In order for CanIPhish emails to function correctly, there are two sections that require additional rules to bypass Microsoft's Advanced Threat Protection system.
Note: As a precaution, we recommend waiting 1 hour after enabling these bypass policies to begin testing.
Step 1. Bypass ATP Attachments Scanning
- Visit your Microsoft 365 Admin Center and click "Exchange" to open the Exchange Admin Center page.
- Switch to classic view.
- Click rules, under mail flow.
- Create a new mail flow rule by clicking the plus symbol and selecting "Bypass spam filtering".
- Give the rule a name, e.g. "Bypass ATP Attachment Processing"
- Hit "More Options"
- Under "*Apply this rule if..." select "The Sender..." > "IP address is in any of these ranges or exactly matches..."
- Enter CanIPhish's IP (This can be found here), and hit "+"
- Under "*Do the following..." select "Modify the message properties..." > "set a message header" and enter the following:
- Set the message header:
- "X-MS-Exchange-Organization-SkipSafeAttachmentProcessing"
- to the value:
- 1
- Set the message header:
- Hit Save and then proceed to Step 2. Bypass ATP Attachments Scanning.
Step 2. Bypass ATP Safe Link Scanning
Note: The next rule to implement is dependant on whether you use Defender for Office 365 (ATP) Plan 1 or Plan 2.
- If you use Plan 1, please ONLY implement the ATP Link Bypass Rule.
- If you use Plan 2, please ONLY implement the ATP Link Rewriting Bypass Rule.
Do not implement BOTH rules below as they will interfere with each other.
If you do not know which Defender plan you have...
Simply follow the guide for Plan 2. If the Safe Links policy (on step 4) is not available, you have Plan 1.
Plan 1 - ATP Link Bypass Rule
To bypass ATP Link Processing, set up the following mail flow rule:
- Go to your MS Exchange/Office Admin Center and click Mail Flow > Rules
- Click the "+" and "Bypass spam filtering..."
- Give the rule a name, e.g. "Bypass ATP Link Processing"
- Hit "More Options"
- Under "*Apply this rule if..." select "The Sender..." > "IP address is in any of these ranges or exactly matches..."
- Enter CanIPhish's IP (This can be found here), and hit "+"
- Under "*Do the following..." select "Modify the message properties..." > "set a message header" and enter the following:
- Set the message header:
- "X-MS-Exchange-Organization-SkipSafeLinksProcessing"
- to the value:
- 1
- Set the message header:
- Hit Save
Plan 2 - ATP Link Rewriting Bypass Rule
- Visit your Microsoft 365 Admin Center and click "Security" to open the Office 365 Security & Compliance page.
- Click "Threat Management" > "Policy"
- Click Safe Links
- Either edit the existing ATP Link Policy and click "Edit policy" (as shown in the example above) or click the "Create" button to make a new one.
- Finally, in the "Do not rewrite the following URLs" section, add domains that CanIPhish use for phishing landing pages. Please see our Allowlisting - Quick Reference article for a full list of our landing page domains.
Note: Each domain must be added using the format https://[rootdomain]/* so if you are adding the root domain "authwebmail.com", you need to enter https://authwebmail.com/* - Select Save. And you're all done!
Comments
0 comments
Please sign in to leave a comment.