Skip to main content
Version: 2.1.1-preview

CISA.MS.EXO.11.1 - Impersonation protection checks SHOULD be used.

Overview

Impersonation protection checks SHOULD be used.

Rationale: Users might not be able to reliably identify phishing emails, especially if the FROM address is nearly indistinguishable from that of a known entity. By automatically identifying senders who appear to be impersonating known senders, the risk of a successful phishing attempt can be reduced.

Remediation action:

  1. Sign in to Microsoft 365 Defender.
  2. In the left-hand menu, go to Email & Collaboration > Policies & Rules.
  3. Select Threat Policies.
  4. From the Templated policies section, select Preset Security Policies.
  5. Under Standard protection, slide the toggle switch to the right so the text next to the toggle reads Standard protection is on.
  6. Under Strict protection, slide the toggle switch to the right so the text next to the toggle reads Strict protection is on.

Note: If the toggle slider in step 5 is grayed out, click on Manage protection settings instead and configure the policy settings according to Use the Microsoft 365 Defender portal to assign Standard and Strict preset security policies to users | Microsoft Learn.

Test Metadata

FieldValue
Test IDCISA.MS.EXO.11.1
SeverityHigh
SuiteCISA
Categoryexchange
PowerShell testTest-MtCisaImpersonation
TagsCISA, CISA.MS.EXO.11.1, MS.EXO, MS.EXO.11.1

Source

  • Pester test: tests/cisa/exchange/Test-MtCisaImpersonation.Tests.ps1
  • PowerShell source: powershell/public/cisa/exchange/Test-MtCisaImpersonation.ps1