Menu
Modern Workplace Blog
  • Home
  • About: Kenneth van Surksum
  • Cookie Policy
Modern Workplace Blog
April 29, 2020July 9, 2020

Office 365 Advanced Threat Protection (ATP) deep dive

Around 5 years ago (April 2015) Microsoft announced Exchange Online Advanced Threat Protection (ATP), which was renamed to Office 365 Advanced Threat Protection around a year later.

By using Office 365 Advanced Threat Protection you can add additional protection to the email filtering service available in Office 365 called Exchange Online Protection (EOP).

In this article, I will explain the functionality of Office 365 Advanced Threat Protection, and I will share the lessons learned while implementing the solution at several of my customers. I’ll also try to include as much references to other articles or blogposts as possible hopefully providing you with enough information for you to start implementing Office 365 ATP as well.

This article covers the following topics:

  • What is Office 365 Advanced Threat Protection?
  • Licensing
  • ATP Safe Attachments
  • ATP Safe Links
  • ATP Anti Phishing
  • Other ATP functionality
  • Troubleshooting
  • Implementation planning
  • Conclusion
  • References

Disclaimer: This post reflects the status of Office 365 Advanced Threat Protection as of April 28 2020. Functionality may change, even right after this post has been published.

What is Office 365 Advanced Threat Protection?

From the Microsoft website: “Microsoft Office 365 Advanced Threat Protection (ATP) is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection, and includes features to safeguard your organization from harmful links in real time.“

Microsoft is running this on a very large scale worldwide, to give you an idea have a look at the figure below on the amount of protected, detected and responded items we are talking about.

Machine generated alternative text:
4.7T 
messages scanned in 
2019 
20B 
detonations by 
Office ATP 
13B 
malicious emails 
blocked by 
Office ATP 
zero-day email 
threats blocked 
Auto-investigations 
triggered by SecOps 
since June 2019 
1 OXT 
in remediations from 
auto-investigations 
since July 2019
Some global figures

Besides Office 365 ATP there are also other ATP products provided by Microsoft:

  • Azure ATP
  • Microsoft Defender ATP

All of these products share information with each other using the Microsoft Intelligent Security Graph. By doing so, optimal integration is achieved allowing different applications connected to this Security Graph to share information with each other. If you want to know more about this Intelligent Security Graph I suggest reading the following article by Maarten Goet: “What is this Microsoft Intelligent Security Graph everybody is talking about?“

Machine generated alternative text:
We b apps 
Microsoft 
Graph 
Security 
& n atiw 
MicroscttGraph 
COW
Microsoft Intelligent Security Graph

Example: An email with a malicious attachment is scanned with Office 365 ATP Safe Attachments, if the attachment if classified as malicious, that information is shared with the Security Graph and can then be used by Microsoft Defender ATP to block that same file residing on a Windows 10 client from being executed. 

From an email message flow point of view, Office 365 ATP is part of the Exchange Online Protection (EOP) security measures already in place. EOP provides the Connection Filtering, Malware Scanning, Mail Flow Rules and Spam Filtering functionality. This is actually important to realize, since having a not well thought off EOP protection can have consequences on the effectiveness of ATP. 

Mail flow

So in order to perform a good implementation of Office 365 ATP you need to have a well thought implementation of Exchange Online Protection as well.

Luckily Microsoft has created some very good documentation on where to start, with the document titled: “Best practices for configuring EOP and ATP” which outlines, some of the best practices you need to start implementing. One of these best practices is to implement DKIM and DMARC on which I blogged earlier in this article: “Did you already enable DKIM and DMARC for your Office 365 domains?”.

Based on the best practices Microsoft also provides documentation titled: “Recommended settings for EOP and Office 365 ATP security“. When implementing these settings you either have the option to go for a “Standard” or “Strict” security level. I suggest to start with aligning your environment with the Standard settings, and decide to evolve to Strict if necessary from there.

Assess your environment using ORCA

Microsoft provides a PowerShell Module called the Office 365 Advanced Threat Protection Recommended Configuration Analyzer (ORCA) which can help you assess the current settings within your environment. You can install the Module from the PowerShell Gallery using PowerShellGet using the following command: “Install-Module -Name ORCA“

Once installed you can run ORCA using the “Get-OrcaReport” commandlet.

  • PowerShell Get-OrcaReport
  • ORCA HTML Report

Licensing

Office 365 ATP can be licensed in two different plans, Plan 1 and Plan 2. If you have licensed a Office 365/Microsoft 365 x5 plan, you automatically have ATP Plan 2 at your disposal. Microsoft 365 Business Premium includes Plan 1. You can also buy either ATP Plan 1 or Plan 2 as an addon on top of several other offered product licenses as detailed here.

