Office 365 offers a variety of protection against phishing attacks by default and also through additional offerings such as ATP anti-phishing As an Office 365 administrator, use these resources to learn how to use Office 365 to protect against impersonation-based phishing attacks and to help you educate your end users so that they don’t fall prey to malicious phishing attacks. Do subscribe my channel for future videos. Your feedback is appreciated.
Exchange 2013 Mailbox Server comes with Anti-spam agents , either you install it at the time of installing the mailbox server or you can install them later using the script which I will show in this post.
Typically, you would enable the anti-spam agents on a mailbox server if your organization doesn’t have an Edge Transport server, or doesn’t do any prior anti-spam filtering before accepting incoming messages. So If you already have a anti-spam on the perimeter then you want to avoid multiple layer of security and if not then you will have to make use of anti-spam feature available in Exchange 2013.
Installing anti-spam feature from the built-in script
Transport Agents after installing the Anti-spam agent
Now here we need to set the IP Blocklist Provider , such as Spamhaus and Spamcop and many other from the internet. These are available online scan engine which are realtime and Exchange can be configured to use them.
Now we are going to configure the Sender ID Configuration. Here is the default setting and later we will configure as we need to
You can leave the Spoofed Domain Action to “StampStatus” if you do not want to Delete and want to do some troubleshooting
Now finally I’ve configured the quarantined mailbox for the content filtering
The cmdlet I’ve used
Restart MSExchange Transport SErvice
Add IP BlockList Provider
Set SenderID Config
Set Content Filter