Oct 04 2021 05:23 AM - edited Oct 18 2021 11:26 AM
Our mail flow is like this:
We have listed our Barracuda IP (Skip-IP-#1), and our Exchange on-premises servers' outbound/external IP (Skip-IP-#2) into our Enhanced Filtering for Connectors "skip list". However, we still get tons of incoming emails quarantined, CAT=PHISH, and when I check them in the quarantine (i.e., review their headers), I can see the SPF test is being done against our Exchange on-premises IP (Skip-IP-#2). There are no signs of the two headers being added - X-MS-Exchange-ExternalOriginalInternetSender and X-MS-Exchange-SkipListedInternetSender - which I understand should be getting added if Enhanced Filtering is working (per this).
<removed no-longer-relevant text>
Oct 07 2021 10:16 AM - edited Oct 18 2021 11:27 AM
This issue ended up being that Enhanced Filtering for Connectors was enabled via the Defender for Office 365 90-day Evaluation Mode, which puts it into Test Mode only. This can be seen by looking at the Inbound Connector itself in EXO PowerShell:
Get-InboundConnector <Connector of Choice> | fl Name, EF*
# Output:
Name : # Removed for privacy.
EFTestMode : False #<--: Right here.
EFSkipLastIP : False
EFSkipIPs : {1.2.3.4, 5.6.7.8}
EFSkipMailGateway : {}
EFUsers : {}
Oct 18 2021 11:28 AM
Oct 18 2021 02:41 PM
@Jeremy Bradshaw Can you send me your support ticket id so I can have a look? Thanks!
Nov 25 2021 06:45 AM
SolutionFYI in case this helps anyone else, the reason our Enhanced Filtering wasn't working / wasn't "skipping" our EFSkipIP's, is that our Inbound Connector's TlsSenderCertificateName was set to a fully-typed FQDN (derived from the last page ("Organization FQDN") in the HCW), meanwhile our Exchange servers' certificate didn't explicitly include that FQDN, as it was a wildcard cert.
We had two options to fix this:
1. Change the TlsSenderCertificateName to be *.<domain>.<tld>
or
2. Replace our Exchange servers' certificate with one that explicitly includes the FQDN from the Inbound Connector's TlsSenderCertificateName.
We were able to spot the issue using the "Inbound Message Report" from the new EXO Admin Center, where we could see that our messages were coming in via "From the internet without a connector", rather than "Inbound via connector <our Inbound Connector's name>". @Scott Landry deserves the credit as he essentially gave me the answer which I just had to go and confirm.