For a complete overview of the differences between Plan 1 and Plan 2, Microsoft provides a PDF for download explaining the differences.

Machine generated alternative text:
Compare 
Not seeing what you wanted? Go back to select different products to compare. 
Select different products 
Compare with similar products 
What's included 
A Accounts and security 
Threat intelligence 
Office Advanced Threat 
Protection 
Office 365 Advanced Threat Protection 
(Plan 2) 
Starting at 
€4.20 user/month 
Buy 
View details 
Office 365 Advanced Threat Protection 
(Plan 1) 
Starting at 
€1.69 user/month 
Buy 
View details
Licensing and pricing

Office 365 ATP includes the following functionality:

  • ATP Safe Attachments
  • ATP Safe Links
  • ATP Anti-Phishing
  • Real Time Reports
  • Threat Trackers
  • Threat Investigation
  • Automatic Incident response
  • Attack Simulator

In the remaining of this blogpost I will go into more detail on this functionality, and share my lessons learned.

ATP Safe Attachments

If you enabled ATP Safe Attachments, email containing attachments will be scanned for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent. Basically, Microsoft quickly spins on a Virtual Machine and executes the content carefully watching for suspicious activity.

Machine generated alternative text:
A Message events 
Date (UTC) A 
Apr 28, 2020 PM 
Apr 28, 2020 PM 
Apr 28, 2020 PM 
Apr 28, 2020 PM 
Apr 28, 2020 PM 
Apr 28, 2020 PM 
Event 
Advanced Threat Prote... 
Receive 
Spam Diagnostics 
Defer 
Deliver 
Advanced Threat Prote... 
Detail 
Allowed. Advanced Threat Protection Malware:... 
Message received by: AMOPR07MB3889 using . 
Reason: 400 4.7.721 Advanced Threat Protectio... 
The message was successfully delivered. 
Advanced Threat Protection Malware: BRK307...
Message Events

Doing this has a penalty, in the Message events example above, 9 seconds the time between Defer and Deliver. You can expect that email will be slightly delayed because of the scanning taking place. Microsoft doesn’t give any details on how long this scanning takes place, when searching the internet you will find different outcomes, from people having no issues at all, to people complaining that it can take up to 30 minutes. My experience so far is that emails are delayed for minutes maximum, I personally haven’t experienced any bigger delays, even today with all the resource issues due to COVID19.

Within the ATP Safe Attachments policy you have the option to define how you want the policy to behave. The Microsoft recommended setting is Block, which blocks emails with detected malware and won’t deliver these kinds of emails to the inbox of the user.

ATP Safe Attachments also provides the option to protect files in SharePoint, OneDrive and Microsoft Teams. If enabled, when a file in any SharePoint, OneDrive, or Microsoft Teams library gets identified as malicious, ATP will prevent users from opening or downloading the file.

Machine generated alternative text:
Protect files in SharePoint, OneDrive, and Microsoft Teams 
If a file in any SharePoint, OneDrive, or Microsoft Teams library is identified as malicious, ATP will prevent users from opening and downloading the file. Learn more about ATP for SharePoint, OneDrive, and Microsoft Teams 
Turn on ATP for SharePoint, OneDrive, and Microsoft Teams
Protect files

If the latency is really a big issue, you can enable the Dynamic Delivery option, where the email is delivered to the inbox directly but the attachment is withdrawn from the email while being checked for malware. Even though within our tenant this option is enabled I recommend only using this option for a select group of users when really needed, mainly because it comes with extra complexity and you have to explain to users the behavior of the policy. For example, for some file types you can already preview the contents, until the scanning has taken place after which the user can open the attachment in order to view it.

Machine generated alternative text:
Insight24 Safe Attachments Policy 
general 
Safe attachments unknown malware response 
settings 
Select the action for unknown malware in attachments. Learn more 
applied to 
Warning 
Monitor, Replace and Block actions may cause significant delay to email delivery.Learn more 
Dynamic Delivery is only available for recipients with hosted mailboxes. Learn more 
If you choose the Block, Replace or Dynamic Delivery options and malware is detected in 
attachment, the message containing the attachment will be quarantined and can be released 
only by an admin. 
C) Off - Attachment will not be scanned for malware. 
C) Monitor - Continue delivering the message after malware is detected; track 
scan results. 
C) Block - Block the current and future emails and attachments with detected 
malware. 
C) Replace - Block the attachments with detected malware, continue to deliver the 
message. 
@ Dynamic Delivery - Deliver the message without attachments immediately and 
reattach once scan is complete. 
Redirect attachment on detection 
Send the blocked, monitored, or replaced attachment to an email address. 
C] Enable redirect 
Send the attachment to the following email address 
Apply the above selection if malware scanning for attachments times out or 
error occurs.
Safe attachments policy

You can exclude specific messages from being checked by ATP Safe Links policy, by creating a transport rule which sets the  X-MS-Exchange-Organization-SkipSafeAttachmentProcessing header to the value 1.

