Skip to main content

How to use the Rotate Outlook Add-in

backBack

How to use the Rotate Outlook Add-in

Add-OnDuration5 min


### 1. Introduction

This guide provides step-by-step instructions on reporting suspicious emails, managing your block and allow lists, and efficiently handling quarantined messages.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FeMD2vAcQW848wJRQw6x1ei_doc.png

2. Choose an email to take action on

In your Outlook email client, open a message that you want to take action on.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FpogqMhUrovpc1MipCD11UQ_doc.png

3. Let's take action on a suspicious-looking email

Here we see a suspicious-looking email with a fake email address.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FareovPMJJqcEmUWenyWL51_doc.png

4. Open the Rotate Mail Assistant add-in

Let's open the Rotate Mail Assistant add-in.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FevJac4Nb9nskoSmj4zdQeW_doc.png

5. Open add-in from more options

If the add-in isn't visible, click the three dots to view all installed add-ins.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FiAgSwo27j9i6ygv9ixEuUT_doc.png

6. In the Rotate Mail Assistant, take an action

Let's meet the Rotate Mail Assistant.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F5ZZkQ5vU2RdyKPFAYhKqDf_doc.png

7. Report email as suspicious

Click here to report this email as suspicious.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FnuQYfEtyn4v6YLMsZSYP74_doc.png

8. Successfully reported email

That's it! The email has been successfully reported.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FcUcTwdj7uZ3YV18PHXkwef_doc.png

9. Add sender to block list

You can add the sender to your personal block list to prevent any further emails from them.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FaHfXmwSNRE935uZwqon14r_doc.png

10. Tell us why you think this email is suspicious

If you wish, feel free to share any details regarding the reported email with us.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FkJ1d7Xx8D7ZT15hw3oN3s4_doc.png

11. Select a threat type

Choose the threat you recognized in the email.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F181rg2pFjrxQ7JRbhV3h6K_doc.png

12. Update your report

Click 'Submit.' Rotate's detection algorithm will assess your report and take action as necessary. Furthermore, the email will be accessible for review by your organization's administrator.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FwtJSrkZssWAkXaReTXYPaj_doc.png

13. Report success message

Thank you for helping us ensure your security.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FdCZtM5bLAeoqb6hSEpWSuy_doc.png

14. Return to main view

Back to the main add-in interface.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FnK9bS9Bnfvpdb1TqYmwuW6_doc.png

15. Block sender

You can add the sender's email to your block list without needing to file a report.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FsSwm9Qtfm7XaRzTXr5UVic_doc.png

16. Allow sender

Alternatively, you can add the email address to your allow list to ensure that you consistently receive their emails from this sender.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FuhCDUiTPqT8X572gg6QiBZ_doc.png

17. Allow/Block List tab

Let's now explore the Allow/Block List tab.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F7NKw1XT8oUDfa9W5p1MwwS_doc.png

18. Allow/Block List tab 2

In this section, you can manage the senders you want to block or always allow.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F8Kd8kbQpGJan2A91wreeJ2_doc.png

19. Filter Allow/Block List

Locate a specific sender entry by searching text, filtering by list type, and sorting by the date the entry was added.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FsSggAopPXrm3duTVAAteJJ_doc.png

20. Remove sender from list

Click here to remove a sender from a list easily.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FcufrWnHqfEqXiiJ8We6pXt_doc.png

21. Add sender button

Click here to manually add senders.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2Ff9sfTtiiCxtokciRbv3YRF_doc.png

22. Add senders flow

Enter the sender email addresses you wish to add and specify the list where you want them included.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FwvPJQDGf9uM2qqMuKLF1gX_doc.png

23. Add the senders manually

Add the submitted email addresses by clicking here.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FasqDsxVf85evpJnpg7gcv7_doc.png

24. Quarantined Emails tab

Let's dive into the Quarantined Emails tab.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2Foq5pDqQD4WZd1NkBM7Mpkx_doc.png

25. Search, sort, filter emails

Search, sort, and filter quarantined emails to locate the specific message you are looking for.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FfJtLr3VwLvM2X9GH4okiFR_doc.png

26. Filter by threat types

The filter lets you find emails based on the identified threat type.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2Fj2CMnLdAneCpNkeWQBHkB5_doc.png

27. Click "Review & manage release"

Click here to view the details of the quarantined email and manage its release.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F374nVfz744PrXiSGPTzVqm_doc.png

28. Review Email page

In the newly opened browser tab, you can view the details of the quarantined email, including a screenshot and a description of its suspicious characteristics.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2F8ZN5AaRDJWKSXfgujHDKCK_doc.png

29. Ask admin to release button

To restore the quarantined email, click here to request its release from the administrator.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FmqYzMp6Cj1DrPD8mz165u7_doc.png

30. Release request sent

The email is now ready for the admin's review and approval.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2Fmn2g8DyrRFvueTJo499eas_doc.png

31. Return from email review

Navigating back to the Quarantined Emails tab of the add-in, we can see that the email is now pending review.

qg%2F50KC3grWM8RUKcOmkft9Xg8SEqJ3%2Fu3DQscjTVfCTUvthE4c69s%2FvmsifPiwCCMFoB82Hg9xQy_doc.png

This guide covered reporting suspicious emails, managing blocked and allowed sender lists, reviewing quarantined messages, and requesting administrative assistance to maintain email security. Stay secure

Frequently Asked Questions

Add-On
What is the Email Add-On?

The Email Add-On is a tool designed for Gmail and Outlook that helps you identify and manage malicious emails, including spam, phishing attempts, and malware. It enhances your email security by reporting suspicious emails and managing your personal spam list.

Mail Rules
Why are mail rules a security risk?

Mail rules can be exploited to exfiltrate data, hide security alerts, or modify incoming messages. Attackers often use forwarding rules to silently send emails to external accounts or create rules that auto-delete security notifications, making it harder to detect compromises.

Posture
Why is email security important?

Email is a common attack vector for phishing, spoofing, and other cyber threats. Properly configured DMARC, DKIM, and SPF records help prevent unauthorized parties from sending emails on behalf of your domain, protecting your organization from email-based attacks.

Scanning & Detection
What actions can I take on a malicious email?

When a malicious email is detected, you can take the following actions:

  • Block the email to remove it from the user’s inbox.
  • Release the email after it’s been blocked, putting it back in the inbox.
Can I deactivate Rotate Mail Scanning on a specific mailbox?

Yes, you can exclude specific mailboxes from Rotate Mail Scanning. This can be configured in the Configurations tab in the Email Hub under the Users and choose the users to exclude.

Email Hub
What does Email Threats mean?
  • Phishing: A type of cyberattack where attackers impersonate legitimate organizations via email or websites to steal sensitive information like passwords or credit card numbers.
  • Financial Fraud: Illegally obtaining money or assets through deceptive means, such as credit card fraud, investment scams, or identity theft.
  • BEC (Business Email Compromise): A type of cybercrime where attackers impersonate company executives or employees to trick others into transferring money or sensitive information, often through email.
  • Malware: Malicious software designed to harm, exploit, or otherwise compromise the data or functionality of a computer, network, or device. Examples include viruses, trojans, and ransomware.
  • Spam: Unsolicited and often irrelevant or inappropriate messages, typically sent in bulk, usually through email. Often used for advertising or spreading malicious content.

On this page