Migrate to Microsoft Defender for Office 365 - Phase 2: Setup
Phase 1: Prepare |
Phase 2: Set up |
Phase 3: Onboard |
---|---|---|
You are here! |
Welcome to Phase 2: Setup of your migration to Microsoft Defender for Office 365! This migration phase includes the following steps:
- Create distribution groups for pilot users
- Configure user reported message settings
- Maintain or create the SCL=-1 mail flow rule
- Configure Enhanced Filtering for Connectors
- Create pilot protection policies
Step 1: Create distribution groups for pilot users
Distribution groups are required in Microsoft 365 for the following aspects of your migration:
Exceptions for the SCL=-1 mail flow rule: You want pilot users to get the full effect of Defender for Office 365 protection, so you need Defender for Office 365 to scan their incoming messages. You get this result by defining your pilot users in the appropriate distribution groups in Microsoft 365, and configuring these groups as exceptions to the SCL=-1 mail flow rule.
As we described in Onboard Step 2: (Optional) Exempt pilot users from filtering by your existing protection service, you should consider exempting these same pilot users from scanning by your existing protection service. Eliminating the possibility of filtering by your existing protection service and relying exclusively on Defender for Office 365 is the best and closest representation of what's going to happen after your migration is complete.
Testing of specific Defender for Office 365 protection features: Even for the pilot users, you don't want to turn on everything at once. Using a staged approach for the protection features that are in effect for your pilot users makes troubleshooting and adjusting easier. With this approach in mind, we recommend the following distribution groups:
- A Safe Attachments pilot group: For example, MDOPilot_SafeAttachments
- A Safe Links pilot group: For example, MDOPilot_SafeLinks
- A pilot group for Standard anti-spam and anti-phishing policy settings: For example, MDOPilot_SpamPhish_Standard
- A pilot group for Strict anti-spam and anti-phishing policy settings: For example, MDOPilot_SpamPhish_Strict
For clarity, we use these specific group names throughout this article, but you're free to use your own naming convention.
When you're ready to begin testing, add these groups as exceptions to the SCL=-1 mail flow rule. As you create policies for the various protection features in Defender for Office 365, use these groups as conditions that define who the policy applies to.
Notes:
The terms Standard and Strict come from our recommended security settings, which are also used in preset security policies. Ideally, we would tell you to define your pilot users in the Standard and Strict preset security policies, but we can't do that. Why? Because you can't customize the settings in preset security policies (in particular, actions that are taken on messages). During your migration testing, you want to see what Defender for Office 365 would do to messages, verify that's the result you want, and possibly adjust the policy configurations to allow or prevent those results.
So, instead of using preset security policies, you're going to manually create custom policies with settings that are similar to, but in some cases are different than, the settings of Standard and Strict preset security policies.
If you want to experiment with settings that significantly differ from our Standard or Strict recommended values, you should consider creating and using additional and specific distribution groups for the pilot users in those scenarios. You can use the Configuration Analyzer to see how secure your settings are. For instructions, see Configuration analyzer for protection policies in EOP and Microsoft Defender for Office 365.
For most organizations, the best approach is to start with policies that closely align with our recommended Standard settings. After as much observation and feedback as you're able to do in your available time frame, you can move to more aggressive settings later. Impersonation protection and delivery to the Junk Email folder vs. delivery to quarantine might require customization.
If you use customized policies, just make sure that they're applied before the policies that contain our recommended settings for the migration. If a user is identified in multiple policies of the same type (for example, anti-phishing), only one policy of that type is applied to the user (based on the priority value of the policy). For more information, see Order and precedence of email protection.
Step 2: Configure user reported message settings
The ability for users to report false positives or false negatives from Defender for Office 365 is an important part of the migration.
You can specify an Exchange Online mailbox to receive messages that users report as malicious or not malicious. For instructions, see User reported settings. This mailbox can receive copies of messages that your users submitted to Microsoft, or the mailbox can intercept messages without reporting them to Microsoft (your security team can manually analyze and submit the messages themselves). However, the interception approach doesn't allow the service to automatically tune and learn.
