Table of contents:





Things to know about "Exchange Online Protection"



The Microsoft cloud-based mail filter is very aggressive, so please check your Junk folder and your quarantine page regularly for misclassified messages.

During the transition period in which emails to some of your addresses are filtered by Microsoft, but others are still filtered by MailCleaner, it is possible that your MailCleaner quarantine report will be blocked in the Microsoft quarantine.

  • As before, quarantine emails contain a direct link to the quarantine website.
  • Quarantined messages in your MailCleaner quarantine will be available for up to 30 days after filtering for your domain has moved to EOP.
  • ATTENTION: Your settings in MailCleaner will not be migrated to EOP.
  • Personal Allow and Deny lists are managed in Outlook or Webmail (junk mail settings).
    Allow-List entries apply to emails that have been classified as "Spam", but not to emails that have been quarantined as "Spoof" or "Phishing".
  • In contrast to MailCleaner, not only incoming but also outgoing mail is filtered. Even internal mail traffic is subjected to some basic checks.
  • Quarantined messages remain in quarantine for 30 days, after which they are deleted.
  • Checking URLs in email messages protects against malicious links used in phishing and other attacks. (Safe links / time-of-click protection)
    Safe Links Time-of-Click protection is only available for Microsoft mail clients connected to cloud-based mailboxes.


Questions and answers




Question

How do I report the receipt of a spam or phishing e-mail that has not yet been recognized as such?
AnswerIn Outlook or Outlook on the web via the menu >Report< as described under Outlook-App >Report Message<


Question
Are e-mail addresses to which I send an e-mail automatically entered as trusted senders?
Answer

No. Automatic addition to the Safe senders list is not available.


Question
How do I add trusted senders to my safe senders list and how do I block unwanted senders?
AnswerIn webmail https://outlook.office.com go to Menu Settings - E-Mail - Junk-E-Mail. Or go directly to https://outlook.office.com/mail/options/mail/junkEmail. There you can also activate >My contacts are trusted senders<.


Question

How do I add safe senders to my permission list and how do I block unwanted senders in ETH Webmail?
Answer In Outlook on the web https://mail.ethz.ch/ in the menu Options - Email - Accounts.
Here you can enter the senders you want to secure or block.

Question
I have reported mails from a particular sender to Microsoft several times as false positives, but mail from that sender still lands in quarantine.
AnswerThis is usually due to a problem with the sender, e.g. a missing SPF, DKIM or DMARC entry.


Question
I have entered a sender address/domain in my safe senders list, but mail from that sender still lands in quarantine.
AnswerThe safe senders list applies only to the junk folder.


Question
How do I report a message as junk or phishing if I don't have >Report message< in the Outlook menu?
AnswerOpen >Outlook on the Web<, right-click on the relevant message and select >Report - Junk e-mail or phishing<


Question
An e-mail that I have released from quarantine is now in the inbox on >Outlook on the Web<. I would now like to report it as “Not a junk e-mail”. However, I do not have this selection by right-clicking. How do I do this now?
AnswerMove the e-mail temporarily to the junk e-mail folder, here you can right-click and select >Report - No junk e-mail<. 


Question
I clicked on >Request release< in a quarantine email >Microsoft 365 Security: You have messages in quarantine< from quarantine@messaging.microsoft.com. What happens now?
AnswerRequests for the release of quarantined emails are manually checked by an ETH Zurich security administrator no more than once a day on working days and released at their own discretion.


Question
What type of legitimate messages are likely to land in your Junk folder?
Answer
  • messages that advertise some product or service
  • political messages
  • messages from unregistered sender domains
  • messages from sender domains without DMARC, DKIM or SPF records
  • messages that are blocked by one of your mailbox rules or blocked sender list


Question
What type of legitimate messages are likely to land in the quarantine?
Answer
  • "spoofed" messages
    •  messages that sent were using the wrong email provider, such as mail with a Gmail address that is sent from a Hotmail account
    • messages that were received by an external mail account and then forwarded to your ETH address
    • messages where the sender's IP address does match the IP addresses in that domain's SPF record
    • messages where the domain in the From header does match the domain in the DKIM signature
  • messages that the filter classified as "User Impersonation", "Domain Impersonation" or "Brand Impersonation"
  • messages containing a suspicious URL


Question
What type of quarantined messages can only be released by a filter administrator?
Answer
  • phishing
  • messages from a "spoofed" sender
  • messages that contain a suspicious URL


Question
Will the filter ever "learn" that mail from a "spoofed" sender address is not Junk?
AnswerNo.


