Integrate with Microsoft 365
If you are integrating with Microsoft 365, complete the following steps in the Microsoft 365 Exchange Admin Center.
-
Add a connector to accept inbound email from Secure Email Threat Defense. To do so, navigate to the Microsoft 365 Exchange Admin Center https://admin.exchange.microsoft.com/#/connectors, and add a connector for inbound traffic from Secure Email Threat Defense by using the following settings in the Add a connector wizard:
-
Connection from: Partner organization.
-
Connection to: Office 365.
-
Connector name: Inbound from Cisco Secure Email Threat Defense (select the Turn it on check box).
-
Identify partner organization: By verifying that the IP address of the sending server matches one of the following IP addresses, which belong to your partner organization. Add the IP addresses for your region here.
-
Security restrictions: Reject email messages if they aren’t sent over TLS.
-
-
In Microsoft 365 Exchange Admin center https://admin.exchange.microsoft.com/#/transportrules, create a Transport Mail Rule to bypass spam filtering for inbound mail from Secure Email Threat Defense:
-
Name: Bypass Spam Filter for SMTP Source.
-
Apply this rule if: The sender IP addresses is in any of the following ranges. Add the IP addresses for your mail server here.
-
Do the following: Modify the message properties: Set the spam confidence level (SCL) to -1.
-
Rule Mode: Enforce
-
Severity: Low
-
Stop processing more rules: selected
-
Match sender address in message: Header or Envelope
-
-
In Microsoft 365 Exchange Admin center, create a Mail Rule to Send Threats to MS Quarantine:
-
Name: Quarantine Rule.
-
Apply this rule if: The message headers matches these text patterns: X-CSE-Quarantine = true.
-
Do the following: Redirect the message to: hosted quarantine.
-
Rule Mode: Enforce
-
Severity: Medium
-
Stop processing more rules: selected
-
Match sender address in message: Header
-
-
In Microsoft 365 Exchange Admin center, create a Mail Rule to send Spam and Graymail to the Junk folder:
-
Name: Junk Rule.
-
Apply this rule if: The message headers matches these text patterns: X-CSE-Junk = true.
-
Do the following: Modify the message properties: Set the spam confidence level (SCL) to 9.
-
Rule Mode: Enforce
-
Severity: High
-
Stop processing more rules: selected
-
Match sender address in message: Header
-