Define what to do with a spoof E-mail using the Exchange online E-mail spoof...
The current article is the continuation of the former article in our “spoof E-mail in Office 365 environment”. Just a quick reminder – in the first article, we have created an Exchange transport rule...
View ArticleDefine what to do with a spoof E-mail using the Exchange online E-mail spoof...
The current article is a continuation of the former article in which we learn how to create an Exchange Online transport rule that will “identify” spoof E-mail attack. The second part of the spoof...
View ArticleExchange on-Premises – authentication and mail relay
In the following article, I would like to review the subject Exchange on-Premise server, mail relay, authentication and an anonymous session (un-authenticated session). The main reason for writing this...
View ArticleManage E-mail attachment policy in Office 365 – part 1#4
The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail...
View ArticleManage E-mail attachment policy in Office 365 – part 4#4
In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail...
View ArticleManage E-mail attachment policy in Office 365 – Part 3#4
In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail...
View ArticleManage E-mail attachment policy in Office 365 – Part 2#4
In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail...
View ArticleConfigure Exchange Online to forward E-mail to a FAX service |Part 1#2
In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message,...
View ArticleConfigure Exchange Online to forward E-mail to a FAX service |Part 2#2
The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online...
View ArticleConfiguring exceptions for the Exchange Online Spoof E-mail rule |Part 3#12
In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution...
View ArticleDetect spoof E-mail and mark the E-mail as spam using Exchange Online rule...
In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and mark Spoof email message as...
View ArticleDetect spoof E-mail and delete the spoof E-mail using Exchange Online rule...
In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and delete Spoof E-mails. The...
View ArticleDetect spoof E-mail – prepend the subject of the Spoof E-mail + add...
In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and prepend the Subject of the...
View ArticleDetect spoof E-mail and send the spoof E-mail to Administrative Quarantine...
In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify Spoof email message and “route”...
View ArticleDetect spoof E-mail and raise the SCL value to “9” – send E-mail to...
In the former article, we have reviewed that required settings that need to be implemented in a scenario, in which we are using an Exchange Online rule that will identify Spoof email message and...
View ArticleAnalyzing the results of the Exchange spoof E-mail rule |Part 9#12
In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability...
View ArticleHow to simulate E-mail Spoof Attack |Part 10#12
When we hear the term “spoof E-mail attack”, the initial association that appears in our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands...
View ArticleHow to Simulate E-mail Spoof Attack |Part 11#12
In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our main goal is performing a test, in which verify if the Exchange Online Spoof...
View ArticleReport spoof E-mail and send E-mail for Inspection In Office 365|Part 12#12
In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail...
View ArticleDKIM – Domain Keys Identified Mail | Basic introduction | Part 1#5
DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and enable the destination mail infrastructure, meaning the receiving mail...
View Article