Raptor Email Security only blocks email where we can be certain that the email is Spam or malicious. Otherwise, the email will be scored by our system and the subject changed for Spam.
Many competitors use techniques that delay mail flow and incorrectly block legitimate emails. PCCC is a vocal opponent of these techniques.
We take missing email very seriously. First, please check your Spam and Junk folders. If you still don’t find the missing email, please email support@pccc.com with the sender’s email address, the subject and the date/time. We will perform a log review.
Using Raptor is the first step! If the subject has Spam in it, then Raptor is working correctly. You can use rules to move these to other folders.
If you receive emails that ARE Spam but are not marked as Spam, please see the instructions below to submit these to PCCC for review.
These emails are called False Positives (FPs). Please see the instructions below to submit these to PCCC for review.
The best way to submit an email for review is to create a new email message and drag the email to review over to the new email message as an attachment.
IMPORTANT: To make sure we get your email and it isn’t filtered, you will need to email the sample to a special address. Please email support@pccc.com or call (703) 359-9700 to receive the email address for submissions.
Raptor Email Security is fully managed. By submitting emails for review and emailing our support, PCCC will make all the necessary configuration and algorithmic changes needed to block the bad email while keeping good mail flowing.
Raptor Email Security uses these tags to convey important information about the email. The [Spam] or the older *****SPAM***** tags means Raptor identified the email as spam. The [External] means the email came from external. The [Phish] tag means that there is a high potential this is a phishing attempt or someone with a similar name at your firm. [New] means that this is a new email address that is contacting you. Used in combination, these tags can help greatly to keep your email safe and secure!
The following information has been prepared for Managed Service Providers (MSPs).
Raptor Email Security MSPs can access https://Raptor.PCCC.com where you can view your overall billing information as well as easily impersonate the administrator of any of the organizations under your management
Raptor Remarks are color-coded inline messages that offer guidance and alert users to potentially harmful emails.
Here is a list of all Raptor Remark tags and their meaning:
Name | Message | Color | Definition |
Javascript | This email has HTML code which may be dangerous. Iframe, object, and script tags are removed. | Orange | The email has Javascript content on the body or on an attached html file, the Javascript code has been removed from the email |
Imposter | WARNING: This email is likely from an imposter hitting custom rules for this purpose. Please contact Raptor Review if you have ANY questions and avoid interacting with this email. | Pink | The email is from an imposter because it hits the KAM_BEAL SpamAssassin rule |
Macro | The attachment is a Microsoft Office file which contains Macros. Macros can be very dangerous and should be vetted before using. If possible, ask the sender for a copy without macros. | Red | The attached file is an Office Document with a macro that could be dangerous |
Image Tracking | Image Tracking Removed in this message. | Yellow | There is a link to a tracking pixel/image in the body of the email, the tracking image has been removed |
External | Please be careful! This email is from an EXTERNAL sender. Be aware of impersonation and credential theft. | Yellow | Email is coming from an external sender |
Spam | Warning! This email was marked as spam by Raptor Email Security with a score of X out of Y. If it’s miscategorized, please submit it to Raptor Review. | Pink | Email has been tagged as spam |
Phish | WARNING: This is potentially a phish with a name similar to one in your organization. Please be careful of phishing and impersonations. | Pink | Email is a phish tentative because it hits a specific rule for that customer |
New | Warning! This email is from a new person or someone you haven’t corresponded with very often. | Orange | Email is from a new sender for the domain |
Malware | An attachment that was potential dangerous was removed as a possible zero day malware risk. | Orange | A zero day attachment has been removed |
Security Issue | The Sender has poor domain security and should be checked carefully | Orange | Spf, Dkim or Dmarc has failed or is not present (KAM_LAZY_DOMAIN_SECURITY hits) |
Extension | Description | Threat |
---|---|---|
pif | MS-DOS shortcut | Can launch malware |
com | Executable file | Can launch malware |
scr | Screen Saver Script | Can launch malware |
bat | Executable batch file | Can launch malware |
{*} | class ID extension | Class IDs function the same way other extensions do, but without it being obvious what type of file is being used, and is commonly used to trick users into opening malware |
Extension | Description | Threat |
---|---|---|
7z | 7z compressed file | 7z compressed files can contain autoexecuting exploits |
ade | MS Access project extension | Access project files Can contain autoexecuting macros |
adp | MS Access project description | Macros |
app | Microsoft FoxPro application / OS X binary | Executables may launch malware |
asd | Microsoft Office automatic backup file | Macros |
asf | Streaming video | Buffer overflow |
asx | Streaming video | Buffer overflow |
bas | BASIC source file | Code execution can launch malware |
chm | Compiled HTML help file | Exploits a buffer overflow found in Internet Explorer. |
cmd | Executable batch file | Can launch malware |
