2.1.12 (L1) Ensure the connection filter IP allow list is not used

Information

In Microsoft 365 organizations with Exchange Online mailboxes or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, connection filtering and the default connection filter policy identify good or bad source email servers by IP addresses. The key components of the default connection filter policy are IP Allow List IP Block List and Safe list

The recommended state is IP Allow List empty or undefined.

Without additional verification like mail flow rules, email from sources in the IP Allow List skips spam filtering and sender authentication (SPF, DKIM, DMARC) checks. This method creates a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered. Messages that are determined to be malware or high confidence phishing are filtered.

Solution

To remediate using the UI:

- Navigate to Microsoft 365 Defender

https://security.microsoft.com

.
- Click to expand Email & collaboration select Policies & rules > Threat policies
- Under Policies select Anti-spam
- Click on the Connection filter policy (Default)
- Click Edit connection filter policy
- Remove any IP entries from Always allow messages from the following IP addresses or address range:
- Click Save

To remediate using PowerShell:

- Connect to Exchange Online using Connect-ExchangeOnline
- Run the following PowerShell command:

Set-HostedConnectionFilterPolicy -Identity Default -IPAllowList @{}

Impact:

This is the default behavior. IP Allow lists may reduce false positives, however, this benefit is outweighed by the importance of a policy which scans all messages regardless of the origin. This supports the principle of zero trust.

See Also

https://workbench.cisecurity.org/benchmarks/17682

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, 800-53|SI-8, 800-53|SI-16

Plugin: microsoft_azure

Control ID: 916fe2adaf61883cd8704d68f4b21e3ddab8ece6075ecee1588bc6ad2712eae7