ATP Safe Links

If you enable ATP Safe Links, URLs in emails are rewritten to include https://*.safelinks.protection.outlook.com/?url= in front of the original URL. You can only see this if you copy the URL and paste it, for the end-user even when the hover over the URL in their email they will still see the original URL. Note that the wildcard * is a host name in my example, your exact URL can be different, mine is https://eur03.safelinks.protection.outlook.com/?url=.

URLs once rewritten are encoded, while troubleshooting this I found the functionality of the https://www.o365atp.com/ website quite useful, since it allows you to paste a ATP encoded URL and translate it back to the original URL.

By adding the safe links URL in front of the URL, Microsoft is capable of proxying the initial URL through their scanning service. Keep in mind that any links clicked after that do not go through this webservice. You’ll need another proxying solution if you want that functionality. ATP Safe Links also provides the option to be active in Office 365 applications, this option is enabled by default.

Setting up the ATP Safe Links policies

For ATP Safe Links you must set 2 policies, there is a default policy having some options, but other options are available if you create a custom policy.

  • ATP safe links default policy
  • ATP safe links custom policy

You can exclude specific messages from being checked by ATP Safe Links policy, by creating a transport rule which sets the  X-MS-Exchange-Organization-SkipSafeLinksProcessing header to the value 1.

Testing ATP Safe Links

You can test whether ATP Safe Links is working by sending an email from an external email address to your account containing the following URL: http://www.spamlink.contoso.com

If you open that (rewritten) URL in your email client you should receive the following page in your browser. ATP Safe Links has several other warning pages which are described in more detail in the following document: ATP Safe Links warning pages

Machine generated alternative text:
This website has been 
classified as malicious. 
Opening his website might not be safe. 
http://www.spamlink.contoso.co... 
We recommend that you don't open this website, as opening it might not 
be safe and could harm your computer or result in malicious use of your 
personal data. 
Go Back 
Powered by Office 365 Advanced Threat Protection
Website blocked by ATP Safe Links

Be careful with long URLs

While implementing this solution at one of my customers we ran into an issue where URLs in emails, once wrapped by ATP Safe Links surpassed the 2048 (2K) length after which it got truncated by the browser causing the URL to fail. If you experience this issue you either have two options: Ask the sender to shorten the link, or add the domain to the “Do Not Rewrite” list.

Alert policies in the Security & Compliance center.

Especially with ATP Safe Links it can happen that while being delivered the URL has been found non-suspicious, if Microsoft later decides that the email was malicious after all, you can be notified. For this to work you must have the “A potential malicious URL click was detected” alert policy active. If enabled this will create an alert in the Alerts section of the Security & Compliance center allowing you to reach out to the user and verify whether or not the attacker was capable of getting credentials of the user.

ATP Anti-phishing

ATP Anti-phishing detects attempts to impersonate your users and custom domains. It applies machine learning models and advanced impersonation-detection algorithms to avert phishing attacks.  ATP anti-phishing checks incoming messages for indicators that the message may be phishing. Whenever a user is covered by an ATP policy (safe attachments, safe links or anti-phishing) the incoming message is evaluated by multiple machine learning models that analyze the message to determine if the policy applies to the message and the appropriate action is taken, based on the configured policy.

Within Exchange Online Protection, incoming email is checked on having valid Sender Policy Framework (SPF), Domain Key Identified Mail (DKIM) and Domain-based Message Authentication Reporting and Conformance (DMARC) configurations. If the email is sent from an address which is not in the SPF record, or the message is not signed while signing is specified in the DMARC record.  the message will most likely be considered SPAM by the anti-spam settings (SCL). ATP Anti-Phishing takes it one step further being capable of detecting spoofing messages even when EOP might find the message legitimate. See my blogpost about SPF, DKIM and DMARC for more context on this subject: Did you already enable DKIM and DMARC for your Office 365 domains?

The ATP Anti-phishing has a default policy which is active for all your users and has the following options for impersonation and spoofing.

Protecting users and domains

Within the ATP Anti-phishing you have the option to include users and domains to protect. For the domains you have the options to add the domains you host using Office 365, but you can also include domains you own but do not host in Office 365 or domains of business partners.

