Information
In Microsoft 365 organizations with Exchange Online mailboxes or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, connection filtering and the default connection filter policy identify good or bad source email servers by IP addresses. The key components of the default connection filter policy are IP Allow List IP Block List and Safe list
The recommended state is IP Allow List empty or undefined.
Without additional verification like mail flow rules, email from sources in the IP Allow List skips spam filtering and sender authentication (SPF, DKIM, DMARC) checks. This method creates a high risk of attackers successfully delivering email to the Inbox that would otherwise be filtered. Messages that are determined to be malware or high confidence phishing are filtered.
Solution
To remediate using the UI:
- Navigate to Microsoft 365 Defender
https://security.microsoft.com
.
- Click to expand Email & collaboration select Policies & rules > Threat policies
- Under Policies select Anti-spam
- Click on the Connection filter policy (Default)
- Click Edit connection filter policy
- Remove any IP entries from Always allow messages from the following IP addresses or address range:
- Click Save
To remediate using PowerShell:
- Connect to Exchange Online using Connect-ExchangeOnline
- Run the following PowerShell command:
Set-HostedConnectionFilterPolicy -Identity Default -IPAllowList @{}
Impact:
This is the default behavior. IP Allow lists may reduce false positives, however, this benefit is outweighed by the importance of a policy which scans all messages regardless of the origin. This supports the principle of zero trust.