configuration
34 TopicsMoving mx records to O365
Hello We are medium sized company, around 7000 mailboxes. We own several domains that we accept email for. Currently all mx records point to IronPorts. The emails are go through the messaging hygiene at the ironports and then the message is delivered to Exchange online. We want to move all mx records to O365. What i would like to understand, is what is the best strategy to do this? Should i move a domain that doesn't receive a high volume of mail traffic first. I think doing this will allow for fine tuning of the O365 filtering polices, and give us me some indication regarding how successful the move was and what the success rate will be for future domain moves. Also how should i construct my anti spam, anti malware polices? Should i start with the using Preset Security Policies" ? My concern with using the preset policies is you cant edit them. We will have a lot of safe and blocked senders that we will need to export from the IronPort's and import into O365. If i cant edit preset polices, then what is my best course of action? will i need to create custom polices ? I know these are a lot of questions. I'm trying to understand how i should construct the roadmap or process for moving domains to O365 Thank youSolvedDefender for O365 with onprem mailboxes
Hi all, Just wanted to confirm the usability of some features of Defender for O365 when having a exchange hibrid scenario but still most of the mailboxes on-prem. From my understanding not all features will work Safe Attachments (dynamic delivery will not work for onprem mailboxes) Safe Links (works if the MX is pointing to EOP) ATP for SharePoint, OneDrive, and Microsoft Teams (not applicable to EXO) ATP anti-phishing protection (not sure if all settings will work for onprem mailboxes) Real-time detections (reports) Thanks in advanced, Rgs RMAdding Targeted Users/Groups in Attack Simulator
Is there a setting that may have changed recently or needs to be changed that enables filtering by groups when creating a simulation. I am unable to browse our groups in our organization any longer, I can choose from other options like City, Departments, Titles, etc. but the AD groups do not populate any longer in this list when trying to add Target Users. Thank you, JeridWhitelist and Safelist problems
With the introduction of Defender for Office 365, there are several more processes that play a role in scanning emails. The Problem: There is no clear or effective way to whitelist security training providers from link and attachment scanning whether in the web portal, API, or Powershell. Impact: One or more of the systems below consistently block, scan links and/or attachments that belong to security training (not actually malicious) from several major providers, and create false positives. Rules in place: Sending Server IPs are whitelisted and emails are modified to set message headers such as "X-MS-Exchange-Organization-SkipSafeLinksProcessing" w/ value "1" "X-MS-Exchange-Organization-SkipSafeAttachmentProcessing" w/ value "1" Bypass SPAM = "-1" There does not appear to be a way to whitelist from: SpamZap - Get trapped as SPAM even with bypass. PhishZap - Gets trapped as Phish regardless of rules. MailboxIntelligenceProtection - Same as Phish. Defender for Office 365 Scanning - The bots are clicking the links and creating false positives Safe Documents - same as above. Report Message Link Detonation - Detonates links regardless of whether it's whitelisted anywhere else. Is anyone aware of a way to do this currently? There are between 50-100 different wildcard domains needed to whitelist (if we had to do them individually). A solution cannot include disabling the above services.Clarification on Microsoft Teams Encryption: E2EE vs. Default Encryption
I’m seeking some clarity on the differences between the end-to-end encryption (E2EE) offered with the Teams Premium license and the default encryption for data at rest and in transit within Microsoft Teams. From what I understand, Teams data is already encrypted both in transit and at rest by default. However, I’m unsure how the E2EE provided under the Teams Premium license differs from this standard encryption. Could someone explain in simple terms the specific differences between these two encryption methods? I’m particularly interested in understanding how I can effectively communicate these differences to my clients, who may not be very technical but need to grasp the security advantages of the Premium license.SolvedDefender for Office Policy Assignment by Domain
Hello - Sorry, this is a little bit long... We've been testing MDO and have run into an issue that seems like a 'bug' but, I've been unable to find any other reports of it online. I have a ticket open with MS but, that's moving along very slowly as they're insistent on re-doing all the troubleshooting I've already done. But, I digress... The problem we've found is in the MDO policy assignment - confirmed in anti-phish and anti-malware. If I assign the policy to a user and/or group/DL, the policy works as expected. However, if I use the domain assignment (as we were hoping to do for the full deployment), the assigned policy is being ignored and the message(s) is being passed on to the Default policy. For example, I have a custom anti-malware policy that's my priority 0 policy. In it, I have assigned a specific group with some test accounts. I also assigned a domain (one of my owned/registered tenant domains). I also added a specific file extension to the disallowed list so that I could test. Then, I send a test email, with an attachment with that extension, to an account that's a member of the assigned group as well as another account that's a member of the assigned domain. The expectation is that both of those messages should be blocked. However, that's not the case. The message to the account that's part of the assigned group is blocked (as expected) but, the message to the accounts that's part of the assigned domain is successfully delivered (attachment and all). It doesn't seem to matter which accounts, groups or domains I use, I can readily repeat the issue everytime. As an additional test, I added a random extension to the block list of the Default malware policy - one that's not included in my custom policy - and sent test emails again with an attachment of that file type. The expectation being that all accounts should receive the message. But, nope, that's not what happened. The account(s) assigned to the custom policy by group/account received the message (as expected) and the one assigned by domain was blocked. To me, that's pretty clear evidence that there's some kind of issue with domain assignment in the policies. That particular message basically bypassed the policy to which it was assigned and was handled by the Default policy. As mentioned, I haven't found any other similar reports online, and to this point, Microsoft hasn't alluded to any issues. Surely others are using domains to assign their MDO policies. Has anyone run into this and, if so, have you found some sort of resolution for it? Thanks, RobinSolved2.6KViews0likes10Commentscapability to detect password protected files to during the email delivery and ZAP process of the e
Does M365 Defender & EOP has capability to detect password protected files to during the email delivery and ZAP process of the email in user mailbox? If yes how we can configure to stop such emails and put them into quarantine and stop the email delivery to end users? I have another follow-up question on this is that if we deploy this Transport rule to quarantine false or parked domains emails like phishing or spam and unwanted emails then how we would filter and allow the legit email domains to send out such files like .PDF, Docs, excel and other password protected files to users mailbox without putting them into Quarantine?2.6KViews0likes3CommentsAttack Simulator creating a payload - Dynamic Tags
I have a few questions when creating a payload and the use of the dynamic tags. It could be a setting I'm unaware of or something not configured correctly. 1. Is there a way to define how the dynamic tags pull information? Currently, the tag ${userName} is pulling it LastName, FirstName and I would like to have it FirstName LastName so it looks more authentic. 2. The dynamic tag ${date} does not pull the date it actually displays "${date}" when the payload (email) is sent. 3. Is there a list of dynamic tags and their mappings? Thank you for any help, JeridSolved2.5KViews0likes3Comments2024 Sender Requirements - How are you handling valid e-mails sent to junk?
With the new Sender Requirements rolled out beginning in February 2024, how are you handling legitimate e-mails getting "Filtered As Junk" in O365? I am seeing very large corporations with e-mails landing in our junk e-mail now, but they are one offs. When checking the e-mail headers using MX Toolbox, I'm seeing that usually somewhere in the hops before they hit our servers, they are on a blacklist (or X-CustomSpam header is coming back as "SPF Record Fail"). And O365 seems to be sending those to spam. In our case, I don't think it's great to continually add domains to the whitelist, as it's really up to the sender to ensure they have a good "reputation", aren't on blacklists, and following the sender requirements having full DMARC, DKIM, and SPF compliance. 365 admins, are you seeing more e-mails quarantined or sent to spam and how are you dealing with it?Solved2.3KViews0likes3Comments