cpl | Control panel extension | Can launch malware |
crt | Security certificate | Can override SSL certificates and lead to Man-in-the-middle attacks |
dll | Dynamic Link Library | Can launch malware |
exe | Executable file | Can launch malware |
ex | Obfuscated form of exe | Can launch malware |
exee | Obfuscated form of exe | Can launch malware |
exe.xz | Obfuscated and compressed form of exe | Can launch malware |
ex_ | Obfuscated form of exe | Can launch malware |
fxp | Microsoft FoxPro executable | Can launch malware |
hlp | Windows compiled help file | Macros |
hta | HTML application | (Java)script can launch malware |
gz | Compressed archive | Compressed archive file format used to hide malware |
img | Img ISO images became popular for DVDs | Some OSes will mount img ISO images as drives allowing for malicious software installation |
inf | Setup information | Setup scripts can be changed to do unexpected things |
ini | Contains program options | Program options can be accidentally installed and cause programs to do unexpected or malicious things |
ins | Internet Naming Service | DNS hijacking/DNSChanger attacks |
iso | ISO images became popular for CDs | Some OSes will mount ISO images as drives allowing for malicious software installation |
isp | Internet Settings | DNS hijacking/DNSChanger, MITM attacks |
jar | Executable Java file | Can launch malware |
js | Javascript source file | Can launch malware |
jse | Javascript executable | Can launch malware |
lib | Software library | In theory, these files could be infected but to date no LIB-file virus has been identified |
lnk | Windows shortcut | Can execute arbitrary code and run malware. Some people may accidentally attach a shortcut instead of the softlinked file |
lzh | Compressed archive | Compressed archive file format used to hide malware |
mdb | Microsoft Access File | Macros can launch malware |
mde | Microsoft Access database | Macros can launch malware |
mim | MIME-encoded file | Blocked due to an exploit in some versions of WinZip. |
msc | Microsoft Common Console Document | Can be changed to point to unexpected places. |
msi | Windows installer executable | Can launch malware |
msp | Microsoft Windows Installer Patch | Can launch malware |
mst | Microsoft Visual Test Source Files and SDK Setup file | Source can be changed to make your computer work unexpectedly |
ocx | Object Linking and Embedding (OLE) Control Extension | Can launch malware. |
one | Microsoft OneNote | Can launch malware. |
pcd | Kodak proprietary photo CD image | Can launch malware. |
pdf.xz | Compressed Pdf files | Can launch malware |
prg | FoxPro program source file | Can launch malware |
rar | RAR compressed file | Can lead to remote code exploits due to self-extracting archive capabilities |
r00 | RAR partial archive compressed file | Can lead to remote code exploits due to self-extracting archive capabilities |
reg | Registry file | Can change system settings and cause unexpected behaviour |
sct | Windows Script Component | Can launch malware |
sh | UNIX shell script | Can launch malware on UNIX workstations |
shb | Shell Scrap Object File | Can launch malware |
shs | Shell Scrap Object | Can launch malware |
sys | System Device Driver | Can launch malware, kernel level. |
uue | UUE archive file | Can be used to hide malware files |
url | Bookmarked URL | File with a web URL that can open nefarious |
vb | VisualBASIC runtime | can execute arbitrary code |
vbe | VisualBASIC | can execute arbitrary code |
vbs | VisualBASIC script | can execute arbitrary code |
vcs | Calendar file | Buffer overflow in old Outlook versions |
vxd | Virtual Device Driver | Can launch malware |
wim | Windows Image Format | Can launch malware |
wms | Windows Media Player Skin | Can launch malware |
wsc | Windows Script Component | Can launch malware |
wsf | Windows Script File | Can launch malware |
wsh | Windows Scripting Host Settings File | Can launch malware or cause unexpected behavior |
xll | Microsoft Windows Executables | Can launch malware |
Extension | Description | Conditions and Reason |
---|---|---|
zip | File Archive | ZIP archives contents are scanned using the same rules above. ZIP files which appear to be corrupted or in the wrong format (Files with a bad “magic file number”) are blocked, since they may contain exploits or executable malware. |
eml | Email message attachment | Email forwarded in this manner without being marked as multipart alternative are quarantined, since a client may inadvertently open this extension automatically and execute malware. |
Tag | Reason |
---|---|
iframe | Iframe tags are used to “frame” or embed a remote website inside of an HTML email, and is blocked by Raptor due its use for phishing and tracking user email habits. |
object | The object tag is used to embed audio, video, ActiveX, PDF, Flash, and Java applets in an HTML document, which can be exploited on some clients to launch malware. |
script | The script tag is used to embed a Javascript or other executable program into an HTML document, and can be exploited to launch malware. |
Extension | Removal Date | Reason |
---|---|---|
rar | 2012-07-25 | RAR files have had exploit vectors but the prevalence of the file format is too high. Please make sure you are using recent and secure software to handle RAR files. |
vcs | 2013-05-11 | Old versions of Outlook contained buffer overflows which could be exploited when importing a calendar. The prevalence of the format and use of clients that no longer suffer from this vulnerability has prompted the removal of this file block. |
A computer virus is one type of malware which can spread by itself. As Wikipedia puts it, “the term “virus” is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs.”
