Share your knowledge. It’s a way to achieve immortality. Dalai Lama
Post Views: 7,212
Post Views: 7,212 In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was…
Post Views: 7,148
Post Views: 7,148 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want…
Post Views: 5,615
Post Views: 5,615 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t…
Post Views: 11,686
Post Views: 11,686 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate +…
Post Views: 6,074
Post Views: 6,074 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a…
Post Views: 7,167
Post Views: 7,167 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value…
Post Views: 7,700
Post Views: 7,700 In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to…
Post Views: 8,612
Post Views: 8,612 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want…
Post Views: 15,056
Post Views: 15,056 An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some…
Post Views: 6,631
Post Views: 6,631 The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online to forward E-mail to on-Premises FAX. The demonstration will include two phases. Creating the required Exchange Online send (outbound)…
Post Views: 12,082
Post Views: 12,082 In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message, to an FAX service that is hosted on an external network, such as our On-Premises…
Post Views: 14,459
Post Views: 14,459 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail attachment policy that stops E-mail messages that have an executable content (executable attachment). As we learn in the…