E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

Report spoof E-mail and send E-mail for Inspection In Office 365|Part 12#12

In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail for further analysis. Report Spoof E-mail as “Phishing mail” I try to get additional information regarding the subject of “what happens behind…

Details
E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

How to Simulate E-mail Spoof Attack |Part 11#12

In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our primary goal is performing a test, in which verify if the Exchange Online Spoof E-mail rule that we have created is manage to identify an event of Spoof E-mail and respond accordingly. Disclaimer It is important…

Details
E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

How to simulate E-mail Spoof Attack |Part 10#12

When we hear the term “spoof E-mail attack,” the initial association that appears to our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands and strange markings! Sound romantic? Well, in reality, the ability to perform or simulate E-mail spoof attack is very simple…

Details
E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

Analyzing the results of the Exchange spoof E-mail rule |Part 9#12

In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability to answer fundamental questions such as: How many times the Exchange Online rule that we have created was “triggered”? What is…

Details
E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

Detect spoof E-mail and send the spoof E-mail to — USER quarantine using Exchange Online rule |Part 8#12

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online user quarantine. In our scenario, we don’t want to enable the…

Details
E-mail SecurityRecognize and capture Spoof E-mailSpoof E-mail

Detect spoof E-mail and send the spoof E-mail to Administrative Quarantine using Exchange Online rule |Part 7#12

In the current article, we will review how to deal with Spoof E-mail scenario in an Office 365 environment, by creating an Exchange Online rule that will identify Spoofed E-mail (spoof sender) and as a response – “route” this E-mail to the Exchange Online administrative quarantine. In our particular scenario, we don’t want to enable…

Details