December 22, 2025

October 26, 2023 | Dan

Allow Attachments With Safe Attachments Policy

Allow Attachments

Ok, you have enabled the common attachment filter for your organization to NOT Allow Attachments of a certain type. Great. Here’s the rub….some of those attachment extensions, while most of the time should be blocked occasionally need to be allowed.

In most cases you don’t worry because you use Quarantine settings in MS Security and either you are an admin or the user (Depending on the policy you choose) can release the message. But what if it is an automated system and the blocked extension needs to get through?

Mitigating Blocked Attachments

You can minimize any of the delays a blocked attachment may cause by creating a policy that will let it though. Go to https://security.microsoft.com/safeattachmentv2 in the security portal and click on “+Create” to add a policy:

Allow Attachments

Give your policy a name and a description:

Allow Attachments

Pick who this policy applies to:

Allow Attachments

A note about the above screen. In most cases, it is only a sub-group of users who need to be exempt from attachment blocking. You wouldn’t want to enable this for everyone. Remember, we are mitigating not giving the organization a “carte blanche” with regard to attachments! You also can create this rule as an exclude rule instead.

Allow Attachments

Once the policy is created, click “Submit”.

Allow Attachments

What Allow attachments Does in this Example?

The Account(s) that have this policy assigned to them will allow attachments through but if malware is detected, it will track the scanning results. As a failsafe, the policy DefaultFullAccessWithNotificationPolicy has also been assigned. The account that sent the blocked message will get a notification in their inbox that the message was blocked. It can quickly be released with a mouse click to not disrupt the email flow.

It is not a “silver bullet” solution but it can make sure the email keeps flowing. Especially with automated systems that have minimal intervention.

Now you have a way to Allow Attachments safely!

Share: Facebook Twitter Linkedin
October 23, 2023 | Dan

A Better Exchange Quarantine Notification Process

Exchange Quarantine Notification

MS has told you that you cannot disable Exchange Quarantine Notification to users. Sorry, but that sucks. What you can do is disable the user’s ability to do anything with them. You can create a policy to do this. This is how it is configured:

Configuring an Exchange Quarantine Notification

First go to https://security.microsoft.com/quarantine and click “+ Add Custom Policy.

Exchange Quarantine Notification
Exchange Quarantine Notification

Give the Policy a name nd click “Next”.

Exchange Quarantine Notification

Choose “Limited Access”. This allows the user to receive the notifications but they are unable to act upon them. Click Next.

Exchange Quarantine Notification

Leave “Enable” unchecked and click Next.

Exchange Quarantine Notification

The policy is done. Click Submit!

In this scenario, users will receive a notification in their inbox that a message has been quarantined but they are not able to do anything with it. This is good for a larger organization. Users receive a lot of phishing emails that look very similar to this. They do it on purpose. We are inundated with email and all it takes is one click, and you could be on your way to getting your credentials compromised by some bad actors. It is a good practice to continually mitigate security breaches through email.

What a User Sees with an Exchange Quarantine Notification

It is better to have a process where you take the quarantine message you received and forward it to your helpdesk. They will know right away if the notification is legit or not and then vet the message for its legitimacy.

The user will receive an email like what you see below:

Exchange Quarantine Notification

This is what your users should forward to your helpdesk. That brings us to what the admin sees…

What an Admin Sees with In Quarantine

This is an example from quarantine in the security portal (https://security.microsoft.com/quarantine):

Exchange Quarantine Notification

This is a suspected message that could be phishing or malware. Click on the message and a flyout appears:

Exchange Quarantine Notification

Clicking on “Take Action” on the top right gives you several choices:

Exchange Quarantine Notification

You can choose several options:

Move / Delete – You can move the email to Inbox, Junk or Deleted items. You can also do a hard of soft delete.

Submit to Microsoft – This one is most important. It sharpened the Quarantine filter resulting in fewer false positives which will hope to decrease the number of quarantine notification your users see.

Initiate Automated Investigation – it will launch an investigation with Microsoft.

Propose Remediation – This is the same as releasing the message from Quarantine.

Click Next a couple of more times and you will have submitted either a moved the email somewhere on the users’ profile, submitted the email to Microsoft or released it as safe.

