Identifying Malicious Emails in Inboxes
In this article, Thijs Lecomte discusses how to identify malicious emails using Microsoft Defender for Office 365.
In this article, Thijs Lecomte discusses how to identify malicious emails using Microsoft Defender for Office 365.
Microsoft Defender for Office 365 (plan 2) contains the Threat Explorer feature. It's a useful way to investigate problematic messages which arrive in a tenant. The automated investigations feature can highlight messages containing malware by assembling evidence about warning signs in the message or its contents, and administrators can then action the recommendations up to and including the removal of messages already delivered to user mailboxes. Automating investigations is a good thing, if you afford Defender for Office 365 Plan 2.
In this post, Microsoft MVP Alan Byrne explains how to configure the two most effective technologies that will ensure your outgoing email is successfully delivered. These technologies are known as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM), and they protect your outgoing emails from being marked as spam while also flagging and blocking any incoming messages from unauthorized servers spoofing your domain.
How to use Exchange Online mail flow rules to improve the effectiveness of your EOP spam filtering and protect Office 365 users from phishing attacks.
Are Sender Policy Framework (SPF) records in DNS necessary for domains these days?
Are there any security or compliance concerns for Office 365 customers who allow emails to be sent to Microsoft Teams channels?
Emails sent using web forms on a website may not be received in the mailbox of the recipient due to a configuration or filtering issue.
In this episode of the Exchange Server Pro Podcast Brian Reid and I discuss Exchange Online Protection and new ATP features.
A blocked sender in a Exchange Server mailbox's junk email configuration causes SMTP error 554 5.1.0 Sender Denied.
How to configure an Exchange organization to prevent LinkedIn from scraping the address list for email addresses.
Learn about open relays and how to verify that your Exchange Server is not one of them.
The Epsilon data breach that compromised tens of millions of email addresses has been the big news of the email world lately. What are you telling your customers to expect?