By doing so, messages which appear to be coming from mircosoft.com or micr0soft.com for example, are flagged if you own the microsoft.com domain or added microsoft.com to the list of domains to protect. You can decide what to do with these kinds of email:

  • Redirect message to other email addresses
  • Move message to the recipients’ Junk Email folders
  • Quarantine the message* (MS recommended option)
  • Deliver the message and add other addresses to the Bcc line
  • Delete the message before it’s delivered
  • Don’t apply any action

During implementation we have found some interesting use cases where legitimate email was considered impersonation, for example we had a domain surkey.nl receiving email from surveymonkey.com where surveymonkey.com was considered impersonation from the perspective of ATP anti phishing. In my tenant (insight24.nl) for example we sometimes receive email from Insight, which is a business partner.

We therefore added insight.com to our trusted domain list, in order to make sure that email is delivered to the inbox instead of in our case “Quarantined”, in the case of surkey.nl you should include the exact domain used by surveymonkey.com to send the email to your organization. In this case we needed to add mailer.surveymonkey.com and go.surveymonkey.com. It’s not possible unfortunately to use wildcards when defining the trusted domain list. Also there is a maximum of 20 trusted domains.

Another interesting case is where “spoofing” emails are being sent out by Microsoft, examples are Teams and SharePoint which sent out emails on behalf of users. In order to make sure that these emails are delivered into the inbox we added the following two email addresses to the trusted senders list in the ATP anti phishing policy: noreply@email.teams.microsoft.com and no-reply@sharepointonline.com. I also requested Microsoft to deliver their recommendations (via Github feedback on the documentation page) for this but unfortunately they haven’t be able to provide this information yet.

Uservoice items addressing these limitations to vote for:

  • Increase the ATP Anti-Phishing policy trusted domains limit
  • Advanced Threat Protection (ATP) Whilelist – add wildcard support and/or extend the 320 character limit

Therefore my advice would be that after implementing your ATP anti phishing policy to regularly check your Quarantined items and make modifications based on Quarantined email from the AntiPhishPolicy categorized as Phish. If you want to make sure that the email was Quarantined based on the ATP anti phishing policy you can look for the CAT:DIMP property in the X-ForeFront-AntiSpam-Report header.

Within the policy you can also add a list of maximum 60 email addresses, which from that point are protected as well. Microsoft uses the sample of michelle@contoso.com being flagged, if the added email address is michele@contoso.com. Also here, be very careful when implementing this option, since based on my experience, the algorithm to detect that the domain or sender can be very enthusiastic sometimes. After implementation make sure that you regularly check your Quarantined items.

If you have systems within your organization sending out email on-behalf of, or as your users take extra care, since your domains are now protected from impersonation you have to make sure that emails sent using any of the email addresses in your domain still reach the inbox of your users.

Besides configuring the default Anti phish policy, you can also create specific ATP anti phish policies making them applicable for specific users.

Safety tips

If you decide to deliver messages flagged as impersonation to the inbox, you have the option to do so, but provide safety tips to make the user aware of this risk. The following safety tips are provided:

  • Impersonated users: The From address contains a protected user.
  • Impersonated domains: The From address contains a protected domain.
  • Unusual characters: The From address contains unusual character sets (for example, mathematical symbols and text or a mix of uppercase and lowercase letters) in a protected sender or domain.

Note: you can enable impersonation safety tips by clicking on the “Turn on impersonation saftey tips” link on the Actions page of the policy.

Mailbox Intelligence

Mailbox intelligence analyzes your cloud-based users’ mail flow patterns to determine which contacts they communicate with most often. This helps to more easily identify when an email message might be from an attacker who’s impersonating one of those contacts. This intelligence allows Microsoft 365 to customize user impersonation detection and better handle false positives.

You can either enable Mailbox intelligence and Mailbox intelligence based impersonation protection and specify what happens with messages which are sent by an impersonated user.

Spoofing

Spoofing is when the From address in an email message (the sender address that’s show in email clients) doesn’t match the domain of the email source. Antispoofing protection is enabled by default, and its settings are also available when only having Anti-phishing policies available in the case you didn’t license ATP.

Unauthenticated sender in Outlook
Spoofing email example

If spoofing is detected you can choose to either sent the email to Quarantine or to the recipient’s Junk Email folder. If you also enable the Unauthenticated Sender option, the user receives some visual identification in the received email message:

  • A question mark (?) is added to the sender’s photo if the message does not pass SPF or DKIM checks and the message does not pass DMARC or composite authentication.
  • The via tag (chris@contoso.com via michelle@fabrikam.com) is added if the domain in the From address (the message sender that’s displayed in email clients) is different from the domain in the DKIM signature or the MAIL FROM address.