There is one other screen. It asks if you would like to report similar email the same way. I would say yes since it streamlines this process going forward also help users to receive fewer Quarantine notifications.

Setting up an Exchange Quarantine Notification Policy this way will help you reduce any phishing attempts that would look very similar to the notifications that Microsoft sends out.

Share: Facebook Twitter Linkedin
October 19, 2023 | Dan

Bypass MFA With Conditional Access With One Step

Bypass MFA With Conditional Access

You have probably researched tons of articles on how to Bypass MFA With Conditional Access for a single user, group of users or users coming from named or trusted location. All these articles, including Microsoft support, have completely forgotten about one thing that is incredibly important to consider….

What if security defaults are turned off in the tenant?

If they are, then it doesn’t matter how you configure your conditional access rules to bypass MFA for a user, group, named location, trusted location, etc. It is not going to work. You may have security defaults in your tenant turned off for a variety of reasons and believe me they are all valid! Microsoft likes to make things difficult and keep us guessing constantly. It is very frustrating.

In this article I will show you how to prepare your tenant to start using condition access to bypass MFA and set the Conditional Access Policy. Remember, a good MFA Strategy is key. Without further ado, here we go.

Leave Security Defaults Off For Now

As I mentioned before earlier in the post, your tenant may have security defaults turned off for a good reason. Turning it on without knowing the full extent of what it could do could be quite disastrous for the organization (not to mention your Help Desk might get overwhelmed). Turning it on disables using per-User MFA but turns MFA on for the entire organization. You may have a service account(s) or user accounts who for some reason cannot use MFA. Those users will no longer be able to login. Leave it off until you know for sure!!!

Why Would You Want to Bypass MFA

For example, you have an organization that has a corporate office network but lets people work outside of it wherever they want. This will apply to any company who has a work from home policy or employees who travel outside the office a lot.

Configure a Named Location

Being in the office you should always be logging in from the same group of Ip addresses. If not, you are getting your IP dynamically from your ISP. Pay a little extra and you can get a static one. Unfortunately, if you use the cloud only for M365 this is the only way you can Bypass MFA with conditional access.

If you want to use internal IP address of your company to do this, you will need an on prem MFA server and use trusted IP’s from multi-factor authentication service settings

You can create a named location by going to it in Microsoft Entra Admin.

Bypass MFA With Conditional Access

Click “+ New IP ranges”. A new section will pop up on the right. This is where you will add your IP Range. Click the “+” button:

Bypass MFA With Conditional Access

This will pop up:

Bypass MFA With Conditional Access

This is where you will get to add your IP range. You will have to know a little bit about CIDR notation. You cannot specify a single IP address. It has to be a block. If it is only one IP people will be logging in from the office then you can specify the IP address with /27 (i.e. 40.77.182.32/27) but if you are not sure, find out from your network admin or ISP what block to use.

Create The Policy to Bypass MFA with Conditional Access

You will need to go into  The Microsoft Entra Admin center / Conditional Access / Policies to begin:

Bypass MFA With Conditional Access

Click on “+ New Policy”.

Bypass MFA With Conditional Access

Give your policy a name like the example above. Click on the user’s assignment and on the right, you will see which users to add or exclude from this policy. For this example, we are going to only use the include tab. You can select all users but if you want to test first, choose “select Users and Groups” and only add a few users or a test group you have previously created.

Next, go to the target resources assignment, go to the include tab and choose all cloud apps:

Bypass MFA With Conditional Access

You might not be sure of exactly all the apps you use in your organization, but it is safe to include them all. Next, go to the Conditions Assignment:

Bypass MFA With Conditional Access

Click on Locations (Not Configured). The right pane will open giving you options to add “include” and “exclude” locations. Toggle configure, to yes and include all locations:

Bypass MFA With Conditional Access

Click the Exclude Tab and click on Select locations:

Bypass MFA With Conditional Access

Click “None” and choose the named located you specified earlier in the post:

Bypass MFA With Conditional Access

Click on “Not configured” in the Client Apps assignment:

Bypass MFA With Conditional Access

In the Flyout on the right, toggle configure to “Yes” and choose Browser and Mobile apps and Desktop Clients:

NOTE: You shouldn’t be using Legacy clients at this point.

