In this module

AD2.1 Why Default Email Filtering Is Not Enough

5-6 hours · Module 2 · Free
Operational Objective
Exchange Online Protection (EOP) is included in every M365 subscription and runs by default. It catches known malware, obvious spam, and bulk email. What it does not catch reliably: phishing emails from newly registered domains, credential harvesting links on legitimate-looking landing pages, weaponised documents that use macros or DDE to download payloads, and spoofed emails that impersonate your CEO or a trusted vendor. These are the attacks that actually compromise M365 tenants — and they sail through EOP's default filtering because they don't match known malware signatures and they come from domains with no prior reputation. Defender for Office 365 Plan 1, which is already in your E3 license, adds the three controls that close these gaps: Safe Links (click-time URL scanning), Safe Attachments (sandbox detonation), and enhanced anti-phishing (impersonation detection). This subsection explains what EOP catches, what it misses, and why enabling Defender for Office 365 features is the second highest-impact action after MFA.
Deliverable: Understanding of the specific gap between EOP default filtering and Defender for Office 365 Plan 1, with evidence from your own environment showing what's getting through.
Estimated completion: 25 minutes
EMAIL FILTERING: EOP DEFAULT vs DEFENDER FOR OFFICE 365 EOP — WHAT YOU HAVE NOW ✓ Known malware (signature-based) ✓ Bulk spam from known spam networks ✓ Spoofed emails from within your org (basic spoof intel) ✓ Emails with known malicious attachment hashes ✗ URLs that become malicious AFTER delivery ✗ New/unknown malware in attachments ✗ Credential phishing on clean domains ✗ CEO/vendor impersonation (display name spoof) Catches ~60-70% of threats. The rest get through. DEFENDER FOR O365 P1 — WHAT YOU ADD ✓ Safe Links — URL checked at CLICK time, not delivery ✓ Safe Attachments — sandbox detonation before delivery ✓ Impersonation protection (CEO, vendor domains) ✓ Mailbox intelligence (learns user patterns) ✓ First contact safety tip (never emailed before) ✓ Real-time URL detonation for unknown links ✓ User-reported phishing with admin review Included in E3. Just needs policy configuration. Catches ~90-95% of threats. Major improvement.

Figure AD2.1 — EOP catches known threats using signature matching and reputation. Defender for Office 365 Plan 1 adds click-time URL scanning, attachment sandboxing, and impersonation detection — catching the sophisticated phishing that EOP misses. Both are included in E3. EOP is active by default. Defender for Office 365 requires policy configuration.

What gets through EOP — real examples

The phishing emails that compromise M365 tenants are not the ones EOP catches. They are the ones EOP misses. Understanding why they get through tells you exactly what Defender for Office 365 fixes.

Credential phishing on newly registered domains. The attacker registers a domain 24 hours before the campaign — microsoftonline-verify.com, m365-security-update.net, or something equally plausible. The domain has no reputation — it's never sent spam, never hosted malware, never appeared on any blocklist. EOP has no basis to block it. The email contains a link to a convincing Microsoft login page hosted on this new domain. The user clicks, enters their credentials, and the attacker captures them. Defender for Office 365 Safe Links catches this because it scans the URL at click time — even if the URL was clean at delivery, Safe Links checks the destination when the user actually clicks. If the destination is a credential harvesting page, Safe Links blocks it.

Weaponised documents with no known signature. The attacker sends a Word document that uses a macro to download a payload from a legitimate file-sharing service (Dropbox, Google Drive, SharePoint). The document itself doesn't contain malware — the malware is downloaded after the user opens the document and enables macros. EOP's signature-based scanning doesn't flag it because the document is clean. Defender for Office 365 Safe Attachments catches this because it opens the document in a sandbox, observes the macro execution, watches the payload download, and blocks delivery if the behavior is malicious.

CEO impersonation via display name spoofing. The attacker creates a Gmail account with the display name "James Morrison — CEO" and sends an email to the finance team: "I need you to process this wire transfer urgently." The email comes from a legitimate Gmail address, not from your domain, so SPF and DKIM pass for Gmail. EOP doesn't flag it because it's technically a legitimate email from Gmail — there's no spoofing of your domain. Defender for Office 365 anti-phishing with impersonation protection catches this because it compares the display name against your protected users list and flags the mismatch between the display name (your CEO) and the sender domain (Gmail).

