Reflexion will be End-of-life on March 31,2023. See Sophos Reflexion EoL FAQs to learn more.
I started to setup Phish Threat for my company but I've trouble with Office 365 that they are opening the E-Mails and links so they distort the reports.
I completely copied the settings of this user community.sophos.com/.../501783 but E-Mails were still blocked, Defender active and so on.
After that I created my own rules and everything works but it seems as if Office365 is opening the E-Mails and links as soon as they come in.
Any solution or idea what I did wrong?
PS: My company is located in germany.
Alright. So it seems to work now with a mix of "Phishing Simulation" and a few rules and in the first few tests no E-Mails were opened by Office 365.
i am trying to Setup Phish Threat on an Office365 Tenant aswell.
As far as i can tell, none of the Sophos described methods did actually unblock the Defender ATP Safe Links Feature.
If i setup the Rules in this link:
i do receive the mails but the Safe Links Defender Features blocks every click from the user.
I tried setup this rules described from Sophos:
But no luck.
@Sophos Why is there not a single document on how to actually setup this up with Office 365 and enabled Defender. This is a common problem in the forum, but Sophos... well
I am looking for the "minimal" needed configuration and do not want to blow IPs and URLs in every Safety Dialog i see.
Do you or anyone have working good solution?
We have the exact same problem where the phishing emails are still getting the safelinks 'malicious' warning. Sophos analyzed the headers of the phishing emails and they said that it was not attaching the X-MS-Exchange-Organization-SkipSafeLinksProcessing lines. They told me to call Microsoft. I am not very pleased with how they diverted the problem to Microsoft since it seems as though we are not the only organization having this issue. The only workaround was to disable safe links completely (wait 24-48hrs to propagate) and start the campaign. NOT ideal at all but many of our clients are on a deadline to get their cybersecurity insurance and they are required to have a campaign ran.
Yeah i am still waiting.
As we can see - This thread is soon as 10k views and Sophos reacts as always on these problems We are in contact with our channel partner who did not get any more information that this.
In my opinion it is time that Sophos Phish Threat specialist tell us exactly what to do in one simple to follow knowledgebase article and not linking a lot of microsoft pages and other articles, which does not help at all.
we have another Spamfilter in front of Office365. Means the Sender IP-Adresses of the Attack E-Mails aren't the one from Sophos. I had to edit them in the rules and since then it seems to work perfectly. I edited the IP-Adresses for the Phishing Simulation as well as the two rules for the attachments and url links.
I hope that helps you.
thank you for your insight. But in our case the mx records are directed directly to Exchange Online / Office 365 / Whatever they call it right now :)
Michael et al, we have been working to figure out exactly why it works in some environments and doesn't work in others. There is no technical reason that if you follow the documented procedure that it should not work. I can tell you I personally have two instances in M365, one over a year old, and one a month old and following the configuration it does work for me. Then again I've worked directly with customers where the exact same configuration does not work. We have had one partner who was successful with getting M365 to turn of Secure by Default after providing business justification and whether I believe it or not Microsoft says if the MX record doesn't point to outlook.protection.com that Secure by Default is not enabled. We continue to troubleshoot and work to come up with a solution.
MFR (Mail Flow Rules) and the configuration isn't any different in terms of exclusions. The only difference I can see is that Microsoft itself in it's documentation says that it does NOT do Secure by Default (high confidence phish detection) IF the MX does not point at M365.
Because Microsoft wants to keep our customers secure by default, some tenants overrides are not applied for malware or high confidence phishing. These overrides include:
Secure by default is not a setting that can be turned on or off,
Saved you the trouble of clicking on the link, paraphrasing, there are more exceptions.
Hello Tom, thanks for your detailed answer.
To be honest, i am just not sure what it does tell me in my scenario, which we already cleared.For now we still have the situation that we have a tenant with mx records pointing to micrsofft.
We did all the exception from the script. Even the links does not get "rewritten" and seems "nomal" when hovering over them, but somehow OWA still redirects every click on those links to the Safe Link Engine and blocks the clicks.
I will report next week what we found out with out little waiting time ;)