In Microsoft 365, Exchange Online provides a solid signature-based basic email protection with Exchange Online Protection (EOP).
SharePoint Online and OneDrive for Business are also equipped with a signature-based basic antivirus protection in the standard package. But these solutions won’t save you from all threats: in order for malicious code to be detected, a signature must be present. However, some time may pass before a signature is available, during which these solutions cannot protect.
Here, Microsoft Defender for Office 365 provides additional protection, which ideally also detects malicious code that has never been in circulation before.
Microsoft Defender for Office 365 consists of several components:
However, link protection doesn’t only work for emails. The Office applications (Microsoft 365 Apps for Enterprise) also check the danger level of the link target when a link is clicked in a file (e.g., in a Word file) and warn you if necessary. The Microsoft Teams client behaves in the same way. In these solutions integrated into the applications, the original links aren’t replaced.
You can activate the two components for the entire organization or only parts of it, if necessary. A separate configuration of the two components for different user groups is also possible. The figure below shows how Defender for Office 365 proceeds upon the receipt of emails:
The detonation chamber is a virtual machine based on Azure. There, the attachment is executed and checked for suspicious activity. Such activities include accessing the system registry or requesting admin rights. Based on the behavior, the attachment is classified in terms of its danger level and then processed further depending on your configuration. One option would be to block malicious attachments, as shown here.
The analysis of file attachments in the detonation chamber takes some time; an average of two minutes, per Microsoft. Via the configuration, you can decide whether mails should be delivered accordingly later to the user’s mailbox or whether a function called dynamic delivery should be applied. If you use this function, users will receive their emails even before they are checked in the detonation chamber. However, the attachments are then initially replaced by placeholders.
If no threat is found in the detonation chamber, the placeholders will later be automatically replaced with the actual attachments. However, dynamic delivery only works if the user’s mailbox is also in Exchange Online and not in the on-premise Exchange organization (as would be possible in an Exchange hybrid configuration, for example). By the way, file attachment analysis is applied not only to emails sent to you from outside your organization, but also to emails sent by your users to each other.
Paraphrasing the links when receiving emails has a great advantage: link destinations are not checked once upon receipt, but later when the user actually clicks a link. Attackers like to publish harmless content behind the link targets first, and only when the mails are delivered and not detected by less powerful techniques do they put the actual malicious content online.
Of course, even with Microsoft Defender for Office 365, you won’t get a 100% detection rate for all possible threats. However, the level of protection is significantly higher compared to using EOP alone.
Due to the manageable cost of Microsoft Defender for Office 365, the protection feature is well worth considering. Microsoft Defender for Office 365 is already included in the Office/Microsoft 365 E5 license package (in Plan 2) and Microsoft 365 Business Premium (in Plan 1). However, you can also add it as a single license to other licenses. Microsoft Defender for Office 365 Plan 2 includes additional features for advanced analysis tools and attack simulation training for its own users.
The configuration for email attachment protection by Microsoft Defender for Office 365 can be found in the threat policies under Secure attachments.
There you create one or even multiple policies that are linked to different conditions, such as for different user groups or specific recipient domains.
The configuration of such a policy is not particularly complex:
Once you’ve created the new policy, it may take about 30 minutes for it to actually be applied. If you’ve configured multiple policies, you can also use the arrow icons to change the priority and thus the order in which they are to be applied.
If you want to use Microsoft Defender for Office 365 for files in SharePoint Online and OneDrive for Business as well, open the Secure Attachments policy in Threat Policies and click Global Settings. Turn on the Enable Defender for Office 365 for SharePoint, OneDrive and Microsoft Teams option.
The configuration for handling links in emails is similar to the configuration of attachments. You can find this in Threat Guidelines under Secure Links.
To create a new policy, follow these steps:
Activate the other options according to your requirements. The following options are available:
Even with such guidelines, it takes around 30 minutes for them to become active.
Malicious link protection in Office apps (Microsoft 365 Apps for Enterprise) and in the Microsoft Teams client is enabled separately from the email configuration. For this purpose, you want to open the Secure Links policy in Threat Policies and click Global Settings (see final figure). Then turn on the Use secure links in Office 365 apps option.
Editor’s note: This post has been adapted from a section of the book Hacking and Security:
The Comprehensive Guide to Penetration Testing and Cybersecurity by Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, and Matthias Wübbeling.