Bypass MFA With Conditional Access

Click on the Grant Assignment and make sure “Grant Access” and require multifactor authentication is checked:

Bypass MFA With Conditional Access

To test this policy, you would move the toggle under the Save button to “report only” to make sure it is functioning correctly. When you are satisfied, as with all conditional access policies, you would toggle it to “On.

The Result of Bypass MFA With Conditional Access

When a user signs in form an IP other than the trusted IP’s you specified in the conditional access policy, the user will be prompted for MFA. This is a good policy because it works for users who also travel locally and abroad. Just remember the one tip I mentioned at the beginning of the post! This is the best way to Bypass MFA With Conditional Access.

Share: Facebook Twitter Linkedin
October 16, 2023 | Dan

Sharing with OneDrive Online in 4 Steps

Sharing with OneDrive Online

Sharing with OneDrive online is very easy and versatile. It is very similar to other file sharing services like Dropbox and Google Drive. Since you already use M365 it is only natural that you use OneDrive.

Accessing OneDrive Online

The easiest way to share with OneDrive is online. For access this way, go to Office.com with your favorite browser and login. Once you get to your portal screen, click the menu icon in the top left and choose OneDrive:

Sharing with OneDrive Online

You will be brought to your “My Files” page:

Sharing with OneDrive Online

From here, you can create files and folders for use and sharing. Files will need to be uploaded from your local computer to a folder you share in OneDrive.

Uploading to OneDrive

Click “Add New”

Sharing with OneDrive Online

And choose which file or folder you wish to upload to OneDrive:

Sharing with OneDrive Online

Setting File Access in OneDrive

If you are collaborating with others, Use “Can Edit” permissions on the share. Use “View-Only “permissions if you would like users to only view and not edit the contents of the documents are sharing. Alternatively, you can prohibit downloading and print of the document or folder content when in “View-Only” by blocking downloads.

Highlight the File / Folder you wish to share as read-only and click the dots (…) beside it. Chose “Share”:

Sharing with OneDrive Online

Next, we will set up who will have access, what kind of access (read-only in this case) and whether to block downloading or printing. Clicking on “Anyone with link can edit” will expand the sharing menu to show all options:

Sharing with OneDrive Online

Becomes:

Sharing with OneDrive Online

If you choose “Anyone with the link” as an option, the Other Settings you can pick are the following:

  1. Read-only or Edit
  2. The date the link expires
  3. Setting a password for the link
  4. Block Download – This prevents downloading or printing. It is ONLY available when access is set to READ-ONLY

Sharing with OneDrive Online

For sharing with People within Algoma or Specific People (Outside the organization), People with existing access or Specific people, it is almost identical except you will not be able to set an expiry date on the link or set a password. In Other Settings, you can do the following:

  1. Read-only or Edit
  2. Block Download – This prevents downloading or printing. It is ONLY available when access is set to READ-ONLY

Click “Apply” and then you are presented with the next Window that allows you to send the link. You can do these one of two ways. You can provide email addresses in the address field and then click send. The email address is searched from the directory and your contacts. Email addresses that are not in those sources must be fully typed in (i.e. user@domain.com). Or you can copy the link by clicking copy and pasting it into an email that have already been created and send it that way.

i.e.

Sharing with OneDrive Online
Share: Facebook Twitter Linkedin
October 16, 2023 | Dan

Migrate MFA and SSPR Methods to Authentication Policies

Migrate MFA and SSPR Methods

If you want to Migrate MFA and SSPR Methods to Authentication Policies, you have a pretty log runway. You have until September 2024 until they do it for you. I would migrate sooner than later. You can fix any problems that Arise.

As with any security MFA is a good step to ensuring that you M365 tenant will be secure as possible.

Migrate MFA and SSPR Methods to Authentication Policies in 3 Easy Steps

Review Current MFA Verifications Options

Got to https://account.activedirectory.windowsazure.com/UserManagement/MfaSettings.aspx and write down you MFA Settings, you will need this for the last step.

Migrate MFA and SSPR Methods

Review Current MFA Verifications Options

Go to https://entra.microsoft.com/#view/Microsoft_AAD_IAM/PasswordResetMenuBlade/~/AuthenticationMethods  and write down you MFA Settings, you will need this for the last step.

