Phishing, whaling, and social engineering are all common tactics used by threat actors to exploit users through email. Emails are a simple vehicle for attackers to deploy malware, viruses, ransomware, and more to a system. Though Microsoft’s 365 environment includes some protection against these attacks, it only takes one wrong move from an unsuspecting user to let the threat in.
Action: Enable mail flow rules in Exchange Admin Center
Use mail flow rules, also known as transport rules, to identify and manage email messages that flow through your organization. These rules allow admins to act on email messages while they are still in transit from the sender to the receiver; not after it’s been delivered. Mail flow rules provide admins with the ability to implement a variety of messaging policies for the larger organization such as those warning against ransomware.
Action: Protect against malware and phishing
In the Security & Compliance Center, administrators can edit and manage the default anti-malware policy. They can also configure the list of common attachment types to limit sendable and receivable file types.
Action: Turn off auto-forwarding
Threat actors that have successfully gained a foothold in a victim’s mailbox can exfiltrate email by configuring it to automatically forward email. Global admins should set up a mail flow rule to reject auto-forwarding emails to external domains.
Action: Use Office Message Encryption
An encryption service is included in your Microsoft 365 environment. It allows users within your organization to send and receive encrypted email with one another and with external users. Encryption helps ensure that only the intended recipient can view the original content.