Quantcast
Channel: o365info
Browsing all 375 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Define what to do with a spoof E-mail using the Exchange online E-mail spoof...

The current article is the continuation of the former article in our “spoof E-mail in Office 365 environment”. Just a quick reminder – in the first article, we have created an Exchange transport rule...

View Article


Image may be NSFW.
Clik here to view.

Define what to do with a spoof E-mail using the Exchange online E-mail spoof...

The current article is a continuation of the former article in which we learn how to create an Exchange Online transport rule that will “identify” spoof E-mail attack. The second part of the spoof...

View Article


Image may be NSFW.
Clik here to view.

Exchange on-Premises – authentication and mail relay

In the following article, I would like to review the subject Exchange on-Premise server, mail relay, authentication and an anonymous session (un-authenticated session). The main reason for writing this...

View Article

Image may be NSFW.
Clik here to view.

Manage E-mail attachment policy in Office 365 – part 1#4

The subject of E-mail Message attachment manifests itself in two main scenarios: Malware scenario – a scenario that relates to an event, in which hostile element attached some malware to an E-mail...

View Article

Image may be NSFW.
Clik here to view.

Manage E-mail attachment policy in Office 365 – part 4#4

In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule.The examples that we will review in the current article are as follows: E-mail...

View Article


Image may be NSFW.
Clik here to view.

Manage E-mail attachment policy in Office 365 – Part 3#4

In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail...

View Article

Image may be NSFW.
Clik here to view.

Manage E-mail attachment policy in Office 365 – Part 2#4

In the current article, we will review how to enforce an E-mail attachment policy by using Exchange Online transport rule. The example that we will review in the current article is – an E-mail...

View Article

Image may be NSFW.
Clik here to view.

Configure Exchange Online to forward E-mail to a FAX service |Part 1#2

In the current article and the next article, we will review a scenario in which we need to use the Exchange Online infrastructure for – “forward” E-mail messages that need to be sent as an FAX message,...

View Article


Image may be NSFW.
Clik here to view.

Configure Exchange Online to forward E-mail to a FAX service |Part 2#2

The current article is the continuation of the former article in which we review that subject of the required settings that need to be configured for implementing a scenario in which Exchange Online...

View Article


Image may be NSFW.
Clik here to view.

Configuring exceptions for the Exchange Online Spoof E-mail rule |Part 3#12

In this article, we will review the subject of – “how to create an Exchange Online rule exception. As the name implies, the “exceptions” part of the Exchange rule was created to prevent the execution...

View Article

Image may be NSFW.
Clik here to view.

Detect spoof E-mail and mark the E-mail as spam using Exchange Online rule...

In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and mark Spoof email message as...

View Article

Image may be NSFW.
Clik here to view.

Detect spoof E-mail and delete the spoof E-mail using Exchange Online rule...

In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and delete Spoof E-mails. The...

View Article

Image may be NSFW.
Clik here to view.

Detect spoof E-mail – prepend the subject of the Spoof E-mail + add...

In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify and prepend the Subject of the...

View Article


Image may be NSFW.
Clik here to view.

Detect spoof E-mail and send the spoof E-mail to Administrative Quarantine...

In the current article, we will review how to deal with the phenomenon of spoofed E-mail in Office 365 environment by using an Exchange Online rule that will identify Spoof email message and “route”...

View Article

Image may be NSFW.
Clik here to view.

Detect spoof E-mail and raise the SCL value to “9” – send E-mail to...

In the former article, we have reviewed that required settings that need to be implemented in a scenario, in which we are using an Exchange Online rule that will identify Spoof email message and...

View Article


Image may be NSFW.
Clik here to view.

Analyzing the results of the Exchange spoof E-mail rule |Part 9#12

In the current article, we will review the options that are available for analyzing the result of the Exchange Online Spoof E-mail rule that we have created. The term “analyze” relate to our ability...

View Article

Image may be NSFW.
Clik here to view.

How to simulate E-mail Spoof Attack |Part 10#12

When we hear the term “spoof E-mail attack”, the initial association that appears in our mind is – a hacker sitting in a dark room, filled with flashing lights, which quickly tap the keyboard commands...

View Article


Image may be NSFW.
Clik here to view.

How to Simulate E-mail Spoof Attack |Part 11#12

In the current article, we will demonstrate three options for accomplishing the task of simulating E-mail spoof attack. Our main goal is performing a test, in which verify if the Exchange Online Spoof...

View Article

Image may be NSFW.
Clik here to view.

Report spoof E-mail and send E-mail for Inspection In Office 365|Part 12#12

In the current article, we will review two subjects that relate to a scenario in which organization experiences a Spoof E-mail attack: Report the Spoof E-mail as “Phishing mail”. Sent the Spoof E-mail...

View Article

Image may be NSFW.
Clik here to view.

DKIM – Domain Keys Identified Mail | Basic introduction | Part 1#5

DKIM (Domain Keys Identified Mail) is a mail security standard that enables the sender to declare about his “identity” and enable the destination mail infrastructure, meaning the receiving mail...

View Article
Browsing all 375 articles
Browse latest View live