See: Identify suspicious messages in Outlook.com and Outlook on the web for more information on this subject.

Machine generated alternative text:
Edit your policy Office365 AntiPhish Default 
Ij Delete policy 
Status 
Last modified 
Policy setting 
Impersonation 
Spoof 
Advanced settings 
Close 
Increase Priority V Decrease Priority 
On 
April 29, 2020 
Policy name 
Description 
Users to protect 
Protect all domains I own 
Protect specific domains 
Action > User impersonation 
Action > Domain impersonation 
Safety tips > User impersonation 
Safety tips > Domain impersonation 
Safety tips > Unusual characters 
Mailbox intelligence 
Mailbox Intelligence > Protection 
Mailbox Intelligence > Action 
Enable antispoofing protection 
Enable Unauthenticated Sender Feature 
Action 
Advanced phishing thresholds 
Office365 AntiPhish Default 
Off 
On 
Off 
Don't apply any action 
Quarantine the message 
On 
On 
On 
On 
On 
Move message to the recipients' Junk Email folders 
On 
On 
Move message to the recipients' Junk Email folders 
2 - Aggressive 
Edit 
Edit 
Edit 
Give feedback
ATP anti phishing default policy

Advanced phishing thresholds

You have the option to specify how to treat detected phishing messages using thresholds. Microsoft recommend setting this to threshold 2 – Aggressive.The following thresholds are available:

1 – Standard: This is the default value. The severity of the action that’s taken on the message depends on the degree of confidence that the message is phishing (low, medium, high, or very high confidence).

2 – Aggressive: Messages that are identified as phishing with a high degree of confidence are treated as if they were identified with a very high degree of confidence.

3 – More aggressive: Messages that are identified as phishing with a medium or high degree of confidence are treated as if they were identified with a very high degree of confidence.

4 – Most aggressive: Messages that are identified as phishing with a low, medium, or high degree of confidence are treated as if they were identified with a very high degree of confidence.

Other ATP functionality

Besides ATP Safe Attachments, ATP Safe Links and ATP Anti Phishing, the Office 365 ATP suite provides the following other functionality.

Real-time reports

When you have licensed Office 365 ATP some extra reports are available in the Security & Compliance Center. The following ATP reports are available:

  • Threat Protection Status Report
  • ATP File Types report
  • ATP Message Disposition report
  • Real time detections (ATP Plan 1) or Explorer (ATP Plan 2)
  • Email security reports (Top Senders and Recipients, Spoof Mail, Spam Detections)
The Security & Compliance Center dashboard can help you see where Advanced Threat Protection is working
Reports

You also have the ability to generate some reports using PowerShell

  • ATP Safe Links URL trace, using the Get-UrlTrace cmdlet
  • EOP and ATP results, using the Get-MailTrafficATPReport cmdlet
  • EOP and ATP detections, using the Get-MailDetailATPReport cmdlet.

Unfortunately I haven’t found an easy way yet to get the same reporting data into PowerBI for example, for now the only options you have is to either export data to CSV and work from there, or have reports send to you via email.

Threat Trackers

Threat Trackers are informative widgets and views that provide you with intelligence on different cybersecurity issues that might impact your company. The following views are available:

  • Noteworthy campaigns
  • Trending campaigns
  • Tracked queries
  • Saved queries
Machine generated alternative text:
Home > Threat tracker 
Tracked queries 
Yesterday's top tracked qu.._ 
Weekly top tracked queries 
Top tracked queries by % (last seven days) 
o 
blocked phish 
The tracked queries let you get regular assessment of malware, phish and other events with the scope you've defined from Threat Explorer. This is useful in monitoring items frequently, providing reports, or evaluating certain threats or 
groups quicker. There are a limited number of tracked queries allowed for your company's instance ofthe Office 365 service. You can change a saved query to track it by using the edit option for that query. Note: If you change the 
filter settings on a tracked query, the trending information will not be fully accurate until a week after the change is made. 
e; Saved query settings 
Date created 
1/31/20 
Name 
blocked phish 
Today's message count 
Prior day message count 
Trend: today vs. prior week 
O 
Actions 
Explore 
Need help? 
Give feedback
Tracked queries in Threat Tracker

Treat Investigation

Depending on which ATP version you licensed you can either use “Real-time detections” (Plan 1) or use “Explorer” (Plan 2). You can find the differences between Real-time detections and Explorer in this downloadable PDF.

