You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/anti-phishing-policies-about.md
+46-13Lines changed: 46 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.custom:
17
17
description: Admins can learn about the anti-phishing policies that are available in Exchange Online Protection (EOP) and Microsoft Defender for Office 365.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -33,12 +33,24 @@ Policies to configure anti-phishing protection settings are available in Microso
33
33
Examples of Microsoft Defender for Office 365 organizations include:
34
34
35
35
- Microsoft 365 Enterprise E5, Microsoft 365 Education A5, etc.
Anti-phishing policies in EOP and Defender for Office 365 are both available on the **Anti-phishing** page at <https://security.microsoft.com/antiphishing> in the Microsoft Defender portal. However, the key difference lies in the extra layers of protection provided by Defender for Office 365 licenses. While EOP offers essential anti-phishing protection features, Defender for Office 365 enhances these capabilities by including the following advanced protections:
43
+
44
+
-**Impersonation protection**:
45
+
- Protection against user, domain, and sender impersonation.
46
+
- Ability to define trusted senders and domains to reduce false positives.
47
+
-**Advanced phishing detection**:
48
+
- Customizable phishing thresholds to fine-tune detection.
49
+
-**AI and machine learning-based detection**:
50
+
- Improved detection of sophisticated phishing attacks through advanced algorithms.
51
+
-**Additional reporting and insights**:
52
+
- Advanced reporting features and visibility into phishing attempts beyond basic logging.
53
+
42
54
The high-level differences between anti-phishing policies in EOP and anti-phishing policies in Defender for Office 365 are described in the following table:
43
55
44
56
|Feature|Anti-phishing policies<br>in EOP|Anti-phishing policies<br>in Defender for Office 365|
@@ -100,6 +112,9 @@ The following policy settings are available in anti-phishing policies in EOP and
100
112
101
113
Spoofing is when the From address in an email message (the sender address that's shown in email clients) doesn't match the domain of the email source. For more information about spoofing, see [Anti-spoofing protection in Microsoft 365](anti-phishing-protection-spoofing-about.md).
102
114
115
+
> [!TIP]
116
+
> For a comparison of spoofing versus impersonation, see the [Spoofing vs. impersonation](#spoofing-vs-impersonation) section later in this article.
117
+
103
118
The following spoof settings are available in anti-phishing policies in EOP and Defender for Office 365:
104
119
105
120
-**Enable spoof intelligence**: Turns spoof intelligence on or off. We recommend that you leave it turned on.
@@ -201,33 +216,35 @@ Depending on the number of recipients in the message, the first contact safety t
201
216
:::image type="content" source="media/safety-tip-first-contact-multiple-recipients.png" alt-text="The First contact safety tip for messages with multiple recipients" lightbox="media/safety-tip-first-contact-multiple-recipients.png":::
202
217
203
218
> [!NOTE]
204
-
> If the message has multiple recipients, whether the tip is shown and to whom is based on a majority model. If the majority of recipients have never or don't often receive messages from the sender, then the affected recipients will receive the **Some people who received this message...** tip. If you're concerned that this behavior exposes the communication habits of one recipient to another, you should not enable the first contact safety tip and continue to use mail flow rules and the **X-MS-Exchange-EnableFirstContactSafetyTip** header instead.
219
+
> If the message has multiple recipients, whether the tip is shown and to whom is based on a majority model. If the majority of recipients have never or don't often receive messages from the sender, the affected recipients receive the **Some people who received this message...** tip. If you're concerned that this behavior exposes the communication habits of one recipient to another, you shouldn't enable the first contact safety tip and continue to use mail flow rules and the **X-MS-Exchange-EnableFirstContactSafetyTip** header instead.
205
220
>
206
-
> The first contact safety tip is not stamped in S/MIME signed messages.
221
+
> The first contact safety tip isn't stamped in S/MIME signed messages.
207
222
208
223
## Exclusive settings in anti-phishing policies in Microsoft Defender for Office 365
209
224
210
225
This section describes the policy settings that are only available in anti-phishing policies in Defender for Office 365.
211
226
212
227
> [!NOTE]
213
-
> The default anti-phishing policy in Defender for Office 365 provides [spoof protection](anti-phishing-policies-about.md#spoof-settings) and mailbox intelligence for all recipients. However, the other available [impersonation protection](#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) features and [advanced settings](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365)are not configured or enabled in the default policy. To enable all protection features, modify the default anti-phishing policy or create additional anti-phishing policies.