Question
Answer


Non-permitted attachments - ETH Zurich list




The following attachment types are not accepted.
The restriction applies to incoming, outgoing and also internal e-mail.

File extension RegelKommentar
aceDefaultCompressed archive
apkDefaultAndroid package
app DefaultApplication
appxDefaultWindows application
aniDefaultAnimated mouse cursors
arjDefaultCompressed files
batDefaultBatch file
cabDefaultCabinet (archive)
ceoETH
chmETHMS compiled HTML file
cmdDefaultBatch file
cnfETHConfiguration file
comDefaultExecutable
cplETHControl panel file
debDefaultDebian package
dexDefaultDalvik EXecutable
dllDefaultWindows library
docETHDocument
docmDefaultWord macro file
elfDefaultExecutable and linkable file
exeDefaultExecutable
htaDefaultHTML Application
imgDefaultDisk image
inetlocETHApple Finder internet location format
insETHWindows dialup configuration
isoDefaultDisk image
jarDefaultJava executable
jnlpDefaultJava network launching protocol
jobETHWindows task scheduler instructions
jseETHVisual studio
kextDefaultKernel extension
lhaDefaultCompressed archive
libDefaultLibrary
libraryDefaultLibrary
lnkDefaultLink files
lzhDefaultCompressed archive
machoDefaultMach-O object file
madETHMicrosoft access
mafETHMicrosoft access
magETHMicrosoft access
mamETHMicrosoft access macro
maqETHMicrosoft access
marETHMicrosoft access
masETHMicrosoft access
mavETHMicrosoft access
mawETHMicrosoft access
mscDefaultMicrosoft management console
msiDefaultMicrosoft software installer
msixDefaultWindows application package
mspDefaultWindows installer patch file
mstDefaultWindows installer setup transform
pifDefaultProgram information files
ppaDefaultPowerPoint
ppamDefaultPowerPoint add-on
regDefaultWindows registry file
revDefaultRecovery volume
scfDefaultWindows shell command file
scrDefaultWindows screen saver file
sctDefaultScriplet
shbETHWindows shortcut
shsETHShell scrap object
sysDefaultWindows system file
uifDefaultCompressed disc image
vbDefaultVisual basic
vbeDefaultVBScript
vbsDefaultVisual basic script
vxdDefaultApplication helper
wscDefaultWindows script component
wsfDefaultWindows script
wshDefaultWindows script host control
xllDefaultExcel add-in
xlsbETHExcel binary workbook
xnkETHMicrosoft Exchange shortcut
xzDefaultCompressed archive
zDefaultCompressed archive



Properties of the quarantine report messages from EOP



Sender address:quarantine@messaging.microsoft.com
Subject:Microsoft 365 security: You have messages in quarantine
Content example:



Check emails from migrated shared mailboxes that are in quarantine



Open https://security.microsoft.com and log in with the authorized ETH user name.
Expand >Email & Collaboration< and select Review.
In the square, click on the text >Review quarantined messages and...<.
Click on the filter icon to the right of the search field.
Under Recipient address, enter the email of the shared mailbox and click Apply.
The emails now appear in the list and can be checked.
 


Zero-hour auto purge (ZAP)



Zero-hour auto purge (ZAP) is a protection feature in Exchange Online Protection (EOP) that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes.

ZAP finds and takes automated action on messages that are already in a user's mailbox. ZAP's search is limited to the last 48 hours of delivered email. Users aren't notified if ZAP detects and deletes a message.

Detailed information on ZAP can be found here on the Microsoft website.


  • No labels