Share your knowledge. It’s a way to achieve immortality. Dalai Lama
Post Views: 5,213
Post Views: 5,213 In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was…
Post Views: 4,922
Post Views: 4,922 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want…
Post Views: 3,980
Post Views: 3,980 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t…
Post Views: 8,653
Post Views: 8,653 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate +…
Post Views: 4,666
Post Views: 4,666 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a…
Post Views: 5,189
Post Views: 5,189 In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value…
Post Views: 5,287
Post Views: 5,287 In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to…
Post Views: 6,469
Post Views: 6,469 In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want…
Post Views: 10,712
Post Views: 10,712 An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some…
Post Views: 5,075
Post Views: 5,075 The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online to forward E-mail to on-Premises FAX. The demonstration will include two phases. Creating the required Exchange Online send (outbound)…
Post Views: 9,048
Post Views: 9,048 In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message, to an FAX service that is hosted on an external network, such as our On-Premises…
Post Views: 11,536
Post Views: 11,536 In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail attachment policy that stops E-mail messages that have an executable content (executable attachment). As we learn in the…