Detect spoof E-mail and send the spoof E-mail to Administrative Quarantine using Exchange Online rule |Part 7#12 5/5 (2)

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t want to enable…

Detect spoof E-mail and add disclaimer using Exchange Online rule |Part 6#12 5/5 (2)

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Add a disclaimer to the E-mail message. Prepend the E-mail subject. Generate + send an incident…

Detect spoof E-mail and delete the spoof E-mail using Exchange Online rule | Part 5#12 5/5 (1)

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Delete (reject) the E-mail . Generate + send an incident report to a designated recipient. In…

Detect spoof E-mail and mark the E-mail as spam using Exchange Online rule | Part 4#12 5/5 (1)

In the current article, we will review how to deal with Spoof mail by creating an Exchange rule that will identify incoming Spoof E-mail (spoofed sender). In such scenario, we would like to implement the following sequence of actions: Mark the E-mail as spam by setting the SCL (spam confidence level) value to 5. Generate…

Configuring exceptions for the Exchange Online Spoof E-mail rule | Part 3#12 5/5 (1)

In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution of the Exchange Online rule in a specific scenario. In the current article, we will continue to use the scenario…

Detect spoof E-mail and send an incident report using Exchange Online rule (Learning mode) |Part 2#12 5/5 (1)

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response, will generate and send an incident report to a designated recipient. In our scenario, we want to use the…

Dealing with an E-mail Spoof Attack in Office 365 based environment | Introduction | Part 1#12 5/5 (2)

An organization IT manager call to Office 365 supports, worried and upset, declaring that he is very disappointed about the fact that “Office 365” allow the occurrence of a spoofed E-mail attack! Besides of the urgent need for understanding, how could this happened; the additional urgent need is – to implement some security mechanism, that…

Manage E-mail attachment policy in Office 365 – part 4#4 5/5 (1)

In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail attachment policy that stops E-mail messages, that include a password-protected attachment. Each E-mail message that has this type of attachment will be…

Manage E-mail attachment policy in Office 365 – part 1#4 5/5 (1)

The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail message, send the E-mail message to one of our organization recipients, the recipient opens the E-mail message and “excite” the malware file. Company…