Note
This description is based on the status of the Microsoft 365 Portal in June 2023. Changes to the user interface on the part of Microsoft are possible at any time and must be taken into account accordingly in the implementation.
All information without warranty.
Configuration for phishing simulations: Bypass junk filter
New article: 06.2023
notemptyThis article refers to a Resellerpreview
Whitelisting
To ensure that the simulated phishing emails of the Awareness PLUS training are not blocked by the Microsoft mail server or Microsoft Defender, whitelisting must be configured at various points.
Bypass junk filter
Another rule is needed to bypass the junk filter
Fig.3
Menu Exchange message-trace
Fig.4
Expand menu Mail flow and select submenu rules
Fig.5
- Click on Add a rule
- Click on Create New Rule in the drop-down menu
Fig.6
- Assign a unique name for the rule (here i.g.: Bypass Junk Filter by IP Address )
- Select the sender for Apply this rule if
- Select IP adress is in any of these ranges or exactly matches
- Click on Enter words. For that see next figure
Fig.8
- Select Modify the message properties in Do the following
- Select set a message header
- Enter the header message (3) and the value (4) by clicking on Enter text
Fig.9
Enter the following values:
- For message header (1): x-Forefront-Antispam-Report
- For Value (2): SFV:SKI;
- Then click on Next
Fig.10
- For Rule mode Enforce is selected
- At Severity Not specified is sufficient
- At will can be set between which times this rule should be active
Fig.11
Check if the settings are correct and then click Finish