SafeSend Cloud: Settings

Written By Marissa Fegan (Super Administrator)

Updated at April 30th, 2026

The Settings page is the administrative hub for configuring the core infrastructure and visual identity of SafeSend Cloud. From this screen, administrators verify the integration with their Microsoft environment, customize the appearance of the user interface, and download the necessary deployment files to roll out the solution to their organization.

Ensuring these settings are correctly configured is the first step toward a successful SafeSend Cloud deployment.

Microsoft Entra ID Integration

To function seamlessly within your existing ecosystem, SafeSend Cloud integrates directly with Microsoft Entra ID.

  • Connection Status: This section provides real-time confirmation that your SafeSend tenant is successfully connected to your Microsoft directory
  • Tenant ID: Displays the unique identifier for your organization’s directory, ensuring that policies and user data are correctly synced and secured

Logo Customization

Administrators can personalize the SafeSend experience by uploading a corporate logo. This logo appears within the SafeSend prompts that users see before sending an email, reinforcing that the security check is a trusted, official part of the company's IT environment.

  • Logo Preview: View how your branding will appear to end-users
  • Edit Logo: Easily upload or update your organization's image file

Add your Logo

  1. Click Edit Logo
    1. Image size must be no larger than 155x40
    2. Image type must be .png file type
    3. Images with transparent backgrounds are recommended so that your logo matches the rest of SafeSend
  2. Upload your logo
  3. Click Apply

Manifest Configuration

For complete details on both manifest options, and to help determine which is right for your organization's environment, please navigate to Selecting a SafeSend Cloud Manifest.

The Manifest is the configuration file required to deploy the SafeSend add-in to your users' Outlook clients. SafeSend Cloud offers two distinct deployment modes to match your organization's security philosophy and technical requirements:

  • Option 1: Enforced Protection Mode This configuration is designed for organizations that want robust, real-world security. It enforces policies to prevent data loss while remaining resilient against network interruptions, balancing strict security with a smooth user experience.
  • Option 2: User Prompt Mode This mode acts as a helpful "guardrail." It prioritizes workflow speed and user autonomy, alerting users to potential issues while allowing them to make the final decision on whether to proceed. It is ideal for organizations focused on security awareness and education.