You should also confirm that all users in the pilot have a supported way to report messages that received an incorrect verdict from Defender for Office 365. These options include:
- The built-in Report button in Outlook
- The Report Message and Report Phishing add-ins
- Supported third party reporting tools as described here.
Don't underestimate the importance of this step. Data from user reported messages will give you the feedback loop that you need to verify a good, consistent end-user experience before and after the migration. This feedback helps you to make informed policy configuration decisions, and provide data-backed reports to management that the migration went smoothly.
Instead of relying on data that's based on the experience of the entire organization, more than one migration has resulted in emotional speculation based on a single negative user experience. Furthermore, if you've been running phishing simulations, you can use feedback from your users to inform you when they see something risky that might require investigation.
Step 3: Maintain or create the SCL=-1 mail flow rule
Because your inbound email is routed through another protection service that sits in front of Microsoft 365, it's likely that you already have a mail flow rule (also known as a transport rule) in Exchange Online that sets the spam confidence level (SCL) of all incoming mail to the value -1 (bypass spam filtering). Most third-party protection services encourage this SCL=-1 mail flow rule for Microsoft 365 customers who want to use their services.
If you're using some other mechanism to override the Microsoft filtering stack (for example, an IP allow list) we recommend that you switch to using an SCL=-1 mail flow rule as long as all inbound internet mail into Microsoft 365 comes from the third-party protection service (no mail flows directly from the internet into Microsoft 365).
The SCL=-1 mail flow rule is important during the migration for the following reasons:
You can use Threat Explorer (Explorer) to see which features in the Microsoft stack would have acted on messages without affecting the results from your existing protection service.
You can gradually adjust who is protected by the Microsoft 365 filtering stack by configuring exceptions to the SCL=-1 mail flow rule. The exceptions are the members of the pilot distribution groups that we recommend later in this article.
Before or during the cutover of your MX record to Microsoft 365, you disable this rule to turn on the full protection of the Microsoft 365 protection stack for all recipients in your organization.
For more information, see Use mail flow rules to set the spam confidence level (SCL) in messages in Exchange Online.
Notes:
If you plan to allow internet mail to flow through your existing protection service and directly into Microsoft 365 at the same time, you need restrict the SCL=-1 mail flow rule (mail that bypasses spam filtering) to mail that's gone through your existing protection service only. You don't want unfiltered internet mail landing in user mailboxes in Microsoft 365.
To correctly identify mail that's already been scanned by your existing protection service, you can add a condition to the SCL=-1 mail flow rule. For example:
- For cloud-based protection services: You can use a header and header value that's unique to your organization. Messages that have the header aren't scanned by Microsoft 365. Messages without the header are scanned by Microsoft 365
- For on-premises protection services or devices: You can use source IP addresses. Messages from the source IP addresses aren't scanned by Microsoft 365. Messages that aren't from the source IP addresses are scanned by Microsoft 365.
Don't rely exclusively on MX records to control whether mail gets filtered. Senders can easily ignore the MX record and send email directly into Microsoft 365.
Step 4: Configure Enhanced Filtering for Connectors
The first thing to do is configure Enhanced Filtering for Connectors (also known as skip listing) on the connector that's used for mail flow from your existing protection service into Microsoft 365. You can use the Inbound messages report to help identify the connector.
Enhanced Filtering for Connectors is required by Defender for Office 365 to see where internet messages actually came from. Enhanced Filtering for Connectors greatly improves the accuracy of the Microsoft filtering stack (especially spoof intelligence, and post-breach capabilities in Threat Explorer and Automated Investigation & Response (AIR).
To correctly enable Enhanced Filtering for Connectors, you need to add the public IP addresses of **all** third-party services and/or on-premises email system hosts that route inbound mail to Microsoft 365.
To confirm that Enhanced Filtering for Connectors is working, verify that incoming messages contain one or both of the following headers:
X-MS-Exchange-SkipListedInternetSender
X-MS-Exchange-ExternalOriginalInternetSender
Step 5: Create pilot protection policies
By creating production policies, even if they aren't applied to all users, you can test post-breach features like Threat Explorer and test integrating Defender for Office 365 into your security response team's processes.
