User Guide of Email Protection (for G-Mail)
Last updated
Last updated
Go to your Gmail account, and a customizable message box (with your brand's logo and theme) titled "Welcome to XYZ Company" will appear.
Click the customizable "Connect to HawkShield" button to begin authentication. You will then be redirected to the Sign in with Google page, where you can select the email ID you wish to connect with Hawkshield.
3. Once your email address is authenticated, the Hawkshield Gmail protection will be ready for use. Click 'Ready to Send' to start securing your email communications.
All messages and buttons mentioned, including the welcome message and the "Connect to Hawkshield" button, can be fully customized with your company’s branding, such as logo, colors, and theme, to ensure a cohesive and personalized user experience.
Click on 'Compose' to start writing a new email, the way you usually do. The green toggle bar at the top-right corner indicates that email protection is activated.
Click on the message options, on the left side of the toggle bar. Encryption is automatically enabled to secure your email from unauthorized access.
To set an expiration date for email access, turn on the ‘Expiration Date’ option. A calendar will appear for selecting the desired expiry date and time.
Turn on the ‘Download’ button if you want recipients to be able to download the attached files.
Turn on the ‘Watermark’ button to apply a watermark to attachments upon download, ensuring additional security.
Enter the content of your email and add attachments. The email protection will automatically scan the email body, the header, and also the attachments.
The file names will be appended with the suffix 'hs', indicating that they are encrypted.
Then, click 'Send' to initiate the security scan.
After clicking 'Send', you will see a detailed list of all detected data types within each attachment and the email body, allowing you to review the information.
If your email content has any information that violates company policy, a “Warn” pop-up will appear.
You can view specific details, such as values, data types, line numbers, and confidence levels, by expanding the dropdown for each attachment or email section.
After reviewing, click on 'Send' to send the final email.
If your email contains anything that violates any policy, a “Blocked” pop-up will appear.
You need to request it from the admin, by clicking on the ‘Request Admin’ button on the bottom right corner.
Clicking on the continue button you will return to the ‘Compose Mail’ box.
Clicking on ‘Request Admin’ will open a Feedback Form, where select the concern email list and Predefined Jurisdiction. Click on ‘Request Access’ in the bottom right corner.
The admin will receive an email to approve. Once the request is approved by the admin, you’ll be able to send the email.
If your email contains sensitive company data, an "Encryption" pop-up will appear, indicating that company policy requires certain content to be encrypted. The system will automatically encrypt the necessary content before sending.
Click "Send" to encrypt the sensitive information and ensure secure delivery to the recipient.
Once the encrypted email is sent, the admin will receive an email alert notifying them of the action.
The recipient will receive the email but won’t be able to view the content immediately. They must click 'Open Message' to be redirected to the verification page.
The recipient can verify their email via OTP or by signing in with Google or Microsoft. To authenticate via the OTP process, enter your email address and click 'Send OTP'.
A. The recipient will receive a six-digit One-Time Password (OTP) via their registered email address.
B. The recipient must enter the OTP on the verification page and click ‘'Login.'
After successful verification, the recipient can access the email body and any attachments.
Bring the cursor near the attachments, you will see two options: Download and Preview.
A. If you want to download the attachments, click on ‘Download’.
B. If you want to preview the attachments, click on ‘Preview’. If the watermark feature is enabled, the preview will display a watermark of the sender’s email address.
Note: The watermark feature will also be enabled on downloaded attachments in the upcoming version.
The recipient can refresh the page as needed.
The sender can revoke access to an email by clicking on the hand icon in the top right corner.
Choose the recipient from whom you want to remove access by ticking the checkbox next to their name.
The "Security Settings" button allows recipients to set email expiration dates via a calendar and provides senders with options to manage file access, including toggling downloads and enabling/disabling watermarks on attachments.
To revoke email access, the sender must click the “Manage Access” button. A pop-up will appear displaying the recipient's email along with an enable/disable toggle. After disabling access, click "Apply Changes" to finalize the revocation.
If the sender revokes access to the email, the recipient will no longer be able to view its content.