Exchange Online Protection : Malware filtering

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email
Table of Contents

introduction

Malware filtering come to place after connection filter as the Second line of Defense 

Exchange Online Protection (EOP) provides built-in malware and spam filtering capabilities that help protect inbound and outbound messages from malicious software and help protect your network from spam transferred through email

Admins do not need to set up or maintain the filtering technologies, which are enabled by default

However >>  admins can make company-specific filtering customizations.

please Note : 

  • By December 1, 2020 – the malware filter experience will be removed from the Exchange admin center EAC . >>  Please try to make more practice on SCC [ the Security and Compliance Center ]  https://protection.office.com/antimalwarev2 

Malware types

Malware are categorized into : 

Viruses

  •  that infect other programs and data,

  • and spread through your computer or network looking for programs to infect.

Spyware

  •  that that gathers your personal information,

  • such as sign-in information and personal data,  >> and sends it back to its author.

Ransomware

  •  that encrypts your data and demands payment to decrypt it.

  • Anti-malware software doesn’t help you decrypt encrypted files >> , but it can detect and remove the malware that’s associated with the ransomware

 

 

Anti-Malware Options

EOP offers multi-layered malware protection that’s designed to catch all known malware traveling into or out of your organization.

The following options help provide anti-malware protection:

Layered defenses against malware:

  • Multiple anti-malware scan engines help protect against both known and unknown threats.

  • These engines include powerful heuristic detection to provide protection even during the early stages of a malware outbreak.

  • This multi-engine approach has been shown to provide significantly more protection than using just one anti-malware engine.

Real-time threat response:

  • During some outbreaks, the anti-malware team may have enough information about a virus or other form of malware to write sophisticated policy rules that detect the threat

  • even before a definition is available from any of the scan engines used by the service. These rules are published to the global network every 2 hours to provide your organization with an extra layer of protection against attacks.

Fast anti-malware definition deployment:

  • The anti-malware team maintains close relationships with partners who develop anti-malware engines.
  • As a result, the service can receive and integrate malware definitions and patches before they’re publicly released.
  •  

what to configure in Malware Filtering

as mentioned previously [please back to  first article of EOP ]  : the users with the following Rules can configure EOP policies :

  • global admin 
  • exchange admin 
  • security admin  

Admins can view, edit, and configure (but not delete) the default anti-malware policy to meet the needs of their organizations


Also  admin can also create custom anti-malware policies that apply to specific users, groups, or domains in your organization.

Custom policies always take precedence over the default policy, but you can change the priority  of your custom policies.

 

For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB
For Better View > Open Image in different TAB

Conclusion

Malware Filtering is second line of defense of EOP after Connection filtering 

microsoft move configuration of Malware filtering to SCC [Security and Compliance Center ]  

default anti-malware policy and custom policy allow admin to set how to deal with email that include malware email with attachment and how to notify admin and other users about malware 

also we can configure suspect attachment type like .exe .bat and so on 

Share this post
Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

About Me

Our Power in Numbers

 17 

Courses

321

Articles

3,882

Images
and All configurations images are proudly made in Pioneers Lab

Articles By Course

Recent Articles

Subscribe

Contact us

have a challenge ? don’t hesitate to contact us