We are introducing a new capability, Advanced Delivery, for the configuration of third-party phishing simulation campaigns and delivery of messages to security operations (SecOps) mailboxes. This message is associated with Microsoft 365 Roadmap ID 72207.
Advanced delivery gives admins the ability to configure advanced message delivery for special scenarios, including third-party phishing simulation campaigns and SecOps mailboxes. Advanced delivery will deliver unfiltered messages in these cases and clearly mark messages as part of each scenario across all admin surfaces.
Admins will now be able to explicitly configure for the following scenarios and ensure messages configured as part of these scenarios are handled correctly across product experiences:
Third-Party Phish simulation campaigns: Admins using a third-party phish education vendor to simulate attacks that can help identify vulnerable users before a real attack impacts their organization.
Security Operations (SecOps) mailboxes: These are special mailboxes Admins setup to support the ability for end users to report malicious emails to SecOps teams. These are also used by security teams to collect and analyze unfiltered messages.
- Exchange Online
- Timing: We will begin rolling this out in mid-June and expect to complete the rollout by end of July.
- Roll-out: user level roll-out v tenant level
- Control type: admin control
- Action: review, assess and configure your third-party phishing simulation campaigns/delivery for security operation mailboxes when feature rolls out. Act by August, 24, 2021.
How this will affect your organization
With Advanced Delivery, we will ensure that protection filters will respect these configurations and not block these messages. We will also show off these messages with the appropriate annotations in the reporting, investigation and security experiences in the product, so security teams and admins are not confused about the true nature of these messages.
Since these do not represent a real threat to your organization, we will, for example, not flag the messages as malicious and inadvertently remove them from your inbox, and we’ll skip things like triggering alerts, detonation, and automated investigations. However, admins will have the ability to filter, analyze and understand messages delivered due to these special scenarios.
What you need to do to prepare
If you are currently using Exchange mail flow rules (also known as transport rules or ETRs) to configure your third-party phishing simulation campaigns or delivery for security operation mailboxes, you should begin to configure these with the new Advanced Delivery policy when the feature is launched in July.
After the last phase of Secure by Default is enabled in July for ETRs, Defender for Office 365;
- Will no longer deliver high confidence phish, regardless of any explicit ETRs.
- Will no longer be a recommended method to configure the above scenarios.
- Microsoft Defender for Office 365 tech community blog announcing this new capability: Mastering Configuration Part Two (microsoft.com)
- MS documentation on the new Advanced Delivery Policy: Configure the delivery of third-party phishing simulations to users and unfiltered messages to SecOps mailboxes – Office 365 | Microsoft Docs
- How we are keeping customers secure: Secure by default in Office 365 – Office 365 | Microsoft Docs
Message ID: MC256473
Published: 14 May 2021
Updated: 01 July 2021
Action required by 24 August 2021