notempty
This article includes descriptions of third-party software and is based on the status at the time this page was created.
Changes to the user interface on the part of the manufacturer are possible at any time and must be taken into account accordingly in the implementation.
All information without warranty.
Last adaption: 03.2025
- Routen werden mittels TXT-Record in der Domain authentifiziert und stehen unmittelbar zur Verfügung
- Aktive Routen werden jetzt mit einer aktivierten Schaltfläche angezeigt
Introduction
An email sent to an Microsoft office 365 mailbox is first received by the upstream Securepoint Mail Security.
Securepoint Mail Security scans the email for spam and malware. If non is detected, Mail Security forwards the email to the Office 365 mailbox.
The following setup steps are required:
- Set up an inbound and outbound route in Mail Security
- Configure Office 365, assign domain, set up receive and send connectors
- Adjust the DNS entries
Find domains
Under admin.microsoft.com in Settings → Domains, the existing domains are displayed resp. new ones can be created
- Select or create the desired Microsoft 365 domain, for example ttt-point.de, which should be verified by Securepoint Mail Security
Set up Mail Security
Domäne hinzufügen
| Caption | Value | Description | ![]() |
|---|---|---|---|
| Domain | ttt-point.de | Domain for delivering emails to the Microsoft 365 mailbox | |
| Kopiert den Wert des TXT-Eintrags in die Zwischenablage | |||
| |||
Create inbound route | |||
| In the second step, an incoming route is created. This can be done under using the button. | |||
| Activated | Indicates whether the route is being used | ![]() | |
| Create new set Default | Create a new set for a route | ||
| Description | TTT-Point Inbound | Name of the set Required field | |
| Route description | Description of the inbound route | ||
| Domain | ttt-point.de | Domain for delivering emails to the Microsoft 365 mailbox | |
| Target protocol | ESMTP_TLSOPT | The default target protocol is usually sufficient | |
| Target server | mx-ttt-point-de.mail.protection.outlook.com | Target server, i.e., the mail server of the Microsoft 365 mailbox Exchange Online: If possible, the domain should be entered here, as its IP address could be changed by Microsoft, and this route might stop working. The target server can be found in Office365 Portal:
| |
| From the displayed options Greylisting and Enable SPF check confirm the selection. | |||
| This inbound route is created via the button The route is available immediately, but can still be configured. (see Edit inbound routes). The configuration can be verified by sending a test email. If everything is set up correctly, this email should appear under with the status delivered | |||
Create outbound route | |||
| Next, an outbound route is created. This is possible under using the button | |||
| Caption | Value | Description | ![]() |
| Activated | Indicates whether the route is being used | ||
| Create new set Default | Create a new set for a route | ||
| Description | TTT-Point Outbound | Name of the set | |
| Route description | Description of the inbound route | ||
| Relay | Mail Security acts as the smarthost for outgoing emails in the outbound route | ||
| Relay | mx.ttt-point.de | Relay domain for the smarthost The complete relay address that needs to be entered in Office365 can be displayed later when the complete route is edited. In this case, for example, it is: mx-ttt-point-de.relay.mymailwall.com Required field | |
| Check sender mailbox | Outgoing user validation (This asks the receiving mail server whether the sender exisits) | ||
| Destination type | MX | An email server (MX) receives the email Required field | |
| Target protocol | ESMTP_TLSOPT | The default target protocol is usually sufficient Required field | |
| From the displayed options confirm Allow bounce | |||
| This inbound route is created via the button Once the route is visible, it can still be configured (see Edit outbound route). | |||
Set up Microsoft 365
Configure the receive connector
A receive connector must be configured so that the Microsoft Exchange Online can receive emails from Mail Security.
- Log in at https://admin.exchange.microsoft.com admin.exchange.microsoft.com], under Mail flow→ Connectors click the Add connector button
- New Connector: Select Connection from Partner organization, Connection to will then be filled in automatically
- Name: Choose an appropriate name and optionally a description
- Sent email will be authenticated: select the second option and enter the IP address from the welcome email, then click on to ensure the IP address is added the welcome email is received after ordering mail security
- Security restrictions: The desired security restrictions can be configured
- Verify connector: After succesfully testing the configuration, the receive connector is ready to use

- Log in at admin.exchange.microsoft.com
- Under Mail flow → Connectors click the Add connector button
- New connector select Connection from Partner organization
Configure send connector
A send connector must be configured so that Microsoft Exchange can send emails to Securepoint Mail Security
- Log in at admin.exchange.microsoft.com, under Mail flow → Connectors, click the Add connector button
- New Connector: Select Connection from Office 365, Connection with Partnerorganisation
- name: Choose an appropriate name and optionally add an description
- Usage of the connector: Only, when I have set up a transport rule that redirects messages to this connector
- Routing: route email through these smarthosts and use the smarthost from the outbound route in Mail Security under the Relay section
- Security restrictions: Configure as desired
- Validation email: Email address for verification
- Verify connector: After succesfully testing the configuration, the send connector is ready for use
Afterward, a rule must be added to ensure this send connector can be used.

- Log in at admin.exchange.microsoft.com
- Under Mail flow→ Connectors click the Add connector button
- New connector Select Connection from Office 365


- This always follows the pattern meine-domain-de.relay.mymailwall.com Vorlage:Expand2The specific relay domain can be viewed under Mailsecurity / Outgoing / Customer / Tab Routes / Edit route / Relay
Add rule
After the send connector has been set up, a rule must be created in Microsoft Office 365 to ensure that this connector can be used.
- Log in at admin.exchange.microsoft.com, under Mail flow → Rules click the Add rule button
- In the burger menu, select Create a new rule
- Set the rule conditions:
- Choose an appropriate name
- Apply this rule, if: the recipient is external/internal outside the organization
- Proceed as followed: Redirect message to the following connector and select the previously created connector there
- Set rule settings: Adjust the conditions of this rule as desired
- Review and complete: The configuration can be reviewed again and corrected if necessary
- Use the Finish button to create this rule
To minimize downtime and avoid potential errors, the rule should only be activated after the MX record has already been switched to
Mail Security!
- Log in at admin.exchange.microsoft.com, under Mail flow → Rules
Click the Add rule button
- In the burger menu, select Crate a new rule

Adjust DNS entries
- The MX record must be set to mx.mymailwall.com
- the SPF record must be updated to include mymailwall.com
mx.ttt-point.de mail is handled by 10 mx.mymailwall.com.
Once the DNS entries have been succesfully redirected, the previously created rule can be activated




















