Tags
malware activity virus scope autoruns Proxy servers fallback flag Inactive discovered devices SNMP Apple Device Enrollment Program set up service explorer manually deploy Comodo EDR agent parent process multiple ticket selection selected tickets security events folder transfer discoveries network management remote folder TLS TLS1.2 pci dss pci compliance ITarian Portal Endpoint Manager vdi environment vdi clone environment instant clone documentation vendor notice security dashboard events resolution remote tool partner onboard itarian unknown file hunter TLS Encryption procedure parameters pass profiles history performance metrics real time remote endpoints download browse service URL Security Components system Global Software Inventory 2 minutes Integrate intagrate Active Directory Portable Interception SSL enable reporting Rule Threat Protection Rule Advance spam Customize archived outgoing incoming administrator validate domains add Antispam type PCI data loss Location Network information start software session extensions appoinments resource connection computers Comodo Rescue Disk infected opportunity opportunities custom relationship management quote COMODO-CRM protect mac device email notifications registry COM Quarantined point system restore msi contained applications processes security client events Release date department registration particular os section Two Factor Authentication Login interface dashboard report generate Direct Download Link One drive Google drive HIPS mode cleanup automatic suspicious suspicious certificates shellcode injection detect Elevated Access system user access default charging groups move current malware list store push IP address ip installer acronis auto-remediation server machine icon Product Logos Rebrand backup Device Control data Chromoting WebRTC ports Protocol skip offline manual time entries ticket assignee Help Guide Tour schedule Reschedule appointment unknown application protection virtual desktop Local Verdict server manage calculation cost configuration charging SD contract prepaid hours products classification inventory analyze Device list OS patches global search bar Tool bar Windows Defender Security Center file group white Citrix record SPF work billable time onsite email template template variables emails Gmail SMTP disable Add collaborators admin action Audit logs feature requests submit vote remotely Reset proxy swg secure web gateway dome error disk ticket detail page thread section tickets section internal notes Sub-help topic help topic features Application control white_list Patch Management child parent scheduled customized get to headers columns company restrict customer technician remote access list iOS devices field Reports iOS device APN Certificate MAC OS X options Linux block Comodo Client Communication (CCC) allow Comodo Client Security (CCS) network zones active component tray icon hide show packages additional install block port baseline installation package bulk implement restrict firewall endpoints security and communication global export virus import Database folders files define exclusions change staff admin rating check reassign assign permissions new role create for user of device enroll associated use how profile specific Removing Devices Uninstall windows profile Configuration templates latest version clients comodo file ratings monitoring custom All Devices Ratings Track widgets Agent valkyrie malware files Kill chain report automated establishing endpoint remote session Users prevent Android organization windows assets Mac OS billing identified threats Sort Closed inside Program executed containment service desk remote control Locally runs update scan antivirus SLA Business Hours control CCS Password access Client Auto Specific Device Response Application Third party Status View Logs intended devices alert fails Company Information Configure Verdict Patch Procedures Executable Comodo Internet Security ITSM Analysis Command Line Heuristic Filter Unrecognized Trusted File Rate Malicious Purge Calendar Device Exclusion USB Admin Panel Settings ticket Default system-wide Specific Path Details Monitor Multi Set Currency Connected Who Quick Actions Comparison Version Enterprise Managed Service Provider C1 Portal Remote management Comodo Remote Control ticket management staff panel assign tickets
More

Integration with Microsoft Office 365

Release Time
04/26/2018
Views
2325 times
Category
Dome Antispam
Tags

Environment : Comodo Dome Antispam

Summary : Comodo Dome Antispam O365 Integration Guide

Video Tutorial : Uploaded video link will be put here.


CONFIGURING SECURE EMAIL GATEWAY SETTINGS

Office 365 Check on your Dome Antispam

Configure the corresponding inbound settings in Comodo Dome Antispam to route emails sent to your domain to Office 365.

  1. Log in to the your Dome Antispam main DASHBOARD
  2. Select SMTP from the left side menu and then select DOMAINS under this SMTP part
  3. Select OFFICE 365 CHECK from the right tab
  4. Configure Office 365 check according to below options
    1. Enable Office 365 SUPPORT
    2. Activate Office 365 SENDER DOMAIN CHECK
    3. Select and Copy your managed DOMAIN NAMES of your Office 365 server from left side list to the right

Note: You do not need to input any IP or MX record of Office 365 servers since Comodo Dome Antispam gets the necessary routes automatically in system background.


CONFIGURING OFFICE 365 SETTINGS

Inbound Flow Set Up on Office 365

  1. Log in to your Microsoft Office 365 administrator center account
    1. Click on ADMIN from left navigation menu
    2. Click EXCHANGE under ADMIN
    3. Click MAIL FLOW from left navigation menu.
    4. Click CONNECTORS from top navigation menu.
  2. Add an Inbound Connector.
    1. Select PARTNER ORGANIZATION in From part.
    2. Select OFFICE 365 in TO part.
  3. Enter a descriptive name to the NAME field for the inbound connector.
  4. Choose USE THE SENDER’S IP ADDRESS.
  5. In Specify the sender IP addresses range field,
    1. ADD new connector
    2. ENTER the IP address or addresses for the organization you want to add to the safe list. This will be the IP address of your Dome Antispam Server. This information is provided by Comodo to you in the information email after the provisioning step completed.
    3. NOTE: You may have Office 365 only accepts rr in range of 24 to 32 (nnn.nnn.nnn.nnn/rr), please modify the rr from SEG instructions to the closest Office 365 allows you to set. For example: 216.104.0.0/19 you can enter as 216.104.0.0/24.
    4. The IP addresses in the screenshots is for just giving an example for you. Please always use information from the information email coming from Comodo support team as primary source.
  6. Choose the SECURITY RESTRICTIONS you want.
  7. Click SAVE to confirm.

