Home Compliance & Certification Auto-Email Forwarding Disabled Screenshot Guide

Auto-Email Forwarding Disabled Screenshot Guide

Last updated on Feb 01, 2026

1. Purpose of This Guide

This artefact proves that automatic email forwarding to external addresses is disabled at the organisation level.

Why this matters: attackers who compromise an email account often set up silent forwarding rules to siphon emails out without being noticed. Disabling auto-forwarding cuts off that escape route.

Under PDPA Data Protection Essentials Clause 5.1.7, this control is recommended (not mandatory), but providing evidence here strengthens your overall data protection posture and reduces assessor follow-up questions.


2. What You Will Submit

You will upload one screenshot showing that auto-email forwarding to external addresses is disabled.

The screenshot should:

  • Be taken from your email admin console

  • Clearly show the organisation-wide setting

  • Indicate that external auto-forwarding is blocked or disabled


3. How to Collect / Obtain This Evidence

Option A: Microsoft 365 (Exchange Online)

https://techcommunity.microsoft.com/legacyfs/online/media/2017/12/Forward2_thumb.jpg

  1. Sign in to the Microsoft** 365 Admin Center**

  2. Go to Admin centers → Exchange

  3. Navigate to Mail flow → Rules 

    1. Apply the rule to messages that are auto-forwarded, and "reject the message" with an explanation.
  4. Navigate to Protection → Anti-spam policies and open the Outbound spam policy

    1. Ensure Automatic forwarding is set to Off (or blocked to external domains)
  5. Take a screenshot showing the setting clearly


Option B: Google Workspace (Gmail)

  1. Sign in to the Google Workspace Admin Console

  2. Go to Apps → Google Workspace → Gmail

  3. Open Routing or End user access

  4. Confirm that automatic forwarding to external addresses is disabled or restricted

  5. Take a screenshot showing the policy status


If you use another email system

Provide a screenshot from the admin console showing:

  • Auto-forwarding rules are disabled, or

  • External forwarding is blocked by policy


4. Evidence Format

  • Accepted file types: PNG, JPG, PDF

  • Recommended naming format:

    YourCompanyName_AutoEmailForwardingDisabled_YYYY-MM-DD.png
    
    

    Example:

    AcmeCorp_AutoEmailForwardingDisabled_2025-07-01.png
    
    

5. What “Good” Looks Like

A strong screenshot includes:

  • Visible Element: Admin console page (not a user mailbox)
    Why it matters: Proves the control is enforced organisation-wide.

  • Visible Element: Setting clearly marked as DisabledOff, or Blocked
    Why it matters: Removes ambiguity for the assessor.

  • Visible Element: Platform branding or URL bar
    Why it matters: Confirms the source of the configuration.

If an assessor can tell, at a glance, that external auto-forwarding is blocked, you’re golden.


6. Tips from Sir Stonk 🗡️

  • If you must allow forwarding for business reasons, document it separately and explain compensating controls (monitoring, alerts, restricted domains).

  • Crop carefully — include the setting name and status, not just a green tick.