Blog Layout

Office 365's Anti-Phishing Solution

Akins IT • Feb 24, 2020

In Part 3 of the "Phishing Attacks and Recommended Solutions to Protect Your Organization" webinar we are going to be reviewing Office 36's Anti-Phishing solution– Office 365 ATP. We will be reviewing Platform Type, Requirements to Implement, Security Measures – Safe Attachments, Safe Links, Anti-Phishing, User Training, and some other considerations, including integration with other services.

Office 365 ATP is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection; and it includes features to safeguard your organization from harmful links in real time. It operates on the SaaS Platform or Software as a Service platform. This service requires Azure Active Directory, which is automatically included with Office 365 Exchange online mailboxes; and it can be configured for on-premise Exchange Server or other on-premise SMTP email solutions.

By heading to Office 365 Security & Compliance center > Threat management > Policy, you are presented with the O365 ATP Suite. We will be reviewing safe attachments first.

ATP SAFE ATTACHMENTS


ATP safe attachments provides zero-day protection to safeguard your messaging system by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a sandboxing environment, and then uses machine learning and analysis techniques to detect malicious intent.

You can configure this policy to

  • Monitor – which only tracks scan results.
  • Block – which blocks the whole email and malicious attachment all together.
  • Replace – which delivers the email but removes the malicious attachment.
  • Dynamic Deliver – which avoids message delays while still protecting recipients from malicious files. It does this by delivering the email without full attachments immediately and reattaches once the scan is complete. One element you don’t see in this configuration screen with Dynamic Deliver is the preview function which, for most PDFs and Office documents, can be viewed in a safe mode while ATP scanning is underway.

ATP SAFE LINKS


In the image below, you see Safe links which provides time-of-click verification of URLs, for example, in email messages and office suite files. Protection is ongoing and applies across your messaging and office environment including other Office Applications such as Word, Excel, PowerPoint. Safe links remain accessible and malicious links are dynamically blocked. For end users in your organization, you are able to control if scanning is complete before delivering messages to users or for real-time scanning.

ATP ANTI-PHISHING


With the Anti-Phishing policy, you have the ability to protect attempts to impersonate your users and organizational domain. It applies machine learning models and impersonation-detection algorithms to prevent phishing attacks. This actually works in conjunction with Safe Attachments and Safe Links, and therefore, multiple machine learning models, to analyze the message to determine if this policy applies to the message and the appropriate action is taken.

Anti-Phishing also enables Mailbox Intelligence, which monitors user’s email habits and personal contacts. It also identifies unusual activity like sending an abnormal amount of mail or data during unusual time periods, which could be a key indicator of a data exfiltration. When this Is triggered, you then can determine what will occur automatically by the Mail Intelligence > Action found here.

USER TRAINING


In terms of user training, Microsoft provides capabilities to train users in a more direct manner with Attack Simulator. In this simulator, you are able to run realistic attack scenarios in your organization that can help identify and find vulnerable users.

Some attacks you are able to create include: 

  • display name spear-phishing attacks
  • password-spray attacks
  • brute-force password attacks 

This feature is unique in that you are able to create a custom, reusable email template specific to your organization. You may be surprised to learn that Microsoft actually used this internally when developing Attack Simulator with the Xbox One X launch and an a “employee Pre-Order” offer. It was reported with a 60% click rate.

Similarly to other solutions, URL protect also provides an element of user training here with indicating when URLs were detected to be malicious.

OTHER CONSIDERATIONS


One of the key elements to Office 365 ATP is not only its focus on email security, but Microsoft also provides telemetry with other ATP solutions such as Defender ATP and Azure ATP in the Microsoft 365 Ecosystem. The true benefit here is the built in, not bolt on, approach that no other vendor is able to provide. Advanced Threat Protection works 24/7 and provides automated investigation and response.

One example of this would be Malware ZAP– if malware is weaponized after being delivered to users it will remove previously delivered messages and initiate an automated investigation to determine who else may be impacted or was delivered the same payload.

Another consideration with Office 365 ATP would be User Submission with the Report Mail add-in that is dynamically added to outlook for end users when enabled. This provides the ability for users to submit emails as junk or phishing - which with admin approval will allow automatic investigations to increase your cyber security overall.

ADVANTAGES


Some advantages you find with Office 365's Anti-Phishing solution is the ability to quickly enable and protect users, Automated investigation & Remediation, User Submissions. However, there can be improvements on the granularity of controls.


CONCLUSION


If you found the above information valuable and would like to see how Office 365 can enhance your email security in your organization, contact us.

CONTACT US TO LEARN MORE ABOUT THIS TOPIC OR TO SCHEDULE A CALL
By Shawn Akins 15 Apr, 2024
In the ever-evolving landscape of the digital workplace, Microsoft 365 Copilot stands as a beacon of innovation, guiding users through the complexities of their daily tasks with ease and efficiency. As we embrace this new era of work, understanding the capabilities and utilization of Copilot prompts becomes essential. What are Copilot Prompts? Copilot prompts are intelligent cues that empower users to harness the full potential of Microsoft 365. They are designed to understand the context of your work and provide suggestions that are not only relevant but also tailored to enhance productivity.  The Power of Contextual Understanding At the heart of Copilot prompts is the advanced AI that meticulously analyzes the content you're working on. Whether it's an email, a document, or a spreadsheet, Copilot grasps the essence of your task and offers prompts that propel you forward. Streamlining Collaboration Collaboration is the cornerstone of modern work, and Copilot prompts are the perfect ally. They facilitate seamless communication by suggesting replies in emails, aiding in the co-authoring of documents, and ensuring that your team stays on the same page. Enhancing Creativity Beyond the realms of productivity, Copilot prompts also serve as a muse for your creativity. They can assist in drafting compelling narratives, generating ideas, or even crafting personalized messages that resonate with your audience. Learning and Growing with Copilot As you interact with Copilot prompts, they learn and adapt to your unique style and preferences. This continuous learning process ensures that the assistance you receive is always improving, making your experience with Microsoft 365 increasingly intuitive. Conclusion Microsoft 365 Copilot prompts are more than just a feature; they are your partner in navigating the future of work. By understanding their functionality and integrating them into your workflow, you can unlock new levels of efficiency, collaboration, and creativity.
By Shawn Akins 15 Apr, 2024
Sky at Chandler Airpark
By Leislee Mamba 18 Jan, 2024
Akins IT assists Management Support in migrating their physical server infrastructure to new hardware and enhancing their backup process for improved disaster recovery.
More Posts
Share by: