Share your knowledge. It’s a way to achieve immortality. Dalai Lama

Manage Send As Permissions using PowerShell – Office 365 5/5 (3)

The current article dedicated to the subject of performing a management task that relates to the Send As permission using PowerShell. The Send As permission enables recipient X to send an E-mail message using the identity of a recipient Y. Technically speaking, this method can describe as “impersonation.” In Office 365 based environment, we can…

Office 365 Cutover mail migration – Exchange on-Premises pre requirements 5/5 (3)

The most common cause for a scenario, in which we fail to start the process of Office 365 cutover mail migration is – the lack of the Exchange on-Premises pre requirements. The primary goals of the current article are: Provide the checklist of Exchange on-Premises pre-requirements Explain in details the reasons for each Exchange on-Premises…

Dealing with a Spoof mail attacks and Phishing mail attacks | A little story with a sad end | Part 1#9 5/5 (3)

In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story is also known…

What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 5/5 (2)

We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail attacks realized. The…

Why our mail system is exposed to Spoof and Phishing mail attacks |Part 5#9 5/5 (1)

Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some point, that your…

Dealing with the threat of Spoof and Phishing mail attacks |Part 6#9 5/5 (2)

In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks? To be able…

The questions that we will need to answer before we start the project of – building a defense system that will protect us from Spoof mail attacks | Part 7#9 5/5 (1)

The planning stage of the “defense system” that protects our mail infrastructure, and our users from Spoof mail attack, need to begin with a definition of some framework. This framework will serve as a “logical container,” that defines the particular structure and the characters of our defense system, that will need to deal with the…

Using sender verification for identifying Spoof mail | SPF, DKIM, DMARC, Exchange and Exchange Online |Part 8#9 5/5 (1)

Spoof mail attack is implemented by a hostile element the try to spoof sender identity. The way for dealing with a Spoof mail attack is, by applying a procedure, which check and verify the sender identity (check if the sender considers as a legitimate sender of a spoofed sender). Using SPF, DKIM and DMARC, Exchange…