Migrate MFA and SSPR Methods

Go to Authentication Methods and start the Migration

Go to https://entra.microsoft.com/#view/Microsoft_AAD_IAM/AuthenticationMethodsMenuBlade/~/AdminAuthMethods/fromNav/Identity . Look through every Authentication method and match the old methods from the previous two steps with what is on this screen:

Migrate MFA and SSPR Methods

This table will help you with most settings:

MFA and SSPR Settings

Old MethodNew Method (MFA/SSPR)
Call To PhoneVoice Call
Text Message To PhoneSMS
Notification through Mobile AppNotification Through Mobile App / Mobile App Notification / Code
Verification code from mobile app or hardware token  Hardware OATH/Third Party OATH Tokens
Email (SSPR only)Email OTP

For Each method you wish to bring over click on it in the new screen choose the appropriate setting and toggle enable. Here is an example:

Migrate MFA and SSPR Methods

Once you are done bring over the settings, go to the old MFA and SSPR setting screens in the previous steps and uncheck all methods and save.

Finally go to the new Authentication Methods Policies Screen and click “Manage Migration”. You will see this screen:

Migrate MFA and SSPR Methods

Choose “Manage Migration” and click Save. Let your tenant run like this for a while until you are confident that there are no issues with the migration. If there are no issues and you are confident that things are running smoothly, go back to this section and click “Manage Migration”.

Change the Setting to “Migration Complete” and click save. There you go. The old MFA and SSPR Authentication methods have been migrated to the new Authentication Methods Policies.

Share: Facebook Twitter Linkedin
October 2, 2023 | Dan

Add Microsoft Authenticator to MFA

Microsoft Authenticator to MFA

You may have decided to stick to SMS texts for MFA. Unfortunately, it is currently the weakest form of MFA. Microsoft has decided enough is enough! Time to get more secure. They have enforced a registration campaign. The new MFA using this app is a push with number matching. So should you Add Microsoft Authenticator to MFA? It isn’t an answer to a question….you have no choice. They started rolling this out on September 15th 2023.

Here is how you Add Microsoft Authenticator to MFA in a few simple steps.

Microsoft has made using the Microsoft Authenticator App Mandatory. It is just another way to bump up security with your tenant. You will get three passes and then the inevitable. When they want you to switch you will see this prompt after you logon on your computer screen:

Microsoft Authenticator to MFA

Note: Before you click next, check to see if you have the authenticator App

See if the Authenticator App is already installed.

  1. Please check your phone and see if you already have the Microsoft Authenticator App installed already. If you do go to the section Adding an Account to The Authenticator App.
  2. To check, do a search on the main screen of your phone and search for “Microsoft Authenticator”. If it is on the phone it will show up in your search.

Installing the Authenticator App

  • Go to the Google Play Store (Android) or Apple Store (iPhone) on your Phone
  • Search for “Microsoft Authenticator App:”.
  • Install the App on your phone.
  • Open the App and go to the next section.

Adding Account to Microsoft Authenticator to MFA

Click next to this prompt:

Microsoft Authenticator to MFA

If You Have the QR Code on Your Computer Screen

You will more than likely see this:

Microsoft Authenticator to MFA

Go to the open Authenticator App and click the plus sign and choose “Work or school account”:

Microsoft Authenticator to MFA

When given the choice to scan a QR Code tap it and then scan the code on your computer screen with your phone. It will add your account to the phone. Once the QR code is scanned, click next.

Microsoft Authenticator to MFA Manually

The steps are the same as adding your account with a QR code, but you choose “sign in” instead. You will be prompted for your windows username and password. Remember your windows username.

Testing Authenticator App

Before you can use the app, Microsoft would like to test it. It will show a number on your computer screen. You will need to enter it in the Authenticator app. It will show a successful test on your computer screen. Click Next.

You now have successfully set up the Microsoft Authenticator App on your Phone (Microsoft Authenticator to MFA). Going forward when you sign into a Microsoft App, when you are prompted for MFA, your login will give you a code:

Microsoft Authenticator to MFA

You will have to type that number into your authenticator App and the logon will proceed!

Share: Facebook Twitter Linkedin