Microsoft's recommendation regarding traffic inspection of m365 traffic

Brass Contributor

 

Hi,

 

does anyone know, what is microsoft's official recommendation to prevent any attackers from distributing malware via microsoft's own cloud resources like discussed at Cloud storage from Microsoft, Google used in malware attacks • The Register?

According to microsoft's networking principles, traffic related to Microsoft 365 shouldn't be inspected by any networking component and routed directly to microsoft (bypassing proxies and other traffic inspection solutions).
How can this be configured safely, when there is such attack path?

0 Replies