalty and affiliate management platform.

Thrive
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
Suites
CRM Plus

Unified platform to deliver top-notch customer experience.

CRM Plus

Marketing

 
Social

All-in-one social media management software.

Social
 
Campaigns

Create, send, and track targeted email campaigns that drive sales.

Campaigns
 
Forms

Build online forms for every business need.

Forms
 
Survey

Design surveys to reach and interact with your audience.

Survey
 
Sites

Online website builder with extensive customisation options.

Sites
 
PageSense

Website conversion optimization and personalisation platform.

PageSense
 
Backstage

End-to-end event management software.

Backstage
 
Webinar

Webinar platform for webcasting online webinars.

Webinar
 
Marketing Automation

All-in-one marketing automation software.

Marketing Automation
 
LandingPage

Smart landing page builder to increase conversion rates

LandingPage
 
Publish

Manage all your local business listings on a single platform.

Publish
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Sign

Digital signature app for businesses.

Sign
 
Thrive

Complete loyalty and affiliate management platform.

Thrive
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
NEW
LeadChain

Sync, manage, and convert leads across channels seamlessly.

LeadChain
 
NEW
CommunitySpaces

Online community platform for individuals and businesses to grow their network and brand.

CommunitySpaces
 
Suites
Marketing Plus

Unified marketing platform for marketing teams.

Marketing Plus

Commerce and POS

 
Commerce

eCommerce platform to manage and market your online store.

Commerce

Service

 
Desk

Helpdesk software to deliver great customer support.

Desk
 
Assist

Remote support and unattended remote access software.

Assist
 
Lens

Interactive remote assistance software with augmented reality.

Lens
 
FSM

End-to-end field service management platform for service businesses.

FSM
 
SalesIQ

Live chat app to engage and convert website visitors.

SalesIQ
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
Solo

The all-in-one toolkit for solopreneurs.

Solo
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
Suites
Service Plus

Unified platform for customer service and support teams.

Service Plus

Finance

 
Books

Powerful accounting platform for growing businesses.

Books
 
FREE
Invoice

100% Free invoicing solution.

Invoice
 
Expense

Effortless expense reporting platform.

Expense
 
Inventory

Powerful stock management and inventory control software.

Inventory
 
Billing

End-to-end billing solution for your business.

Billing
 
Checkout

Collect payments online with custom branded pages.

Checkout
 
NEW
Payroll

Payroll software with automated tax payments and filing.

Payroll
 
Solo

The all-in-one toolkit for solopreneurs.

Solo
 
Practice

Practice management software for accounting firms.

Practice
 
Sign

Digital signature app for businesses.

Sign
 
Commerce

eCommerce platform to manage and market your online store.

Commerce
 
Suites
Finance Plus

All-in-one suite to manage your operations and finances.

Finance Plus

Email and Collaboration

 
Mail

Secure email service for teams of all sizes.

Mail
 
Meeting

Online meeting software for all your video conferencing & webinar needs.

Meeting
 
Writer

Word processor for focused writing and discussions.

Writer
 
Sheet

Spreadsheet software for collaborative teams.

Sheet
 
Show

Create, edit, and share slides with a sleek presentation app.

Show
 
Notebook

Beautiful home for all your notes.

Notebook
 
Cliq

Stay in touch with teams no matter where you are.

Cliq
 
Connect

Employee experience platform to communicate, engage, and build positive employee relations.

Connect
 
Bookings

Appointment scheduling app for consultations with customers.

Bookings
 
TeamInbox

Shared inboxes for teams.

TeamInbox
 
WorkDrive

Online file management for teams.

WorkDrive
 
Sign

Digital signature app for businesses.

Sign
 
Office Suite

Powerful collaborative work platform for teams.

Office Suite
 
Office Integrator

Built in document editors for web apps.

Office Integrator
 
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
 
Calendar

Online business calendar to manage events and schedule appointments.

Calendar
 
Learn

Knowledge and learning management platform.

Learn
 
Voice

Cloud Contact Center Software for businesses.

