How to use the spam mail report PowerShell script | Part 3#3 4.4/5 (5)

Post Views: 8,988 In the current article, we review the PowerShell menu script that I created for exporting and viewing information stored in Exchange Online spam mail log file. Article series | Using Get-MailDetailSpamReport | View and export spam mail report Office 365 spam mail report using PowerShell | Introduction | 1#3 Using Get-MailDetailSpamReport PowerShell…

Using Get-MailDetailSpamReport PowerShell cmdlet | View and export spam mail report | Part 2#3  5/5 (3)

Post Views: 9,873 The PowerShell Get-MailDetailSpamReport cmdlet was created as a tool that simplifies the process of viewing and “dumping” information stored in Exchange Online spam log file.The Exchange Online spam log file, serve as a store that holds the documentation for each of the “spam mail events” that relates to incoming and outgoing mail…

Office 365 spam mail report using PowerShell | Introduction | 1#3 4.44/5 (9)

Post Views: 22,647 The current article is the first article in a three-article series. The Purpose of this article series is to Show you a relatively new PowerShell cmdlet named – Get-MailDetailSpamReport, that was created for Exchange Online and Office 365 administrator that need to view and export information stored in Exchange Online spam mail…

Enabling Outbound DKIM signing + Verifying the process of Outbound DKIM signing in the Office 365 environment | Part 10#10 5/5 (9)

Post Views: 9,281 In the current article, we were complete to process of “Enabling Outbound DKIM signing” in an Office 365 based environment.In addition, we review how to verify that the process of outgoing DKIM signature is implemented properly. Activating (enabling) the Outbound DKIM signing for our domain name In this phase, we assume that…

Verifying that the DKIM CNAME records configured properly | Office 365 | Part 9#10 5/5 (8)

Post Views: 19,255 In the current article, we review to process of – how to verify the DNS CNAME DKIM records, that represent a domain hosted at Office 365. The process of verifying the Office 365 DKIM CNAME records include three parts: Verify that the two CNAME records were successfully published. Verify that the CNAME…

How to create the CNAME records for Outbound DKIM signing using GoDaddy DNS | Office 365 | Part 8#10 5/5 (7)

Post Views: 27,308 In the current article, we provide step by step guideline, for the task of – creating the required two “DKIM CNAME records,” that we needed to publish. This is a preliminary step that we must complete. Only after the required “DKIM CNAME” records were successfully created, we can continue to the last…

Get the value of the DKIM record for a Domain, using PowerShell | Office 365 | Part 7#10 3.75/5 (4)

Post Views: 13,542 The task of getting the value of the DKIM records for a specific domain name in Office 365 based environment, can be described as a “challenging task, ” because, at the current time, there is no “user-friendly” graphic interface that can provide us the information that we need. The only way for…

How to recognize an event in which Office 365 recipient send spam mail? 5/5 (9)

Post Views: 10,276 One of our Office 365 recipients complains that the E-mail that he sent to an external recipient is blocked or classified as a “spam mail.” Our underlying assumption is that the problem is related to “Office 365 infrastructure” and they should immediately fix the problem! In the following article, we will learn…

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 2 production | part 3#3 5/5 (5)

Post Views: 10,627 The current article is the last article in the article series, in which we review how to implement SPF Fail policy using Exchange Online rule. In the present article, we will discuss how to apply the second phase of our project, in which, when the Exchange rule identifies an event of “SPF…

Implementing SPF Fail policy using Exchange Online rule (dealing with Spoof E-mail attack) | Phase 1 – learning mode | Part 2#3 5/5 (9)

Post Views: 10,866 In the current article, we will review how to implement an SPF Policy for incoming mail by using an Exchange rule. In our scenario, we want to identify an event, in which hostile element tries to execute a Spoof mail attack by presenting himself, as a legitimate recipient who uses an E-mail…