Configure Incoming Filtering with Exchange Online (Microsoft 365)
In order to configure incoming filtering for Exchange Online/Microsoft 365 follow these steps:
- Step 1 - Add the domain in SpamExperts
- Step 2 - Create a partner connector and rule in Exchange Online to accept filtered mail
- Step 3 - Change MX record for the domain to point to incoming servers
Step 1 - Add the domain in SpamExperts
Domains can be added in two ways:
To add the domain manually:
Step 2 - Create a partner connector and rule in Exchange Online to accept filtered mail
For further details about creating a partner connector and rule in either the Classic EAC or the New EAC in Microsoft 365, and to ensure you fully read the Microsoft documentation page.
Before beginning, ensure you are a member of the Organization Management role groups in the Microsoft 365 defender portal and Exchange Online.
Step 2:1 - Create the Partner Connector in the Exchange Admin Center
- Log in to the Exchange Admin Center with Organization Management admin credentials
- Click on Mail Flow > Connectors
- Click the + button to add a connector
- Choose the following:
- Connection From - Partner organization
- Connection To - Microsoft 365
- Click Next
- Give the connector a Name you will recognize in Step 2:2 #5 and optionally, provide a description
- Ensure the What do you want to do after connector is saved setting, Turn it On is selected
- Click Next
- Choose By verifying that the IP address of the sending server matches one of the following IP addresses, which belong to your partner organization
- Add the following SpamExperts delivery IP ranges one at a time and click the + symbol:
130.117.251.9/25
185.201.16.0/24
185.201.17.0/24
185.201.18.0/24
185.201.19.0/24
- Add the following SpamExperts delivery IP ranges one at a time and click the + symbol:
- Click Next
- Ensure that Reject email messages if they aren't sent over TLS is ticked and click Next
- Verify the settings and click Create Connector
- Click Done
Step 2:2 - Create the Rule in the Microsoft 365 Defender Security Portal
- Login to the Microsoft 365 defender security portal with Organization Management admin credentials
- Under the Email & Collaboration section of the left-hand menu, select Policies & Rules
- Click Threat Policies
- Scroll to the Rules section and select Enhanced Filtering
- Select the Connector Name as created in step 2:1
- Select Skip these IP addresses and input the following:
185.201.16.0/22
130.117.251.9/25
Once added, this IP address may update to
130.117.251.0/25
. This is acceptable behavior as both IP's fall under the same subnet.
You must click the IP address that matches what is typed in order for it to be added successfully:
- Under Apply to these users, select Apply to Entire Organization
- Click Save
Failing to setup the partner connector correctly will cause messages to be incorrectly rejected by the Microsoft systems.
Step 3 - Change MX record for the domain to point to incoming servers
Once you have verified configuration as above, update the domain's MX records to route mail through SpamExperts. For full details on MX records (including region specific MX records), see MX Records.
Step 4 - Disable Safe Links Processing to permit Email Scout Reports and Protection Reports
When using SpamExperts and Microsoft 365, Microsoft Advanced Threat Protection scans all links within messages, including the links within Email Scout Reports and Protection Reports and triggers the links to release or release and train messages.
Disable this by:
- Log in to the Exchange Admin Center with Organization Management admin credentials
- Go to Mail flow > Rules
- Select Add a rule
- Select Create a new rule
- In the Set rule conditions dialogue box, name the rule Mail Assure ATP ESR bypass or a similar descriptive name of your choice
- Select the conditions and actions for this rule:
- For Apply this rule if…, select the condition:
- Select The message headers
- Select Includes any of these words
- In the first enter text field enter List-Unsubscribe
- In the second enter text field enter lazaretto
- In Do the following…
- Select Modify the message properties
- Select Set a message header
- In the first enter text field enter X-MS-Exchange-Organization-SkipSafeLinksProcessing
- In the second enter text field enter 1
- Leave the Except if fields blank
- Select Next
- For Apply this rule if…, select the condition:
- Set the rule settings as appropriate for your environment
- Select Next
- Review the summary of the settings, and select Next
Once this rule is created, Microsoft will no longer scan (and trigger) the links within Email Scout Reports.