Voice
 
ToDo

Collaborative task management for individuals and teams.

ToDo
 
Tables

Work management tool to connect people, processes, and information.

Tables
 
FREE
PDF Editor

Collaborative online PDF editing tool.

PDF Editor
 
Suites
Workplace

Application suite built to improve team productivity and collaboration.

Workplace

Human Resources

 
People

Organize, automate, and simplify your HR processes.

People
 
Recruit

Intuitive recruiting platform built to provide hiring solutions.

Recruit
 
Expense

Effortless expense reporting platform.

Expense
 
Workerly

Manage temporary staffing with an employee scheduling solution.

Workerly
 
NEW
Payroll

Payroll software with automated tax payments and filing.

Payroll
 
Shifts

Employee scheduling and time tracking app.

Shifts
 
Sign

Digital signature app for businesses.

Sign
 
Suites
People Plus

Comprehensive HR platform for seamless employee experiences.

People Plus

Security and IT Management

 
Creator

Build custom apps to simplify business processes.

Creator
 
Directory

Workforce identity and access management solution for cloud businesses.

Directory
 
FREE
OneAuth

Secure multi-factor authenticator (MFA) for all your online accounts.

OneAuth
 
Vault

Online password manager for teams.

Vault
 
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
 
Toolkit

Complete resource for any admin-related lookup queries.

Toolkit
 
Lens

Interactive remote assistance software with augmented reality.

Lens
 
Assist

Remote support and unattended remote access software.

Assist
 
QEngine

Test automation software to build, manage, execute, and report testcases.

QEngine
 
NEW
RPA

Automate manual, tedious, and repetitive tasks easily.

RPA

BI and Analytics

 
Analytics

Modern self-service BI and analytics platform.

Analytics
 
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI
 
DataPrep

AI-powered data preparation service for your data-driven organization.

DataPrep
 
NEW
IoT

Harnessing IoT analytics for real-time operational intelligence.

IoT

Project Management

 
Projects

Manage, track, and collaborate on projects with teams.

Projects
 
Sprints

Planning and tracking tool for scrum teams.

Sprints
 
BugTracker

Automatic bug tracking software for managing bugs.

BugTracker
 
Solo

The all-in-one toolkit for solopreneurs.

Solo

Developer Platforms

 
Creator

Build custom apps to simplify business processes.

Creator
 
Flow

Automate business workflows by creating smart integrations.

Flow
 
Catalyst

Pro-code platform to build and deploy your apps.

Catalyst
 
Office Integrator

Built in document editors for web apps.

Office Integrator
 
ZeptoMail

Secure and reliable transactional email sending service.

ZeptoMail
 
QEngine

Test automation software to build, manage, execute, and report testcases.

QEngine
 
Tables

Work management tool to connect people, processes, and information.

Tables
 
NEW
RPA

Automate manual, tedious, and repetitive tasks easily.

RPA
 
NEW
Apptics

Application analytics for all apps.

Apptics
 
Embedded BI

Embedded analytics and white label BI solutions, tailored for your needs.

Embedded BI
 
NEW
IoT

Build, deploy, and scale IoT solutions for connected businesses.

IoT
 
DataPrep

AI-powered data preparation service for your data-driven organization.

DataPrep

IoT

 
NEW
IoT

Low-code IoT platform and solutions for connected businesses.

IoT

Search Result

 
CRM Plus

Unified platform to deliver top-notch customer experience.

Try now
CRM Plus
 
Service Plus

Unified platform for customer service and support teams.

Try now
Service Plus
 
Finance Plus

All-in-one suite to manage your operations and finances.

Try now
Finance Plus
 
People Plus

Comprehensive HR platform for seamless employee experiences.

Try now
People Plus
 
Workplace

Application suite built to improve team productivity and collaboration.

Try now
Workplace
 
Marketing Plus

Unified marketing platform for marketing teams.

Try now
Marketing Plus
 
All-in-one suite

Zoho One

The Operating System for Business

Run your entire business on Zoho with our unified cloud software, designed to help you break down silos between departments and increase organizational efficiency.

TRY ZOHO ONE
Zoho One
Zoho Marketplace

With over 2000 ready-to-use extensions across 40+ categories, connect your favorite business tools with the Zoho products you already use.

EXPLORE MARKETPLACE
Marketplace
Skip to main content

Security and Compliance Dashboard

Overview

The Security and Compliance Dashboard in the Zoho Mail Admin Console provides an overview of all the recommended security configurations. It displays the overall security and compliance score along with the completion status for each action.
security and compliance dashboard

Dashboard Actions

You can do the following actions from the Security and Compliance Dashboard:

  • Filter security parameters based on configuration status - You can click either All actions, Completed or Incomplete to view a list of security configurations based on the status you select. For example, you can quickly view the list of pending security configurations by clicking Incomplete.
    security score configuration filter
  • Configure a security parameter - Hover over a security parameter which is not yet configured and click the Configure now button. You will be redirected to the corresponding page in Admin Console where you can configure the desired settings.configure security parameter

    Note:

    The Configure now button will be visible only when you hover over a security parameter which is not yet configured.

  • Review the configuration set for a security parameter - After you finish configuring the security settings, click the tooltip next to each security Action to review the current configuration. If required, you can modify the settings.
    tool tip

Security Threats

The security threats that we protect you from include:

  • Spoofing - An email is considered to be spoofed when spammers forge an email address of an organization/ person. 
  • Malware -  Malware is any file or program that is intentionally designed to harm your computer/ network/ server. 
  • Account Breach - An account breach is a security violation that exposes any confidential or sensitive information to an outsider.
  • Data Exfiltration -  Data exfiltration is an unauthorised removal or movement of data from a device.
  • Data Leak -  Data leak is the accidental exposure of sensitive data onto the internet.

Security and Compliance Score

The security and compliance score assesses your progress in completing the recommended actions to improve your organization's security. The highest score indicates that your organization is highly secure against all types of spoofing, account breaches and any data leaks, while the lowest score suggests that your organization is vulnerable to a security breach.

Your organization's security score is classified under four categories:

  • Low - When you add and verify your domain in Admin Console, the DMARC Verification, DNSBL Verification, No Trusted Senders and No presence of own domain in Trusted Domains get configured automatically and the security score status will be Low.
  • Moderate - The next step after verifying your domain, is to configure email security/authentication protocols for all your mail-hosted domains. If you configure these settings when you are in a low score range, the score moves to the Moderate level.
  • Good - Configuring the spam control settings and account related parameters will help you reach a Good security score range. 
  • Excellent - After you complete configuring all the parameters given in the Security & Compliance Dashboard, the score reaches the Excellent zone.

There is no particular order that you need to follow while setting up these parameters. Configure each security parameter as per your organization's requirements and ensure the security and compliance score is Excellent.

Recommended Security Settings

Zoho Mail provides various security settings and each parameter protects a particular threat type. Refer to the table given below to learn more about the settings available in Admin Console:

