Kernel Data Recovery Blog

Techniques to Configure Office 365 Spam Filter

Read time: 10 minutes

Spam emails are unsolicited messages inundating users’ mailboxes, often arriving without their consent. Certain users experience a high influx of these messages, causing inconvenience as they have configure a Microsoft 365 account in Outlook and others. At times, these messages come bundled with viruses, malware, and other threats, wreaking havoc on the entire system and its applications. In essence, spam messages cause widespread trouble. Users universally aim to avoid such emails and protect their data from harm

Spam protection in Office 365

When employing Microsoft 365, it offers advanced mailbox protection against various spam emails. This is achieved through the use of Exchange Online Protection (EOP). In addition, users can also enable message tracing in Exchange Online. Returning to EOP, it serves as a cloud-based tool that effectively filters email messages, ensuring that spam, risks, threats, and malware are kept at a considerable distance from your mailbox. Configuring these filters can be lengthy and slightly complex. This article comprehensively covers Office 365 spam filters, detailing their configuration and removal process.

Techniques to identify spam on EOP

EOP operates on proprietary spam filtering technologies, developed using known spam patterns, threats, and user feedback. These techniques include the following:

Configuration of anti-spam policies

Before getting to the policies, you need to know about these two elements which each policy contains:

The EOP in Office 365 safeguards users against all kinds of spam messages by creating these anti-spam policies-

These policies are set in their Default mode but can be customized to make them stricter and more effective according to your organization’s preference and can also be made for a specific group, users, or domains.

Let us understand how to configure and modify them-
Configure inbound anti-spam policy
  1. Visit the Anti-spam policies page by clicking on his link–
    https://security.microsoft.com/antispam
  2. Click on + Create Policy. A dropdown menu will open and select Inbound. Now, this will require you to add information on various pages as you proceed ahead.
  3. In the Name your policy section, you need to enter a suitable title and an optional description. Click on Next.
  4. This is the Users, groups, and domains page where you need to add which ones to include or exclude. Select Next to continue.
  5. The Bulk email threshold & spam properties will allow you to set up the amount of Bulk email threshold. In addition, you can scroll down to adjust other spam and test mode properties.
  6. The Actions page is where you will decide what happens with all the junk messages. The default settings send spam and bulk to the junk email folder; also, it will send high confidence spam, phishing, and high confidence phishing go to the quarantine mailbox. The retention spam is for 15 days. All these default settings can be adjusted as per your requirements.
  7. In the Allow and Block list, you will be able to specify all the allowed and blocked senders and domains by just clicking on the given options. Click on Next to proceed.
  8. The Review page is the summary of all the settings to which you have applied. You can choose to either Edit or Create them.
  9. After all the steps have been completed properly, a confirmation message will appear. Click on Done to conclude.
Configure outbound anti-spam policy
Modify Connection filter policy
  1. Move to the Anti-spam policies page by clicking on the link. This time click on the Connection filter policy (Default).
    https://security.microsoft.com/antispam
  2. A new tab will appear. Click on Edit description to add a description for the policy.
  3. Mention the required description and select Save.
  4. Click on the Edit connection filter policy to customize the allowance and blockage of IP addresses.
  5. You can add a single IP or a range of IP addresses to the Allow or Block list. You can also choose to turn on the safe list. In the end, click Save, and the modifications will be saved.
Remove the applied anti-spam policies

In a situation where you want to delete a certain policy, you can easily do so by following the mentioned steps-

  1. Open the Anti-spam policies page with this link –
    https://security.microsoft.com/antispam
  2. Click on the applied anti-spam policy which you want to remove.
  3. Now, simply select Delete policy and close this window.
  4. When the warning message appears, click on Yes, and it will be deleted.
Why should we take a backup of Office 365 data?

As previously stated, spam messages pose significant threats, carrying viruses and other risks that can swiftly disrupt all of your organization’s vital data. To safeguard against such losses, regular backups are essential. Given the confidential nature of this data, prioritizing the reliability and security of the software you use is paramount. Particularly, choose software that safeguards against Email spoofing Office 365 by selectively saving essential emails and filtering out unwanted ones.

Kernel Export Office 365 to PST is a professional tool employs advanced algorithms to back up all mailboxes and store them in the specified location while preserving the entire data structure. Users can selectively save data by applying filters such as Folder, Date, and Item Type. The backup process is straightforward and user-friendly, suitable for both beginners and experienced users.

Conclusion

The surge in spam emails can be attributed to aggressive advertising campaigns and users’ extensive social media presence. However, Microsoft 365 effectively manages these emails to ensure clutter-free mailboxes. Leveraging Spam Intelligence, Connection, Content, and Outbound spam filtering technologies, it identifies email spoofing Office 365 messages. Default settings for Inbound anti-spam policy, Outbound anti-spam policy, and Connection filtering are in place, allowing customization based on desired strictness levels. To enhance data security against threats accompanying spam messages, users can utilize a professional backup utility, as elaborated in the detailed discussion above.