Skip to content

Commit 1a56e3e

Browse files
authored
Update advanced-delivery-policy-configure.md
Clarifying this part as customers assume complex routing as MX->3rd party-> EOP and assume advance delivery is not supported. Where as what we really mean here is the case where MX->EOP->3rd party/ onpremise -> EOP.
1 parent bf2e749 commit 1a56e3e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-office-365/advanced-delivery-policy-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ There must be a match on at least one **Domain** and one **Sending IP**, but no
128128
If your MX record doesn't point to Microsoft 365, the IP address in the `Authentication-results` header must match the IP address in the advanced delivery policy. If the IP addresses don't match, you might need to configure [Enhanced Filtering for Connectors](/Exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so the correct IP address is detected.
129129

130130
> [!NOTE]
131-
> Enhanced Filtering for Connectors doesn't work for third-party phishing simulations in complex email routing scenarios (for example, email from the internet is routed to Microsoft 365, then to an on-premises environment or third-party security service, and then back to Microsoft 365). EOP can't identify the true IP address of the message source. Don't try to work around this limitation by adding the IP addresses of the on-premises or third-party sending infrastructure to the third-party phishing simulation. Doing so effectively bypasses spam filtering for any internet sender who impersonates the domain that's specified in the third-party phishing simulation.
131+
> Enhanced Filtering for Connectors doesn't work for third-party phishing simulations in email routing scenarios which involve emails coming to Exchange online twice (for example, email from the internet is routed to Microsoft 365, then to an on-premises environment or third-party security service, and then back to Microsoft 365). EOP can't identify the true IP address of the message source. Don't try to work around this limitation by adding the IP addresses of the on-premises or third-party sending infrastructure to the third-party phishing simulation. Doing so effectively bypasses spam filtering for any internet sender who impersonates the domain that's specified in the third-party phishing simulation. Note that email routing scenario where MX points to 3rd party and then routed to exchange online is still supported if enhanced filtering for connectors is setup.
132132
>
133133
> Currently, the advanced delivery policy for third-party phishing simulations doesn't support simulations within the same organization (`DIR:INT`), especially when email is routed through an Exchange Server gateway before Microsoft 365 in Hybrid mail flow. To work around this issue, you have the following options:
134134
>

0 commit comments

Comments
 (0)