Get access to immediate incident response assistance.
Eliminate active threats with 24/7 threat detection, investigation, and response.
Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.
Advance your cybersecurity program and get expert guidance where you need it most.
Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.
Prevent unauthorized access and exceed compliance requirements.
Stop email threats others miss and secure your organization against the #1 ransomware attack vector.
Prepare for the inevitable with 24/7 global breach response in-region and available on-site.
Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.
Connection rules (known as Receiver rules in earlier versions) have access to the MAIL FROM information provided by the email server that delivered the message. They do not have access to the 'from' field included in the header of the email. The addresses provided in the two different locations are normally the same. However sometimes they may be different if a sender is trying to hide their email address or in case of newsletters and other legitimate bulk mail. The authoritative email address is contained in the MAIL FROM information. If you have made a deny list entry based on the addresses contained in the 'from' field sometimes there will be false positives or false negatives.
For more technical detail, see Knowledge Base article Q12238.
To contact Trustwave about this article or to request support: