CISA.MS.EXO.11.3 - The phishing protection solution SHOULD include an AI-based phishing detection tool comparable to EOP Mailbox Intelligence.
Overviewβ
The phishing protection solution SHOULD include an AI-based phishing detection tool comparable to EOP Mailbox Intelligence.
Rationale: Phishing attacks can result in unauthorized data disclosure and unauthorized access. Using AI-based phishing detection tools to improve the detection rate of phishing attempts helps reduce the risk of successful phishing attacks.
Remediation action:β
- Sign in to Microsoft 365 Defender.
- In the left-hand menu, go to Email & Collaboration > Policies & Rules.
- Select Threat Policies.
- From the Templated policies section, select Preset Security Policies.
- Under Standard protection, slide the toggle switch to the right so the text next to the toggle reads Standard protection is on.
- Under Strict protection, slide the toggle switch to the right so the text next to the toggle reads Strict protection is on.
Note: If the toggle slider in step 5 is grayed out, click on Manage protection settings instead and configure the policy settings according to Use the Microsoft 365 Defender portal to assign Standard and Strict preset security policies to users | Microsoft Learn.
Related linksβ
- Defender admin center - Preset security policies
- CISA 11 Phishing Protections - MS.EXO.11.3v1
- CISA ScubaGear Rego Reference
- Microsoft Learn - Mailbox intelligence impersonation protection
Test Metadataβ
| Field | Value |
|---|---|
| Test ID | CISA.MS.EXO.11.3 |
| Severity | Medium |
| Suite | CISA |
| Category | exchange |
| PowerShell test | Test-MtCisaMailboxIntelligence |
| Tags | CISA, CISA.MS.EXO.11.3, MS.EXO, MS.EXO.11.3 |
Sourceβ
- Pester test:
tests/cisa/exchange/Test-MtCisaMailboxIntelligence.Tests.ps1 - PowerShell source:
powershell/public/cisa/exchange/Test-MtCisaMailboxIntelligence.ps1