Checking your current email threat exposure

Before you configure Defender for Office 365, assess what's currently getting through. Navigate to security.microsoft.com → Email & collaboration → Explorer (or Reports → Email & collaboration reports if you don't have Threat Explorer).

If you have access to the Threat & vulnerability management reports, check the "Threat protection status" report. This shows the volume of email threats detected by type (malware, phish, spam) and the verdict (blocked, delivered, delivered to junk). The "Delivered" column tells you how many threats reached user inboxes despite EOP filtering.

If you don't have access to Explorer (it requires P2), use the simpler reports. Navigate to security.microsoft.com → Reports → Email & collaboration → Mailflow status summary. This shows total email volume and the percentage categorized as spam, phish, or malware. Even at the summary level, this tells you whether phishing emails are reaching users.

For a practical test of your current state, ask your users: "How many suspicious emails did you receive this week?" If the answer is more than zero, those are the emails EOP didn't catch. Each one is a potential compromise if the user clicks.

You can also check the message trace for phishing delivery. Navigate to the Exchange admin center (admin.exchange.microsoft.com) → Mail flow → Message trace. Search for emails delivered in the last 7 days where the subject contains common phishing keywords: "password expires," "account suspended," "verify your identity," "urgent action required." Review the results — if any of these were delivered to user inboxes (not quarantined), your email filtering has gaps that Defender for Office 365 closes.

For a more systematic check, use PowerShell to query message trace data for the last 7 days and identify delivered emails from external senders with suspicious patterns:

Connect-ExchangeOnline
$start = (Get-Date).AddDays(-7)
$end = Get-Date

# Find all delivered emails from external senders
Get-MessageTrace -StartDate $start -EndDate $end -Status "Delivered" |
    Where-Object { $_.SenderAddress -notlike "*@northgateeng.com" } |
    Group-Object SenderAddress |
    Sort-Object Count -Descending |
    Select-Object Name, Count -First 20

This shows which external senders delivered the most email to your organization in the last week. Review the top senders — are they all legitimate? If you see a sender you don't recognize delivering 50+ emails, investigate the content. The volume alone isn't suspicious (newsletters, vendor communications), but an unfamiliar sender delivering high volume warrants a closer look.

You can also check specifically for emails that EOP flagged but delivered anyway — the ones that landed in Junk rather than being blocked:

Get-MessageTrace -StartDate $start -EndDate $end -Status "FilteredAsSpam" |
    Group-Object Subject |
    Sort-Object Count -Descending |
    Select-Object Name, Count -First 10

Repeated subjects in the spam filter (the same phishing subject hitting multiple users) indicate a campaign targeting your organization. These are the emails Defender for Office 365 would have caught before delivery with Safe Links and Safe Attachments — and the evidence for why you need to configure those controls now.

One more check: verify whether Microsoft's preset security policies are active. Navigate to security.microsoft.com → Policies & rules → Threat policies → Preset security policies. Microsoft provides two presets — "Standard protection" and "Strict protection" — that configure Safe Links, Safe Attachments, and anti-phishing with recommended settings. If neither is active, no preset protection is applied. For most organizations, the "Standard protection" preset is a reasonable starting point — but building your own policies (as this module teaches) gives you control over every setting. If you want to get protection running in 2 minutes before customising, enable the Standard preset and refine it later.

Expand for Deeper Context

The gap between EOP and Defender for Office 365 reflects a fundamental shift in how phishing works. In 2015, phishing emails were crude — bad grammar, obvious fake domains, executable attachments. Signature-based filtering caught most of them. In 2026, phishing emails are crafted by AI, hosted on infrastructure that's hours old, and use legitimate services for payload delivery. The attack has evolved past what signature-based detection can reliably catch.

Defender for Office 365 addresses this by shifting from reputation-based detection (is this domain known-bad?) to behavior-based detection (does this URL redirect to a credential harvesting page? does this attachment execute code when opened? does this display name match a protected user from a mismatched domain?). The behavior-based approach catches threats that have no prior reputation — which is the majority of targeted phishing.

