# Reclassify ## Change email classification `email_security.investigate.reclassify.create(strpostfix_id, ReclassifyCreateParams**kwargs) -> object` **post** `/accounts/{account_id}/email-security/investigate/{postfix_id}/reclassify` Submits an email message for reclassification, updating its threat assessment based on new analysis. ### Parameters - `account_id: str` Account Identifier - `postfix_id: str` The identifier of the message. - `expected_disposition: Literal["NONE", "BULK", "MALICIOUS", 3 more]` - `"NONE"` - `"BULK"` - `"MALICIOUS"` - `"SPAM"` - `"SPOOF"` - `"SUSPICIOUS"` - `eml_content: Optional[str]` Base64 encoded content of the EML file - `escalated_submission_id: Optional[str]` ### Returns - `object` ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_email=os.environ.get("CLOUDFLARE_EMAIL"), # This is the default and can be omitted api_key=os.environ.get("CLOUDFLARE_API_KEY"), # This is the default and can be omitted ) reclassify = client.email_security.investigate.reclassify.create( postfix_id="4Njp3P0STMz2c02Q", account_id="023e105f4ecef8ad9ca31a8372d0c353", expected_disposition="NONE", ) print(reclassify) ``` #### Response ```json { "errors": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "messages": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "result": {}, "success": true } ```