Skip to main content
Version: 2.1.1-preview

CISA.MS.EXO.15.3 - User click tracking SHOULD be enabled.

Overview​

User click tracking SHOULD be enabled.

Rationale: Users may click on malicious links in emails, leading to compromise or unauthorized data disclosure. Enabling user click tracking lets agencies know if a malicious link may have been visited after the fact to help tailor a response to a potential incident.

Remediation action:​

  1. Sign in to Microsoft 365 Defender.
  2. In the left-hand menu, go to Email & Collaboration > Policies & Rules.
  3. Select Threat Policies.
  4. From the Templated policies section, select Preset Security Policies.
  5. Under either Standard protection or Strict protection, select Manage protection settings.
  6. Select Next until you reach the Apply Defender for Office 365 protection page.
  7. On the Apply Defender for Office 365 protection page, select All recipients.
  8. (Optional) Under Exclude these recipients, add Users and Groups to be exempted from the preset policies.
  9. Select Next on each page until the Review and confirm your changes page.
  10. On the Review and confirm your changes page, select Confirm.

Test Metadata​

FieldValue
Test IDCISA.MS.EXO.15.3
SeverityMedium
SuiteCISA
Categoryexchange
PowerShell testTest-MtCisaSafeLinkClickTracking
TagsCISA, CISA.MS.EXO.15.3, MS.EXO, MS.EXO.15.3

Source​

  • Pester test: tests/cisa/exchange/Test-MtCisaSafeLinkClickTracking.Tests.ps1
  • PowerShell source: powershell/public/cisa/exchange/Test-MtCisaSafeLinkClickTracking.ps1