A Defense Approach To Protecting Email With Microsoft Exchange Online Protection
A Defense Approach To Protecting Email With Microsoft Exchange Online Protection
Summary: This white paper describes the defence-in-depth approach that the Microsoft Exchange Online Protection (EOP)
online service uses in order to stop malicious email messages from compromising your organization’s security.
Introduction
This white paper outlines the multi-layer defence-in-depth approach that the Microsoft Exchange Online Protection
(EOP) service follows in order to prevent malicious threats in email communication from infiltrating your organization and
compromising the safety of your data. EOP helps to ensure that malicious code or activities are stopped at multiple check
points before reaching the email infrastructure, reducing the probability of infection. EOP scans every single mail arriving to
mailboxes stored in Exchange Online as well as used by tens of millions of users with mailboxes hosted in their IT organizations
on premises
Changing world of email attacks
Due to the constantly evolving threat landscape and scale of email botnets today, content-only scanning is no longer a
viable, scalable strategy. Today, billions of inbound messages are handled in EOP on a daily basis. Out of these, about 66
percent of the messages are spam. Spamming techniques have evolved over the years in order to penetrate several filtering
programs designed to stop the attacks and having a solution to stop such threats has become crucial to business around the
world.
EOP uses a multi layered defence approach throughout the mail delivery process to help ensure that the message
users see is safe. The following diagram shows the architecture for the EOP service as the mail is routed to and from your
organization.
EOP mail filtering process for inbound and outbound mail.
Block lists used by EOP
EOP uses block lists from some third party partners (e.g. Spamhaus, SURBL.org, URIBL.com, Invaluement) but also
maintains its own proprietary block list containing IP addresses of confirmed known senders of spam sent directly to EOP
customers.
A second, much smaller set of addresses is manually compiled by the spam analysts within EOP in response to
observed spam trends. The analysts provide world-class spam research and response capabilities that support the various
spam detection technologies in EOP. With analysts around the globe, EOP is able to respond quickly and effectively to new
threats. Analysts write spam rules to identify spam in the English language in addition to providing language coverage for
many more commonly used languages.
Finally, the EOP block lists are range-weighted - they contain IP addresses that are not known sources of spam, but
whose neighbouring IP addresses are known sources of spam. If an IP address range has several known offenders and no
known sources of legitimate email, EOP might proactively block the entire range as a precautionary measure.
2
• Suspicious originating email servers.
• Suspicious originating email agents.
• Suspicious Message From and SMTP From addresses.
EOP modifies existing rules and adds new ones many times every day, through both automated analysis processes and
manual intervention by the EOP spam analysts.
In addition to the more than 20,000 rules that are used to identify messages as spam, EOP maintains more than
250,000 rules that collectively represent a substantial knowledge base about the characteristics of spam both past and
present. Some of these rules are relatively straightforward, such as the following, which catches messages from a peculiarly
creative phishing scam:
\bpoisoned (?:to death )?by his business associate.
Others are more complicated such as ones which Falsifies Microsoft Office Outlook Message-IDs on email messages
generated by botnets.
EOP maintains a spam trap that siphons off some of the messages that would normally be blocked at the network
edge, and tests them against the entire historical body of rules, including the rules that are currently in use. The EOP spam
analysts use the resulting information to help determine when to retire active rules, and when to bring old rules back into use.
Based on this analysis, it is estimated that EOP would be able to identify and block 95 percent of all spam without
using its edge-blocking layers.
Bulk mail filtering
Bulk email, also referred to as gray mail, is a type of email message that’s more difficult to classify. Bulk email is
typically comprised of an advertisement or marketing message that’s not likely to get sent repeatedly. Bulk email is wanted by
some users, and in fact they may have deliberately signed up to receive these messages, while other users may consider these
types of messages to be spam. Admins can enable the Bulk mail advanced spam filtering (ASF) option that allows admins to
mark all messages that EOP identifies as bulk as being high confidence spam. The service then performs the configured action,
such as sending the message to the recipient’s Junk Email folder. EOP also allows admin to aggressively control the bulk mail
messages by using the Transport rules.
International spam filtering
You can configure EOP to block messages written in specific languages, or sent from specific countries or regions. You can
configure up to 86 different languages and 250 different regions.
Mitigating false positives
The false positive rate for EOP —the ratio of legitimate email incorrectly classified as spam to all messages processed
by the service —is extremely low. During a typical week, when EOP processes two to three billion email recipients, on average
EOP spam analysts determine that about 900 messages are false positives.
This low false positive rate is not due to any particular piece of technology; instead, it’s the natural outcome of the
continuous review and adoption of new anti-spam technologies driven by the EOP engineering team. The team routinely tests
new block lists, technologies, and algorithms by deploying them in an advisory-only capacity, and then compares the results
from the new technology to the results of the existing suite. If the results look promising, the team changes the technology’s
weighting—the degree to which its verdict affects the designation of a message as spam—and gradually tunes that weighting
to an optimal level. The team rejects new technologies that negatively affect the service’s false positive rate and removes
them. It does the same with older technologies whose effectiveness has decreased over time.
In addition to relying on these mitigation strategies, you can use the Exchange admin center (EAC) in the Office 365
admin portal to ensure that your organization’s communications with critical business partners don’t get accidently flagged as
spam. Using the EAC, you can create policy (transport) rules to always allow email coming from certain specific partner
addresses, domains, and IP addresses. Finally, you can use the Microsoft Azure Directory Synchronization Tool to synchronize
your organization’s Outlook and OWA safe sender’s lists with EOP. The result is that email messages sent to an individual from
a listed safe sender will be exempted from spam scanning, but not from virus scanning.
Conclusion
EOP implements a defense-in-depth approach to help protect your organization from spam and malware attacks for email.
This approach makes use of block lists from third party vendors as well as EOP’s proprietary block lists, combined with
Directory-Based Edge Blocking techniques, Bulk Mail Protection , SPF , URL scanning and International spam filtering . The
automated safeguards work in concert with continuous refinements made by a world-class team of spam analysts to provide
powerful protection against unwanted or malicious email threats without impacting normal business communications.