 

Add an email flow rule to bypass spam filtering

Turn off spam filtering in Exchange Online and use your Comodo Secure Email Gateway only

  1. Log in to your Microsoft Office 365 administrator center account
    1. Click on ADMIN from left navigation menu
    2. Click EXCHANGE under ADMIN
    3. Click MAIL FLOW from left navigation menu.
    4. Click RULES from top navigation menu.
  2. Select BYPASS SPAM FILTERING from pull-down menu.
  3. In the opening RULE window, complete the required fields.
    1. Name: Turn off spam filter in Office 365
    2. Apply this rule if...
      1. Select THE SENDER
      2. Select IP address is in any of these ranges or exactly matches
      3. In the Specify IP address ranges window, ENTER the SAME IP addresses from step 5-b of INBOUND MAIL FLOW SETUP section above
      4. Click the ADD ICON for each range
      5. Click OK
    3. Do the following: Set the spam confidence level (SCL) to… - Bypass spam filtering
    4. Except if: DO NOT add an exception
    5. Audit this rule with severity level: DESELECT
    6. Choose a mode for this rule: ENFORCE
  4. Click SAVE

 

Add an email flow rule to lock down Exchange Online

This accepts only emails from Secure Email Gateway to ensure spammers cannot bypass.

  1. Log in to your Microsoft Office 365 administrator center account
    1. Click on ADMIN from left navigation menu
    2. Click EXCHANGE under ADMIN
    3. Click MAIL FLOW from left navigation menu.
    4. Click RULES from top navigation menu.  
  2. Select RESTRICT MESSAGES by sender or recipient … from pull-down menu.
  3. In the opening RULE window, complete the required fields.
    1. Name: Only accept inbound mail from SEG
    2. Apply this rule if...
      1. Select THE SENDER IS LOCATED
      2. In the Select Sender Location window, select Outside the organization
      3. Click OK
    3. Do the following: Delete the message without notifying anyone
    4. Audit this rule with severity level: DESELECT
    5. Choose a mode for this rule: ENFORCE
  4. Add an exception to the allow email flow from Secure Email Gateway
    1. Click MORE OPTIONS
    2. Under Except if, click ADD EXCEPTION
    3. Select The SENDER
    4. Select IP address is in any of these ranges or exactly matches
    5. In the Specify IP address ranges window, ENTER the SAME IP addresses from step 5-b of INBOUND MAIL FLOW SETUP section above
    6. Click the ADD ICON for each range
    7. Click OK
  5. Click SAVE

 

Outbound Flow Set Up on Office 365

  1. Log in to your Microsoft Office 365 administrator center account
    1. Click on ADMIN from left navigation menu
    2. Click EXCHANGE under ADMIN
    3. Click MAIL FLOW from left navigation menu.
    4. Click CONNECTORS from top navigation menu.
  2. Add an Outbound Connector.
    1. Select OFFICE 365 in From part.
    2. Select PARTNER ORGANIZATION in TO part.
  3. Enter a descriptive name to the NAME field for the outbound connector.
  4. Choose the way YOU WANT TO USE THIS CONNECTOR.
  5. Add SEG Relay FQDN to: ROUTE EMAIL through these smart hosts
  6. Add the fully qualified domain name (FQDN) for the purpose of relay messages to this Secure Email Gateway MTA. This FQDN is located in the information email (sent to the administrator after Secure Email Gateway (Dome Antispam) provisioning process has been completed).
  7. Choose the WAY of CONNECTING to SEG
  8. REVIEW your settings.
  9. Add one TEST EMAIL ADDRESS to VERIFY this connector.
  10. VALIDATE this email address.
  11. Click SAVE.


Add an email flow rule to use the SEG Outbound connector

  1. Log in to your Microsoft Office 365 administrator center account
    1. Click on ADMIN from left navigation menu
    2. Click EXCHANGE under ADMIN
    3. Click MAIL FLOW from left navigation menu.
    4. Click RULES from top navigation menu.
  2. Click “+” sign and Select CREATE A NEW RULE from pull-down menu.
  3. In the opening RULE window, complete the required fields.
    1. Name: SEG Outbound
    2. Apply this rule if...
      1. Select THE SENDER IS LOCATED, a new pop out console will be shown.
      2. In the Select Sender Location window, select Outside the organization
      3. Click OK
      4. Click MORE OPTIONS
    3. Do the following:
      1. Redirect message to and then select the following connector.
      2. Select the outbound connector you created for SEG.
    4. Choose a mode for this rule: ENFORCE
    5. Click SAVE

Congratulations! You have completed the installation process. Office 365 is now secured by Dome Antispam which is Comodo Secure Email Gateway (SEG).