Forum Discussion
Standard Security Policy flagging too many emails as "Potential Phishing"
Hey , thanks for your message!
Firstly, it's great to hear you're using presets, they are an awesome way of ensuring you're up to date with the latest security recommendations, I'm sorry to hear you're finding false positives (FPs) but we can for sure get to the bottom of it.
Secondly, have you tried doing admin submissions for the emails? this will do several things, it will tell us we got our verdict wrong, It will also let you know the results of our analysis. - you will also get the ability during the process to add the part of the message which caused it to be blocked (URL, Sender, Attachment, Spoof) to our Tenant Allow/Block List so it's overridden in the future while we work on getting the reason for the issue fixed.
It's also important to note that sometimes, emails are sent in a way which is non-compliant, so actually instead of overriding decisions, the correct course of action is to fix the underlying issue. - for the examples you have, could you let me know the detection technology which lead to the phish verdict and I may be able to help point you in the right direction. (we also document them all here at aka.ms/emailtech)
Thanks
Ben.
- PaulNewellAug 25, 2023
Microsoft
OneTechBeyond in addition to the suggestions from Ben_Harris, can you share a bit about your mail flow design? Does your MX record point to EOP/MDO, or does it point to a third party service? If it points to EOP/MDO, is there any additional routing (e.g., out to a third party, to an on-prem service) after the message is received, but before they are delivered to mailboxes?
- OneTechBeyondAug 26, 2023Iron ContributorHi Paul. No EOP/MDO. it's 100% native Microsoft's internal services.
- PaulNewellAug 28, 2023
Microsoft
OneTechBeyond, thanks for that note, but admittedly I am a little confused.
When you say "No EOP/MDO. it's 100% native Microsoft's internal services.", do you mean you are using EOP (Exchange Online Protection) & MDO (Microsoft Defender for Office 365) exclusively, or you're not using them at all?It sounds like you're only using EOP & MDO, in which case, follow Ben's recommendations - keep sharing the false positives with us (via admin submissions) and check out the https://aka.ms/emailtech article to get additional insight as to why we marked items as we did (perhaps something is marked due to a user's Blocked sender list, or the sender's service failed DMARC alignment).
If worse comes to worst, while you cannot adjust the sensitivity of the preset policies, you can create your own policies and adjust as necessary. The Microsoft recommendations for EOP and Defender for Office 365 security settings aticle gives the settings in each policy which align to the default settings (which are pretty low, all things considered), the Standard preset policy, and the Strict preset policy. I'd recommend starting with mirroring the Standard preset policy settings and making adjustments as necessary (based on what you find from the emailtech article), but remember Ben's note that the preset policies are updated automatically to keep up with any changes in recommendations/best practices, but custom policies are not. You would need to review your custom policies occasionally to see how they compare to our recommendations using Configuration Analyzer.
- Ben_HarrisAug 25, 2023
Microsoft
Please also ensure these are admin submissions, not just user submissions 🙂 - more details here.
https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/submissions-admin?view=o365-worldwide