Threat TypeSecurity ParametersDescription
SpoofingDMARC VerificationDMARC is an email authentication protocol, which builds on the widely deployed SPF and DKIM protocols. In case of authentication failure, the DMARC policy is set to quarantine. Refer to DMARC Verification for the steps to configure your preferred setting.
DNSBL VerificationDNSBL is a consolidated blocked list based on user spam marking, abuse patterns, and certain third-party blocklists. Emails are detected as spam if the sending domain/ email address or IP address is present on the blocked list. Refer to DNSBL Verification for the steps to configure your preferred setting.
No Trusted SendersEmails from email addresses that are added to the Trusted Emails List get delivered to the mailbox without any spam check. These emails will not be validated for SPF/ DKIM/ blocklist checks. Please be doubly cautious before you add any email address to this list, as it may expose the organization to spam/ phishing attacks using this email address. Refer to No Trusted Senders in order to add or remove email addresses from the Trusted List.
No presence of own domain in Trusted DomainsEmails from domains that are added to the Trusted Domains List get delivered to the mailbox without any spam check. These emails will not be validated for SPF/ DKIM/ blocklist checks. Please be doubly cautious before you add any domain to this list, as it may expose the organization to spam/ phishing attacks using this domain. Refer to No Trusted Domains to ensure that there are no own domains in the Trusted Domain list.
SPF Record ConfigurationSPF is an authentication mechanism that helps in identifying the IP addresses permitted to send emails using the domain name. Refer to SPF Record Configuration for the steps to configure the SPF records.
DKIM ConfigurationDKIM is an email validation system that uses encryption to validate if an email has been sent from authorized servers configured by the administrator of the domain. Refer to DKIM Configuration for the steps to configure DKIM.
DMARC Policy DMARC is an email authentication protocol. It builds on the widely deployed SPF and DKIM protocols. Additionally, it includes a reporting function that allows senders and receivers to monitor and protect their domain from fraudulent emails. Refer to DMARC Policy for the steps to configure your organization's DMARC policy.
DKIM VerificationDKIM is an email authentication method that uses encryption to validate if an email is generated from systems authorized by the domain administrator. Emails are detected as spam in case of DKIM Failure. Refer to DKIM Verification for the steps to configure your preferred setting.
SPF VerificationSender Policy Framework, commonly known as SPF, is a text record associated with the domain to identify the servers permitted to send emails using the particular domain name. Emails are detected as spam in the case of SPF Failure and SPF Soft Failure. Refer to SPF Verification for the steps to configure your preferred setting.
Cousin Domain VerificationCousin domains or look-alike domains are spoofed domains with names similar to valid domains. If you expect a domain to send genuine emails, but want to mark an email from any other variations of the domain name as spam, you can add it in this section. Refer to Cousin Domain Verification for the steps to configure cousin domains.
Display Name VerificationYou can set up a display name and associate one or more email addresses with this display name. The emails that arrive with other display names, other than the ones added here will be considered fraudulent or spoofed emails. Refer to Display Name Fraud for the steps to configure display name fraud.
Internationalized Spam SettingsYou can allow or reject emails based on the language used in the email. If you allow certain languages, emails sent in those languages will be allowed and all the other emails will be moved to spam. Similarly, if you block certain languages, emails sent in those languages will be moved to spam and other emails will be allowed. Refer to Internationalized Spam for the steps to configure your preferred language settings.
MalwareMX Record Configuration MX records are special DNS Server records that designate recipient email servers for your domain. Configuring MX records for your domain ensures that all emails addressed to your domain are sent to the Zoho servers. Refer to Configure Email Delivery for the steps to configure MX records.
Account BreachSuspicious Login AlertsSuspicious Login Alerts, if enabled send an email alerting users of any unusual logins into their email accounts. Refer to Suspicious Login Alerts for the steps to configure suspicious alerts.
Organization-wide TFATwo-factor authentication is an additional security process to secure organization accounts with the combination of a password and a mobile device. You can choose to enable or disable TFA for your organization. Refer to Two-factor Authentication for the steps to configure TFA for your organization.
Data ExfiltrationS/MIME ConfigurationSecure/Multipurpose Internet Mail Extensions (S/MIME) provide high-level security to your organization's emails. This encrypts the content of the email using keys, and curbs any misuse. It ensures that only authorized personnel can access your data. Refer to S/MIME Configuration for the steps to configure S/MIME.
Data LeakGroup Privilege SettingsYou can choose who can have access to create organization and personal groups under group privileges settings. By default, the super admin will have all the privileges in the organization. Refer to Group Privilege Settings for the steps to configure group privileges.

Note:

  • It is equally important that your organization's users remain cautious irrespective of a high security and compliance score. Users must also adhere to standard email security protocols to prevent data loss or account breaches.
  • This security feature will be available only for organizations that are using one of our paid plans.

Still can't find what you're looking for?

Write to us: support@zohomail.com