Whitelisting

1.Creating Transport Rules
To set up this configuration, you need to access the Microsoft EAC console and configure a new mail flow rule. Log in to the EAC console ( https://adm...
2. Creating a Connector
The Connector is useful for bypassing the client's potential anti-spam filters that could block phishing simulation emails and student caring emails. ...
3. Configuration of Third-Party Phishing Simulation Service
This article illustrates the configuration of phishing simulations using Microsoft Defender. The third party involved is Cyber Guru. The procedure inv...
4. Configuration of Anti-Spam Rules
1. Access the Microsoft Defender console https://security.microsoft.com 2. Go to " Policies and Rules > Threat Policies > Email Protection Policies "...
5. Enable the "Report Phishing" Outlook Plug-in
1. To implement the plug-in, it is necessary to connect to the Microsoft 365 admin center https://admin.microsoft.com 2. Under "Settings," click on "...
6. Forwarding with Power Automate with shared mailbox:
1. Go to the link https://make.powerautomate.com/ and select " Automated cloud flow " Enter " when a new mail " in the search field and then select ...
Forwarding with Power Automate with Dedicated Web License Account:
Microsoft Guide: https://learn.microsoft.com/it-it/power-automate/get-started-logic-flow In the box set up to receive reports, it is necessary to cre...