Real time detections

Real-time detections contain views, such as Malware (for email and content), Submissions, and Phish. Real-time detections is a real-time report that lets authorized users identify and analyze recent threats.

Explorer

Explorer provides the functionality of Real time detections providing more filter options , for example within Explorer you can search for “All email” while in Real time detections only Malware, Submissions, Phish and Malware is available.

Machine generated alternative text:
Home > Explorer 
View All email 
Save query 
Directionality V 
Directionality : InboundX 
v Delivery action 
30 
25 
20 
15 
10 
5 
0 
Save query as O Saved query settings 
Inbound Outbound Intra.org 
Export V 
C) 
Y Advanced filter 
2020-04-23 
00:00 
2020-04-29 
Delivered 
ITI 
23:30 
Blocked 
WDATP Settings 
Delivered to junk 
000000 
o o Ax o o ex o o Ax o o ex o o Ax o o ex o o Ax 00 
00
Explorer

Automatic incident response

ATP Plan 2 provides Automated investigation and response (AIR) capabilities. AIR automates the investigation of incoming alerts. These automated investigations are called security playbooks.

While an automated investigation runs, it gathers additional data about the email in question and entities related to that email. Such entities can include files, URLs, and recipients.

The investigation’s scope can increase as new and related alerts are triggered. During and after an automated investigation, details and results are available to view.

Results include recommended actions that can be taken to respond and remediate any threats that were found. In addition, a playbook log is available that tracks all investigation activity. Your security operations team reviews the investigation results and recommendations, and approves or rejects remediation actions.

Machine generated alternative text:
Mail with phish urls is zapped - urn:ZappedPhishlnvestig... 
Invutigatizn 
"westgation graph 
zzpPhish 
zzgPhish 
is 
ines 
Trigwing (1) 
i 
found A) 
Actions 
soft 121 
Actims O
Automated Investigation and Response

Attack Simulator

You can use Attack Simulator to run realistic attack scenarios in your organization. This can help you to identify and find vulnerable users before a real attack hits. If you want to make use of Attack Simulator, your account must have MFA enabled.

At time of writing the following attacks are available:

  • Spear Phishing (Credentials Harvest)
  • Spear Phishing (Attachment)
  • Brute Force Password (Dictionary Attack)
  • Password Spray Attack
Machine generated alternative text:
Home > Attack simulator 
Simulate attacks 
Simulate attacks to test your defenses 
Run realistic phishing attempts, such as spear phishing and password attacks, to identify vulnerable users within your 
organization. 
4 Attacks 
Spear Phishing (Credentials Harvest) Account Breach 
A spear-phishing attack is a targeted attempt to acquire sensitive 
information, such as user names, passwords, and credit card 
information, by masquerading as a trusted entity. This attack will use a 
URL to attempt to obtain user names and passwords. 
Spear Phishing (Attachment) Account Breach 
A spear-phishing attack is a targeted attempt to acquire sensitive 
information, such as user names, passwords, and credit card 
information, by masquerading as a trusted entity. This attack will use 
an attachment and try to get the end user to open it. 
Brute Force Password (Dictionary Attack) Account Breach 
A brute-force attack dictionary is an automated, trial-and-error 
method of generating multiple passwords guesses from a dictionary 
file against a users password. 
Password Spray Attack Account Breach 
A password spray attack is an attempt to try commonly used 
passwords against a list of user accounts. 
CD Refresh 
Launch Attack 
Attack Details 
Launch Attack 
Attack Details 
Launch Attack 
Attack Details 
Launch Attack 
O Need help? 
Give feedback

Troubleshooting

Before you start implementing EOP and ATP make sure that you understand how you can troubleshoot email delivery issues. One of the most necessary tools for this is the Message Header Analyzer (MHA), available via: https://mha.azurewebsites.net/pages/mha.html. The MHA is capable of transforming the message header of an email into a more readable form giving you better options to troubleshoot what’s going on when email isn’t delivered as expected.

Most important in the message header is the X-Forefront-Antispam-Report header, containing all the information you need in order to determine why what happened to an email.

More information about how to read that header here: Anti-spam message headers

In my opinion the best thing you can do is to make sure that most email gets through, so don’t use Connection Filtering or Mail Flow rules to drop email at the front gate but preferably have it go through EOP and either delivered to Quarantine or the Junk Email folder of the user, or dropped afterwards (f.e. when it contains an attachment containing malware). By doing this you have the best options to retrieve false positives and not lose any email.