The E3 license includes Plan 1, which gives you Safe Links, Safe Attachments, and enhanced anti-phishing. Plan 2 (included in E5) adds Threat Explorer for investigation, Threat Trackers for campaign tracking, Automated Investigation and Response for email threats, and Attack Simulation Training. This module covers Plan 1 capabilities — which are sufficient for most organizations and available at no additional cost.

Compliance Myth: "Our users are trained not to click phishing links, so we don't need technical email controls"
Security awareness training reduces click rates from approximately 30% to approximately 5-10%. This is a meaningful improvement, but it means that in a 200-user organization receiving 5 phishing emails per week, you can expect 1-2 users to click every week. Training is a layer, not a solution. Technical controls (Safe Links, Safe Attachments, anti-phishing policies) catch the emails before users see them. Training catches the ones that technical controls miss. You need both. Relying on training alone is like removing the guardrails from a mountain road and handing out brochures about careful driving.

The deployment sequence for email protection

Email protection follows the same phased approach you used for identity in Module AD1. The sequence is: Safe Links first (highest impact, lowest blast radius), then Safe Attachments (high impact, small delay to email delivery), then anti-phishing tuning (medium impact, requires understanding your organization's communication patterns), then email authentication (SPF, DKIM, DMARC — high impact but requires DNS access and careful rollout).

Each of the following subsections covers one control with step-by-step configuration, blast radius analysis, testing procedures, and monitoring queries. By the end of this module, your email protection will be fully configured and your phishing exposure will drop from "whatever EOP catches" to "95%+ blocked before delivery."

Decision point

You've completed Module AD1 (identity — MFA and conditional access deployed). You're about to start configuring email protection. A colleague suggests: "Why bother with email protection? MFA catches the credential theft anyway." Is this reasoning sound?

Option A: Yes — MFA stops credential attacks regardless of how the credentials were obtained, so email protection is redundant.

Option B: No — email protection and identity controls address different parts of the attack chain, and both are needed.

The correct answer is Option B. MFA stops the attacker from using stolen credentials, but it doesn't stop the phishing email from reaching the user. Each phishing email that reaches a user's inbox creates risk: the user might enter credentials on an AiTM proxy that captures the session token (bypassing MFA), the user might download a malware payload that doesn't require credentials at all, or the user might forward the email to colleagues who aren't as security-aware. Email protection reduces the volume of threats users face. Identity controls catch what gets through. Defense in depth — not either/or.

Try it: Check your email threat exposure

Navigate to security.microsoft.com → Reports → Email & collaboration reports. Open the "Threat protection status" report if available, or the "Mailflow status summary" report.

Record three numbers: total email volume for the last 30 days, the number of emails categorized as phishing, and the number of phishing emails that were delivered to user inboxes (not quarantined or blocked). If the "delivered phishing" count is greater than zero, those are the emails that Defender for Office 365 Safe Links and Safe Attachments would have caught.

Now navigate to the Exchange admin center → Mail flow → Message trace. Search for the last 7 days with a subject filter for "password" or "verify." Review any results that show "Delivered" status. These are potential phishing emails that reached user inboxes — each one is evidence for why email protection beyond EOP defaults is necessary.

A user receives an email with a link to what appears to be a Microsoft 365 login page. The email passed EOP filtering because the link destination was clean at delivery time — the phishing page was activated 2 hours after the email was sent. The user clicks the link 4 hours after delivery. Which control catches this?
EOP anti-phishing — No. EOP evaluated the email at delivery time when the URL was clean. EOP doesn't re-scan URLs after delivery.
Conditional access — Conditional access would block the sign-in after the user enters credentials, but it doesn't block the phishing page itself. The user still sees the fake login page and may enter credentials. If the attacker is using an AiTM proxy, conditional access with device compliance would block the token replay, but the user's credentials are still captured.
Safe Links — Correct. Safe Links rewrites URLs at delivery and scans the destination at click time. When the user clicks 4 hours after delivery, Safe Links checks the URL again. By then, the phishing page is active, and Safe Links blocks access with a warning page. The user never sees the fake login page.
Safe Attachments — No. Safe Attachments scans file attachments, not URLs. URL protection is Safe Links.

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus