What should I look out for?
In our previous Office 365 post we covered how to close the authentication security gap (LINK) due to malicious attackers using known good credentials which could have been scraped from spoofed emails attacks. Commonly, successful attacks come from messages that appear to be coming from an internal source like HR asking for a performance review, or the CFO asking for wiring instructions. To combat this, we’ll create a rather simple mail rule that will append the subject line of emails coming from external sources but have a display name that matches that of a pre-populated VIP list. Your VIP list should contain proper names for those selected along with known short names/nicknames (Ex: Mike & Michael or Beth & Bethany).
Configuring Mail Routing Rule
- Log into Office 365 Admin Center (https://admin.microsoft.com)
- Expand “Admin Centers” -> Click “Exchange”
- Under “Mail Flow” -> click “rules”
- Click “+” icon -> “Create a new rule…”
- Click blue “more options…”
- Name: VIP Spoof Warning
- Apply this rule if…
- “The Sender…” -> “is external/internal” -> “Outside the organization” -> Click “OK”
- Click “Add Condition”
- A Message header -> “matches these text patterns”
- Click “Enter text…” -> type From -> click “OK”
- Click “Enter text patterns” -> type out each VIP name identified clicking the “+” icon between each name -> click “OK”
- Under “*Do the following…” -> “Prepend the subject of the message with…” -> Type out desired warning (Ex: Spoof Warning!)
- Click “Save” button
At this point you should give this rule about 5 – 10 minutes before testing. But you can also add an exception to this rule if you have known external senders that spoof VIP accounts, like a bulk mailing service or if you have VIP that insists on using an external email account for some communications.