Skip to main content
Version: 2.1.1-preview

CISA.MS.EXO.12.2 - Safe lists SHOULD NOT be enabled.

Overview

Safe lists SHOULD NOT be enabled.

Rationale: Messages sent from allowed safe list addresses bypass important security mechanisms, including spam filtering and sender authentication checks. Avoiding use of safe lists prevents potential threats from circumventing security mechanisms. While blocking all malicious senders is not feasible, blocking specific known, malicious IP addresses may reduce the threat from specific senders.

Remediation action:

To modify the connection filters, follow the instructions found in Use the Microsoft 365 Defender portal to modify the default connection filter policy.

  1. Sign in to Microsoft 365 Defender portal.
  2. From the left-hand menu, find Email & collaboration and select Policies and Rules.
  3. Select Threat Policies from the list of policy names.
  4. Under Policies, select Anti-spam.
  5. Select Connection filter policy (Default).
  6. Click Edit connection filter policy.
  7. Ensure Turn on safe list is not selected.

Test Metadata

FieldValue
Test IDCISA.MS.EXO.12.2
SeverityMedium
SuiteCISA
Categoryexchange
PowerShell testTest-MtCisaAntiSpamSafeList
TagsCISA, CISA.MS.EXO.12.2, MS.EXO, MS.EXO.12.2

Source

  • Pester test: tests/cisa/exchange/Test-MtCisaAntiSpamSafeList.Tests.ps1
  • PowerShell source: powershell/public/cisa/exchange/Test-MtCisaAntiSpamSafeList.ps1