Microsoft Outlook Raptor Anti-Spam Rule Recommendations
The Raptor Anti-Spam / Anti-Malware system labels unwanted emails with “[Spam]” in the Subject header. Some users receive hundreds and thousands of these unwanted emails per day so filing them away becomes imperative. These instructions will help you make two rules to filter out these emails with Microsoft Outlook.
1. Create 2 Folders to hold Spam marked by Raptor: 1 folder for Spam below a score of 15, and 1 for Spam scoring 15 and over.
A. On your Inbox you will Right Click and select “New Folder”.
B. Create another Folder and name it SPAM15. (If Outlook 2019 created a “spam” folder, name this new folder “spam15” for consistency.)
2. Now go to the File tab.
3. Click on Rules and alerts.
4. Click on New Rule and start from a blank rule.
5. Select “Apply rule on messages I receive” and click Next.
6.Check the condition “with specific words in the message header”
7. Click on “specific words” link in Step 2.
8. Enter “X-SPAM-Level: ***************” without the quotes in the Search Text box.
9. Click Add
10. Click OK
11. Click Next and select “move it to the specified folder”.
12. Click on “specified” link in Step 2.
13. Choose the “SPAM15” folder.
14. Click OK.
15. Click Finish.
16. Click on New Rule and start another rule from a blank rule.
17. Select “Apply rule on messages I receive” and click Next.
18. Check the condition “with specific words in the subject”
19. Click on “specific words” link in Step 2.
20. Enter “[Spam]” without the quotes in the Search Text box.
21. Click Add.
22. Click OK.
23. Click Next and select “move it to the specified folder”.
24. Click on “specified” link in Step 2.
25. Choose the “SPAM” folder.
26. Click OK.
27. Click Finish.
28. It’s important that you run the SPAM 15 & Over Rule first. If you created the rules in a different order, use the up/down arrows to change the order of the rules.
29. Click Apply
Periodically, you should check these folders and delete the unwanted e-mails. Also, if an email is missing, you check these folders (and the Junk Email folder if you use Outlook’s Junk Email Filter) first. Because a higher score indicates an email is more likely to be spam, you should not have to check the SPAM15 folder as often as the SPAM folder.
Mozilla Thunderbird Raptor Anti-Spam Rule Recommendations
The Raptor Anti-Spam / Anti-Malware system labels unwanted emails with “[Spam]” in the Subject header. Some users receive hundreds and thousands of these unwanted emails per day so filing them away becomes imperative. These instructions will help you make two rules to filter out these emails with Mozilla Thunderbird
15. After verifying the information click OK to add the new Filter Rule
16. Next, click on New and start another blank rule.
17. Ensure Getting New Mail: is checked.
18. Ensure the far left drop-down states Subject and in the right-most text box enter, “[Spam]”
19. Under “Perform these actions:”, select “Choose Folder…”
20. In the drop-down, select your email account, select Inbox and then choose the Spam folder
21. After verifying the information click OK to add the new Filter Rule
22. It’s important that the Spam15 Rule is first. If you create them in a different order, use the Move Up and Move Down options to change the order.
23. Periodically, you should check these folders and delete the unwanted emails.
If an email is missing, you should check these folders first.
Because a higher score indicates an e-mail is more likely to be spam, you should not have to check the Spam15 folder as often as the Spam folder.
If you legitimately use addresses like noreply@ to send emails, you need to ensure that address exists.
If you use cPanel, the following will do so and limit the storage for the account to 1 MB.
NOTE: Add other aliases to this account as needed.
Goal:
This guide will lead you through the steps to self-deploy RaptorFAST for Google Apps.
NOTE:
RaptorFAST for Google Apps is intended to be run manually.
Prerequisites:
Administrator access to “admin.google.com”. Navigate to “admin.google.com” to begin.
Google Admin Steps:
Google Cloud Platform Steps:
Note: It will not indicate a success, it will only indicate errors.
Note: If unsuccessful, a step may have been missed or something was entered incorrectly. Reach out to support@pccc.com for assistance if error persists.
support@raptor.us
+1.703.359.9700
Resources
Get in Touch
Copyright © 1993 – 2022 Peregrine Hardware, Inc.
All trademarks and registered servicemarks are the property of their respective companies.