4.5 Ensure the Safe Links policy is enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Enabling the Safe Links policy allows email messages that include URLs to be processed and rewritten if required. Safe Links provides time-of-click verification of web addresses in email messages and Office documents.

Rationale:

Safe Links extends phishing protection to include redirecting all email hyperlinks through a forwarding service which will block malicious ones even after the email has been delivered to the end user.

Impact:

When enabling and configuring Safe Links impact to the end-user should be low. Users should be informed of the change as, in the event a link is unsafe and blocked, they will receive a message that it has been blocked.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To enable the Safe Links policy, use the Microsoft 365 Admin Center:

Click Security to open the Security portal.

Under Email & collaboration navigate to Policies & rules > Threat policies > Safe Links.

Click +Create, name the policy, then click Next.

Choose whether the policy will apply to Users, Groups, or Domains then select Next.

Under Protection settings click On - URLs will be rewritten and checked against a list of known malicious links when user clicks on the link., select the same for Microsoft Teams.

Click the following options - Apply Safe Links to email messages sent within the organization, Do not let users click through to the original URL then click Next.

You may choose to use default or a custom text, then click Next.

Click Submit.

To enable the Safe Links policy, use the Exchange Online PowerShell Module:

Connect using Connect-ExchangeOnline.

Run the following PowerShell command:

$SafeLinksPolicy = Get-SafeLinksPolicy

If (-not $SafeLinksPolicy.Identity) {
$SafeLinksPolicy = New-SafeLinksPolicy -Name 'Safe Links'
}

Set-SafeLinksPolicy -Identity $SafeLinksPolicy.Identity -IsEnabled $True -ScanUrls $True -EnableForInternalSenders $True -AllowClickThrough $False

Default Value:

disabled

See Also

https://workbench.cisecurity.org/files/3729