228
+
> The default anti-phishing policy in Defender for Office 365 provides [spoof protection](anti-phishing-policies-about.md#spoof-settings) and mailbox intelligence for all recipients. However, the other available [impersonation protection](#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) features and [advanced settings](anti-phishing-policies-about.md#advanced-phishing-thresholds-in-anti-phishing-policies-in-microsoft-defender-for-office-365)aren't configured or enabled in the default policy. To enable all protection features, modify the default anti-phishing policy or create other anti-phishing policies.
214
229
215
230
### Impersonation settings in anti-phishing policies in Microsoft Defender for Office 365
216
231
217
232
Impersonation is where the sender or the sender's email domain in a message looks similar to a real sender or domain:
218
233
219
-
- An example impersonation of the domain contoso.com is ćóntoso.com.
234
+
- An example impersonation of the domain `contoso.com` is `ćóntoso.com`.
220
235
- User impersonation is the combination of the user's display name and email address. For example, Valeria Barrios ([email protected]) might be impersonated as Valeria Barrios, but with a different email address.
221
236
222
237
> [!NOTE]
223
-
> Impersonation protection looks for domains that are similar. For example, if your domain is contoso.com, we check for different top-level domains (.com, .biz, etc.), but also domains that are even somewhat similar. For example, contosososo.com or contoabcdef.com might be seen as impersonation attempts of contoso.com.
238
+
> Impersonation protection looks for domains that are similar. For example, if your domain is contoso.com, we check for different top-level domains (.com, .biz, etc.), but also domains that are even somewhat similar. For example, `contosososo.com` or `contoabcdef.com` might be seen as impersonation attempts of `contoso.com`.
224
239
225
240
An impersonated domain might otherwise be considered legitimate (the domain is registered, email authentication DNS records are configured, etc.), except the intent of the domain is to deceive recipients.
226
241
227
242
The impersonation settings described in the following sections are available only in anti-phishing policies in Defender for Office 365.
228
243
229
244
> [!TIP]
230
245
> Details about detected impersonation attempts are available in the impersonation insight. For more information, see [Impersonation insight in Defender for Office 365](anti-phishing-mdo-impersonation-insight.md).
246
+
>
247
+
> For a comparison of impersonation versus spoofing, see the [Spoofing vs. impersonation](#spoofing-vs-impersonation) section later in this article.
231
248
232
249
#### User impersonation protection
233
250
@@ -238,9 +255,9 @@ You can use protected users to add internal and external sender email addresses
238
255
> [!NOTE]
239
256
> You can specify a maximum of 350 users for user impersonation protection in each anti-phishing policy.
240
257
>
241
-
> User impersonation protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt.
258
+
> User impersonation protection doesn't work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt.
242
259
>
243
-
> You might get the error "The email address already exists" if you try to add a user to user impersonation protection when that email address is already specified for user impersonation protection in another anti-phishing policy. This error occurs only in the Defender portal. You won't get the error if you use the corresponding _TargetedUsersToProtect_ parameter in the **New-AntiPhishPolicy** or **Set-AntiPhishPolicy** cmdlets in Exchange Online PowerShell.
260
+
> You might get the error "The email address already exists" if you try to add a user to user impersonation protection when that email address is already specified for user impersonation protection in another anti-phishing policy. This error occurs only in the Defender portal. You don't get the error if you use the corresponding _TargetedUsersToProtect_ parameter in the **New-AntiPhishPolicy** or **Set-AntiPhishPolicy** cmdlets in Exchange Online PowerShell.
244
261
245
262
By default, no sender email addresses are configured for impersonation protection, either in the default policy or in custom policies.
246
263
@@ -292,10 +309,10 @@ For detected domain impersonation attempts, the following actions are available:
292
309
293
310
Mailbox intelligence uses artificial intelligence (AI) to determine user email patterns with their frequent contacts.
294
311
295
-
For example, Gabriela Laureano ([email protected]) is the CEO of your company, so you add her as a protected sender in the **Enable users to protect** settings of the policy. But, some of the recipients in the policy communicate regularly with a vendor who is also named Gabriela Laureano ([email protected]). Because those recipients have a communication history with [email protected], mailbox intelligence doesn't identify messages from [email protected] as an impersonation attempt of [email protected] for those recipients.
