Cisco SecureX + Cisco Secure Email

Cisco SecureX | A simplified security experience


Today, email administrators need to get the most out of their data and reporting when it comes to the daily management of Business Email Compromise, Ransomware, Malware, and Phishing. The email administrator also has to share the data, reporting, and actual emails allowing their SOC and other teams in order to perform X, Y, Z.

Getting Started

The following video provides the steps to configure the Cisco Secure Email module in SecureX. This allows you to take the everyday mail summaries and threat reporting and make those available in the SecureX Dashboard:

Using Search & Remediate with Cisco SecureX

Please see Using Search & Remediate with Cisco Secure X.

SecureX Browser Extensions

Every Cisco Secure customer is entitled to the SecureX platform with no additional license required. And now you can have the power of SecureX in your web browser. Install the extension today on the following:

Once you have installed the SecureX Ribbon extension, you must create the ribbon client credentials in Cisco SecureX and use these credentials to authenticate the ribbon extension. Visit the API Clients page in Cisco SecureX for your region to create the API Client:


SecureX Orchestration > Phishing Investigation Workflow

The Phishing Investigation workflow monitors a mailbox for incoming phishing reports. When an email is received, the workflow investigates its attachments and attempts to determine if anything in the email (or its attachments) was suspicious or malicious. If anything suspicious or malicious is found, the user is told to delete the email, a casebook and incident are created in Threat Response, a Webex Teams message is posted, and an email is sent to a SOC email address.

SecureX Orchestration > DLP

SecureX Modules

Learn more regarding the SecureX ecosystem and modules...

SecureX Administration

What are the differences between the "User" and "Admin" account roles?

The capabilities granted to Admin accounts but not Users are:

  • Create, invite, or modify User accounts
  • Add and configure Integration Modules
  • Enable Orchestration for the organization
  • Create new Orchestration Workflows, Atomics, Targets, and similar Orchestration objects
  • Edit all Orchestration workflows (individual workflows may be protected from editing by User level accounts)

More information on Administration and Users: SecureX Help > Administration > Users

Related Resources