Product
Use cases
Resources
About
Pricing
Product
Use cases
Resources
About
Pricing
Explore use cases
Zero-day phishing protection

Detect phishing TTPs directly in the browser and stop credential theft.

Account takeover detection

Stop ATO with stolen credential and compromised token detection.

Identity security posture

Map and harden your entire identity attack surface.

Identity investigation and response

Investigate and respond faster with unique browser telemetry.

Secure shadow SaaS

See and control shadow SaaS in the browser.

Push Security logoPush Help Center
Ready to help
Help for administrators
Help for admins
Help for employees
Help for employees
Help for administrators
Help card decoration image
Investigating mail rules
Triaging suspicious mail rules
What to do if you find a malicious mail rule in Microsoft 365
What to do when you find a malicious mail filter in Google Workspace
Guide to triaging a potentially malicious mail rule
How to restrict external forwarding Microsoft 365
How does Push determine if a mail rule is suspicious?
Need more help?
Questions, feedback, tech support, sales support - anything you need.
We’ll get back to you within a day.
Logo
Subscribe to get updates from Push
The latest news, articles, and resources, sent to your inbox
Product
FAQs
Pricing
Demo
Resources
Blog
Help center
Content
Status
Supported apps
About
About
The team
Investors
News
Contact
Careers
Assurance
Security
Privacy policy
Cookie policy
Terms
Sub-processors
Data processing agreement
© Push 2025. All rights reserved.
Clear cookies
AICPA SOC CertifiedGDPR CompliantCyber Essentials
You're offline. Waiting to reconnect.