312
+
For example, Gabriela Laureano (`[email protected]`) is the CEO of your company, so you add her as a protected sender in the **Enable users to protect** settings of the policy. But, some of the recipients in the policy communicate regularly with a vendor who is also named Gabriela Laureano (`[email protected]`). Because those recipients have a communication history with `[email protected]`, mailbox intelligence doesn't identify messages from `[email protected]` as an impersonation attempt of `[email protected]` for those recipients.
296
313
297
314
> [!NOTE]
298
-
> Mailbox intelligence protection does not work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt by mailbox intelligence.
315
+
> Mailbox intelligence protection doesn't work if the sender and recipient have previously communicated via email. If the sender and recipient have never communicated via email, the message can be identified as an impersonation attempt by mailbox intelligence.
299
316
300
317
Mailbox intelligence has two specific settings:
301
318
@@ -332,14 +349,14 @@ Impersonation safety tips appear to users when messages are identified as impers
332
349
> The email address `<email address>` includes unexpected letters or numbers. We recommend you don't interact with this message.
333
350
334
351
> [!NOTE]
335
-
> Safety tips are not stamped in the following messages:
352
+
> Safety tips aren't stamped in the following messages:
336
353
>
337
354
> - S/MIME signed messages.
338
355
> - Messages that are allowed by your organizational settings.
339
356
340
357
#### Trusted senders and domains
341
358
342
-
Trusted senders and domain are exceptions to the impersonation protection settings. Messages from the specified senders and sender domains are never classified as impersonation-based attacks by the policy. In other words, the action for protected senders, protected domains, or mailbox intelligence protection aren't applied to these trusted senders or sender domains. The maximum limit for these lists is 1024 entries.
359
+
Trusted senders and domain are exceptions to the impersonation protection settings. Messages from the specified senders and sender domains are never classified as impersonation-based attacks by the policy. In other words, the action for protected senders, protected domains, or mailbox intelligence protection aren't applied to these trusted senders or sender domains. The maximum limit for these lists is 1,024 entries.
343
360
344
361
> [!NOTE]
345
362
> Trusted domain entries don't include subdomains of the specified domain. You need to add an entry for each subdomain.
@@ -360,3 +377,19 @@ The following advanced phishing thresholds are only available in anti-phishing p
360
377
-**4 - Most aggressive**: Messages that are identified as phishing with a low, medium, or high degree of confidence are treated as if they were identified with a very high degree of confidence.
361
378
362
379
The chance of false positives (good messages marked as bad) increases as you increase this setting. For information about the recommended settings, see [anti-phishing policy settings in Microsoft Defender for Office 365](recommended-settings-for-eop-and-office365.md#anti-phishing-policy-settings-in-microsoft-defender-for-office-365).
380
+
381
+
### Spoofing vs. impersonation
382
+
383
+
Spoofing occurs when an attacker forges the sender's email address or domain to make it look like a trusted source. The attacker manipulates the sender's email address in the message header (also known as the From address, `5322.From` address, or P2 sender) to deceive the recipient.
384
+
385
+
- EOP includes basic spoofing detection via SPF, DKIM, and DMARC validation.
386
+
- Defender for Office 365 includes enhanced spoof intelligence for better detection and mitigation of sophisticated spoofing attacks.
387
+
388
+
Impersonation occurs when an attacker mimics a trusted user, domain, or brand to trick the recipient into believing the email is genuine. The attacker often uses subtle variations of the actual user or domain name (for example, `mithun@ćóntoso.com` instead of `[email protected]`).
389
+
390
+
- EOP doesn't include impersonation protection.
391
+
- Defender for Office 365 includes impersonation protection for users, domains, and brands, allowing admins to define trusted entities and thresholds for detection.
392
+
393
+
Impersonation can pass email authentication checks (SPF, DKIM, and DMARC) if the attacker created a lookalike domain and published valid DNS records. Despite passing authentication, the attacker is still impersonating a trusted domain or user to deceive recipients. This behavior highlights the importance of the advanced impersonation protection provided by Defender for Office 365.
394
+
395
+
To understand the order of processing for the email protection types and the priority order of policies, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
0 commit comments