Office 365's Anti-Phishing Solution

Akins IT • February 24, 2020
Connect with us

In Part 3 of the "Phishing Attacks and Recommended Solutions to Protect Your Organization" webinar we are going to be reviewing Office 36's Anti-Phishing solution– Office 365 ATP. We will be reviewing Platform Type, Requirements to Implement, Security Measures – Safe Attachments, Safe Links, Anti-Phishing, User Training, and some other considerations, including integration with other services.

Office 365 ATP is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection; and it includes features to safeguard your organization from harmful links in real time. It operates on the SaaS Platform or Software as a Service platform. This service requires Azure Active Directory, which is automatically included with Office 365 Exchange online mailboxes; and it can be configured for on-premise Exchange Server or other on-premise SMTP email solutions.

By heading to Office 365 Security & Compliance center > Threat management > Policy, you are presented with the O365 ATP Suite. We will be reviewing safe attachments first.

ATP SAFE ATTACHMENTS


ATP safe attachments provides zero-day protection to safeguard your messaging system by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a sandboxing environment, and then uses machine learning and analysis techniques to detect malicious intent.

You can configure this policy to

  • Monitor – which only tracks scan results.
  • Block – which blocks the whole email and malicious attachment all together.
  • Replace – which delivers the email but removes the malicious attachment.
  • Dynamic Deliver – which avoids message delays while still protecting recipients from malicious files. It does this by delivering the email without full attachments immediately and reattaches once the scan is complete. One element you don’t see in this configuration screen with Dynamic Deliver is the preview function which, for most PDFs and Office documents, can be viewed in a safe mode while ATP scanning is underway.

ATP SAFE LINKS


In the image below, you see Safe links which provides time-of-click verification of URLs, for example, in email messages and office suite files. Protection is ongoing and applies across your messaging and office environment including other Office Applications such as Word, Excel, PowerPoint. Safe links remain accessible and malicious links are dynamically blocked. For end users in your organization, you are able to control if scanning is complete before delivering messages to users or for real-time scanning.

ATP ANTI-PHISHING


With the Anti-Phishing policy, you have the ability to protect attempts to impersonate your users and organizational domain. It applies machine learning models and impersonation-detection algorithms to prevent phishing attacks. This actually works in conjunction with Safe Attachments and Safe Links, and therefore, multiple machine learning models, to analyze the message to determine if this policy applies to the message and the appropriate action is taken.

Anti-Phishing also enables Mailbox Intelligence, which monitors user’s email habits and personal contacts. It also identifies unusual activity like sending an abnormal amount of mail or data during unusual time periods, which could be a key indicator of a data exfiltration. When this Is triggered, you then can determine what will occur automatically by the Mail Intelligence > Action found here.

USER TRAINING


In terms of user training, Microsoft provides capabilities to train users in a more direct manner with Attack Simulator. In this simulator, you are able to run realistic attack scenarios in your organization that can help identify and find vulnerable users.

Some attacks you are able to create include: 

  • display name spear-phishing attacks
  • password-spray attacks
  • brute-force password attacks 

This feature is unique in that you are able to create a custom, reusable email template specific to your organization. You may be surprised to learn that Microsoft actually used this internally when developing Attack Simulator with the Xbox One X launch and an a “employee Pre-Order” offer. It was reported with a 60% click rate.

Similarly to other solutions, URL protect also provides an element of user training here with indicating when URLs were detected to be malicious.

OTHER CONSIDERATIONS


One of the key elements to Office 365 ATP is not only its focus on email security, but Microsoft also provides telemetry with other ATP solutions such as Defender ATP and Azure ATP in the Microsoft 365 Ecosystem. The true benefit here is the built in, not bolt on, approach that no other vendor is able to provide. Advanced Threat Protection works 24/7 and provides automated investigation and response.

One example of this would be Malware ZAP– if malware is weaponized after being delivered to users it will remove previously delivered messages and initiate an automated investigation to determine who else may be impacted or was delivered the same payload.

Another consideration with Office 365 ATP would be User Submission with the Report Mail add-in that is dynamically added to outlook for end users when enabled. This provides the ability for users to submit emails as junk or phishing - which with admin approval will allow automatic investigations to increase your cyber security overall.

ADVANTAGES


Some advantages you find with Office 365's Anti-Phishing solution is the ability to quickly enable and protect users, Automated investigation & Remediation, User Submissions. However, there can be improvements on the granularity of controls.


CONCLUSION


If you found the above information valuable and would like to see how Office 365 can enhance your email security in your organization, contact us.

By Shawn Akins October 20, 2025
October 20, 2025 — Early today, Amazon Web Services experienced a major incident centered in its US‑EAST‑1 (N. Virginia) region. AWS reports the event began around 12:11 a.m. PT and tied back to DNS resolution affecting DynamoDB , with mitigation within a couple of hours and recovery continuing thereafter. As the outage rippled, popular services like Snapchat, Venmo, Ring, Roblox, Fortnite , and even some Amazon properties saw disruptions before recovering. If your apps or data are anchored to a single cloud, a morning like this can turn into a help‑desk fire drill. A multi‑cloud or cloud‑smart approach helps you ride through these moments with minimal end‑user impact. What happened (and why it matters) Single‑region fragility: US‑EAST‑1 is massive—and when it sneezes, the internet catches a cold. Incidents here have a history of wide blast radius. Shared dependencies: DNS issues to core services (like DynamoDB endpoints) can cascade across workloads that never directly “touch” that service. Multi‑cloud: practical resilience, not buzzwords For mid‑sized orgs, schools, and local government, multi‑cloud doesn’t have to mean “every app in every cloud.” It means thoughtful redundancy where it counts : Multi‑region or multi‑provider failover for critical apps Run active/standby across AWS and Azure (or another provider), or at least across two AWS regions with automated failover. Start with citizen‑facing portals, SIS/LMS access, emergency comms, and payment gateways. Portable platforms Use Kubernetes and containers, keep state externalized, and standardize infra with Terraform/Ansible so you can redeploy fast when a region (or a provider) wobbles. (Today’s DNS hiccup is exactly the kind of scenario this protects against.) Resilient data layers Replicate data asynchronously across clouds/regions; choose databases with cross‑region failover and test RPO/RTO quarterly. If you rely on a managed database tied to one region, design an escape hatch. Traffic and identity that float Use global traffic managers/DNS to shift users automatically; keep identity (MFA/SSO) highly available and not hard‑wired to a single provider’s control plane. Run the playbook Document health checks, automated cutover, and comms templates. Then practice —tabletops and live failovers. Many services today recovered within hours, but only teams with rehearsed playbooks avoided user‑visible downtime. The bottom line Cloud concentration risk is real. Outages will happen—what matters is whether your constituents, students, and staff feel it. A pragmatic multi‑cloud stance limits the blast radius and keeps your mission‑critical services online when one provider has a bad day. Need a resilience check? Akins IT can help you prioritize which systems should be multi‑cloud, design the right level of redundancy, and validate your failover plan—without overspending. Let’s start with a quick, 30‑minute review of your most critical services and RPO/RTO targets. (No slideware, just actionable next steps.)
By Shawn Akins October 13, 2025
How a Zero-Day in GoAnywhere MFT Sparked a Ransomware Wave—and What Mid-Sized IT Leaders Must Do Now
By Shawn Akins October 13, 2025
The clock is ticking: Learn your options for Windows 11 migration, Extended Security Updates, and cost‑smart strategies before support ends.
More Posts