G DATA Phishing Simulation

To ensure that the links and attachments of our simulated phishing e-mails are not deleted, the Advanced Threat Protection in Defender P1 must be bypassed.

Proceed as follows:

1.

Open the Microsoft 365 admin center.

2.

Click on Security in the left side menu.

Show screenshot
365 secutity

3.

Click on Exchange Message Tracking in the left side menu. This will take you to the Exchange Admin Center.

Show screenshot
365 message tracing

4.

Click on Email flow in the left side menu and then on Rules in the submenu that opens.

Show screenshot
365 security

5.

Click on Add a rule. In the submenu that opens, select Create a new rule.
A new window opens on the right-hand side of the screen. Give the rule a name. For example GDATA PhishingSIM BypassLink.

Show screenshot
365 rule deactivated

6.

For Apply this rule if…​ select The sender in combination with IP is in any of these ranges or exactly matches.

Show screenshot
Set 365 IP Whitelist

7.

Now enter our IPs here.

The IPs and domains we use, which must be unlocked accordingly in your company, are listed in the Awareness Manager under the TAB Whitelisting.
Show screenshot
Set 365 IP Whitelist

8.

For Proceed as follows: select Define message header

Show screenshot
Set 365 IP Whitelist

9.

Click on Enter text.
A new window will open on the right-hand side of the screen. Enter the following value there:

X-MS-Exchange-Organization-SkipSafeLinksProcessing

Click on Save.

Show screenshot
Set 365 IP Whitelist

10.

Click on Enter text.
A new window will open on the right-hand side of the screen. Enter the following value there:

1

Click on Save.

Show screenshot
Set 365 IP Whitelist

11.

In the next window, make sure that the Rule mode is set to "Enforce" and select a severity level for this rule. Rule matches are grouped by severity in activity reports. The severity level is only a filter to ease the use of the reports. The severity level has no effect on the priority in which the rule is processed.

  • Not specified

  • Low

  • Middle

  • High

  • Do not monitor: Rule matches are not displayed in rule reports

Show screenshot
365 rule deactivated

12.

Click on Next.

Show screenshot
365 rule deactivated

13.

Check the settings again in the next window and click on Finish.

Show screenshot
365 rule deactivated

14.

Your rule will then be available in your rule overview. However, it is still disabled. Click on the word Disabled and a new window will open on the right-hand side of the screen.

Show screenshot
365 rule deactivated

15.

Drag the status slider to Activated.

Show screenshot
365 rule deactivated

16.

Repeat steps 5-15 with the following modifications:

  • At step five, enter a different name, for example "GDATA PhishingSIM BypassAttachment".

  • For step nine, use the following value:

X-MS-Exchange-Organization-SkipSafeAttachmentProcessing

The bypass for links and attachments is then set up.