If email from a legitimate sender ends up in Quarantine/Junk Email this could be because the sender didn’t configure their environment yet in a decent way. First thing would be to point them on that issue of course but sometimes this isn’t possible (yet), in that case you can make exceptions, for example by defining a very specific Transport rule, or by allowing a sender to spoof.

Some more information on that:

Create safe sender lists

Use spoof intelligence to configure permitted senders of unauthenticated email

Implementation planning

Implementing Exchange Online Protection and Advanced Threat Protection requires careful planning. Below are some high level steps on how to proceed if you plan to start implementing this.

  1. Start with documenting the current settings (IST), This helps you to identify where you are coming from
  2. Start with documenting the wanted settings (SOLL)
  3. Make sure that you have licensed your users for using ATP
  4. Find a group of user in your organization who can serve as a pilot group, some (unfortunately not all) settings can be applied to a pilot group first before implementing them for your whole organization. Once your pilot group gives its OK, plan to implement the solution for all users.
  5. Prepare each change carefully, make sure that you include a rollback plan and know how to monitor the change for its expected outcome. Also make sure that you know how to troubleshoot, invest time to fully understand what is going on. And believe me, this can some time.
  6. Make sure that you update your procedures, for example to make sure that when a new domain is added to your Office 365 environment, that you also include that domain in your defined policies.
  7. Make sure that you regularly review your settings compared to your baseline, using the ORCA PowerShell script is a great way to do so
  8. Make sure you regularly review what Microsoft is changing, and determine its impact on your environment.

Conclusion

Even though this has become quite a blogpost (TL;DR;) I still have the feeling that I only touched some of the functionality available in Office 365 Advanced Threat Protection. Consider this a brain dump, where I also realize that I might have missed some important functionality.

I do hope this post can serve as a good starting point if you are planning on implementing this functionality in your environment. Keep in mind though that you must consider Exchange Online Protection to be in-scope as well.

References

Introducing Office 365 Advanced Threat Protection

Office 365 Advanced Threat Protection service description

What is this Microsoft Intelligent Security Graph everybody is talking about?, by Maarten Goet

Best practices for configuring EOP and Office 365 ATP

Recommended settings for EOP and Office 365 ATP security

Use ORCA to Check Office 365 Advanced Threat Protection Settings, by Tony Redmond

ATP Safe Links

Set up Office 365 ATP Safe Links policies

Set up a custom do-not-rewrite URLs list using ATP Safe Links

ATP Safe Links warning pages

Schooling A Sea of Phish Part 1: How Office 365 Advanced Threat Protection Helps Stop Spear Phishing

Identify suspicious messages in Outlook.com and Outlook on the web

How spoofing is used in phishing attacks

Tweet
Follow me
Tweet #WPNinjasNL

Continue Reading

← Azure AD Identity Protection deep dive
Office 365 Templated policies and Preset security policies in Exchange Online Protection and Office 365 ATP →

6 thoughts on “Office 365 Advanced Threat Protection (ATP) deep dive”

  1. Pingback: Office 365 Templated policies and Preset security policies in Exchange Online Protection and Office 365 ATP | Modern Workplace Blog
  2. Thilo Graf says:
    December 10, 2020 at 4:20 pm

    Is there a way to test the safe attachment function? I know I can use http://www.spamlink.contoso.com to test the safelinks.

    Reply
    1. Kenneth says:
      December 10, 2020 at 5:16 pm

      Hi Thilo,

      There is not an eicar equivalent for this unfortunately. When writing the article I had the same question but couldn’t find a clear answer. There is a UserVoice item for this though, and I just voted: https://office365.uservoice.com/forums/289138-office-365-security-compliance/suggestions/34609375-advanced-threat-protection-safe-attachments-ei

      Further I have seen people use a macro in a word document doing something fishy, but those docs don’t work for long if you also have AV software running unfortunately.

      During my implementation we eventually decided to use the logging as proof that it was working 🙂 – and luckely we already caught some bad attachments at day one after implementation

      If I do find something usefull, I will definitely update my blogpost.

      Thanks for visiting my blog!

      /Kenneth

      Reply
      1. Thilo Graf says:
        December 25, 2020 at 12:28 pm

        Hi Kenneth,
        I just tried using a doc calling a powershell, that ist blocked and logged successfully after sending it via in E-Mail. I tried the same doc in Teams, expecting it would be blocked when opening in the webbrowser…but nothing happens. When I download it to Word my defender catches it.