Important
Policies can be scoped to users, groups, or domains. We do not recommend mixing all three in one policy, as only users that match all three will fall inside the scope of the policy. For pilot policies, we recommend using groups or users. For production policies, we recommend using domains. It's extremely important to understand that only the user's primary email domain determines if the user falls inside the scope of the policy. So, if you switch the MX record for a user's secondary domain, make sure that their primary domain is also covered by a policy.
Create pilot Safe Attachments policies
Safe Attachments is the easiest Defender for Office 365 feature to enable and test before you switch your MX record. Safe Attachments has the following benefits:
- Minimal configuration.
- Extremely low chance of false positives.
- Similar behavior to anti-malware protection, which is always on and not affected by the SCL=-1 mail flow rule.
For the recommended settings, see Recommended Safe Attachments policy settings. The Standard and Strict recommendations are the same. To create the policy, see Set up Safe Attachments policies. Be sure to use the group MDOPilot_SafeAttachments as the condition of the policy (who the policy applies to).
Note
The Built-in protection preset security policy gives Safe Attachments protection to all recipients that aren't defined in any Safe Attachments policies. For more information, see Preset security policies in EOP and Microsoft Defender for Office 365.
Create pilot Safe Links policies
Note
We do not support wrapping or rewriting already wrapped or rewritten links. If your current protection service already wraps or rewrites links in email messages, you need to turn off this feature for your pilot users. One way to ensure this doesn't happen is to exclude the URL domain of the other service in the Safe Links policy.
Chances for false positives in Safe Links are also pretty low, but you should consider testing the feature on a smaller number of pilot users than Safe Attachments. Because the feature impacts the user experience, you should consider a plan to educate users.
For the recommended settings, see Safe Links policy settings. The Standard and Strict recommendations are the same. To create the policy, see Set up Safe Links policies. Be sure to use the group MDOPilot_SafeLinks as the condition of the policy (who the policy applies to).
Note
The Built-in protection preset security policy gives Safe Links protection to all recipients that aren't defined in any Safe Links policies. For more information, see Preset security policies in EOP and Microsoft Defender for Office 365.
Create pilot anti-spam policies
Create two anti-spam policies for pilot users:
- A policy that uses the Standard settings. Use the group MDOPilot_SpamPhish_Standard as the condition of the policy (who the policy applies to).
- A policy that uses the Strict settings. Use the group MDOPilot_SpamPhish_Strict as the condition of the policy (who the policy applies to). This policy should have a higher priority (lower number) than the policy with the Standard settings.
For the recommended Standard and Strict settings, see Recommended anti-spam policy settings. To create the policies, see Configure anti-spam policies.
Create pilot anti-phishing policies
Create two anti-phishing policies for pilot users:
- A policy that uses the Standard settings, except for impersonation detection actions as described below. Use the group MDOPilot_SpamPhish_Standard as the condition of the policy (who the policy applies to).
- A policy that uses the Strict settings, except for impersonation detection actions as described below. Use the group MDOPilot_SpamPhish_Strict as the condition of the policy (who the policy applies to). This policy should have a higher priority (lower number) than the policy with the Standard settings.
For spoof detections, the recommended Standard action is Move the message to the recipients' Junk Email folders, and the recommended Strict action is Quarantine the message. Use the spoof intelligence insight to observe the results. Overrides are explained in the next section. For more information, see Spoof intelligence insight in EOP.
For impersonation detections, ignore the recommended Standard and Strict actions for the pilot policies. Instead, use the value Don't apply any action for the following settings:
- If a message is detected as user impersonation
- If message is detected as impersonated domain
- If mailbox intelligence detects an impersonated user
Use the impersonation insight to observe the results. For more information, see Impersonation insight in Defender for Office 365.
Tune spoofing protection (adjust allows and blocks) and turn on each impersonation protection action to quarantine or move the messages to the Junk Email folder (based on the Standard or Strict recommendations). Observe the results and adjust their settings as necessary.
For more information, see the following articles:
- Anti-spoofing protection
- Impersonation settings in anti-phishing policies
- Configure anti-phishing policies in Defender for Office 365.
Next step
Congratulations! You've completed the Setup phase of your migration to Microsoft Defender for Office 365!
- Proceed to Phase 3: Onboard.