        Reply
  3. Jeroen says:
    December 7, 2021 at 4:45 pm

    Hi Kenneth,
    Microsoft recently introduced “Preset security policies in EOP and Microsoft Defender for Office 365”. These extra policies don’t make the whole ATP configuration simpler. If you look at SafeLinks for example, the preset “Built-in protection” has “Link protection with Safe Links” enabled. Does this mean that you don’t have to create any (extra) Safe Links policy anymore (if you don’t add exclusions to the “Built-in protection” policy) if you want to implement Safe Links to your organization? If this is the case, what should you do if you want to exclude some websites from rewriting? Do you need to create a custom policy in which you configure these sites? And if so, do you have to add (again) all the domains that are included for this custom policy? I feel like there are to many locations where you can/must configure these settings, presets, global, custom. Can you maybe explain the way these presets work together with the settings we already had? Also the Threat Policies have had a major update since your last article (what’s new with Microsoft 😉 ).
    Thanks in advance,
    Jeroen

    Reply
    1. Kenneth says:
      December 14, 2021 at 2:18 pm

      Hey Jeroen,

      Thanks for your comments, and true the products has changed a lot since writing this article.
      For exclusions you indeed have to create a custom policy, while you can enable the feature on the global level.

      The presets are a baseline, global settings are global and custom are customizations – sounds obvious but I do agree MS can do a better job making this more clear.

      I will make a backlog item, to explain what has changed in the meantime 🙂 Thanks for commenting

      /Kenneth

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Founding member of:

Recent Posts

  • MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • Navigating New Authentication Methods: SMS for Password Reset, Not for MFA
  • From SPF to DANE: Securing Microsoft 365 Email Communications
  • Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals

Books

System Center 2012 Service Manager Unleashed
Amazon
System Center 2012 R2 Configuration Manager Unleashed: Supplement to System Center 2012 Configuration Manager
Amazon
System Center Configuration Manager Current Branch Unleashed
Amazon
Mastering Windows 7 Deployment
Amazon
System Center 2012 Configuration Manager (SCCM) Unleashed
Amazon

Archives

  • February 2025
  • January 2025
  • September 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • September 2023
  • August 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • May 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • August 2019
  • July 2019
  • November 2016
  • November 2015
  • June 2015
  • May 2015
  • November 2014
  • July 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • November 2013
  • August 2013
  • April 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • August 2012
  • July 2012
  • June 2012

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • ABM (4)
  • Advanced Threat Protection (4)
  • Announcement (44)
  • Azure (3)
  • AzureAD (73)
  • Certification (2)
  • Cloud App Security (5)
  • Conditional Access (58)
  • Configuration Manager (24)
  • Entra (2)
  • Entra Id (8)
  • Events (14)
  • Exchange Online (9)
  • Identity Protection (5)
  • Intune (27)
  • Licensing (2)
  • Microsoft Defender (1)
  • Microsoft Defender for Endpoint (1)
  • Microsoft Endpoint Manager (35)
  • Mobile Application Management (4)
  • Modern Workplace (74)
  • Office 365 (10)
  • Overview (11)
  • Power Platform (1)
  • PowerShell (2)
  • Presentations (9)
  • Privileged Identity Management (5)
  • Role Based Access Control (2)
  • Security (63)
  • Service Manager (4)
  • Speaking (30)
  • Troubleshooting (4)
  • Uncategorized (11)
  • Windows 10 (15)
  • Windows 11 (5)
  • Windows Update for Business (4)
  • WMUG.nl (16)
  • WPNinjasNL (32)

Tags

#ABM #AzureAD #community #conditionalaccess #ConfigMgr #IAM #Intune #m365 #MEM #MEMCM #microsoft365 #modernworkplace #office365 #security #webinar #wmug_nl ATP authentication strength AzureAD Branding Community Conditional Access ConfigMgr ConfigMgr 2012 Email EXO Identity Intune Licensing M365 MCAS MFA Modern Workplace Office 365 OSD PIM Policy Sets Presentation RBAC roles Security System Center Task Sequence troubleshooting webinar

Recent Comments

  • brc on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • [m365weekly] #186 – M365 Weekly Newsletter on MAM vs. MDM: Choosing the Right Mobile Management Approach
  • Dean Gross on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)
  • nikhil tech on Protecting your Break Glass accounts in Entra now that MFA gets enforced on more and more Admin portals
  • Kenneth on Comparing Web Filtering and Security: Microsoft Entra Internet Access (Global Secure Access) vs. Microsoft Defender for Endpoint (MDE)

This information is provided “AS IS” with no warranties, confers no rights and is not supported by the author.

Copyright © 2021 by Kenneth van Surksum. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

Shorthand: Don’t pass off my work as yours, it’s not nice.

©2025 Modern Workplace Blog | Powered by WordPress and Superb Themes!
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT