🚨Retrouvez-nous au Cyber Show Paris - Stand E20 - 28 - 29 janvier🎁7 jours d'essai gratuit sur la plateforme 0Flaw🚨Retrouvez-nous au Cyber Show Paris - Stand E20 - 28 - 29 janvier🎁7 jours d'essai gratuit sur la plateforme 0Flaw
CONFIGURATION

Configure Microsoft 365

0Flaw sends phishing emails. Without proper configuration, some of these emails would not pass Microsoft's spam filter. This would be regrettable as it would compromise your campaign statistics.

The following guide explains how to avoid this phenomenon, to allow your campaigns to run smoothly.

Did you know? Unlike 0Flaw, hackers would have no problem bypassing your spam filter by exploiting legitimate email servers, which 0Flaw cannot afford to do.

1

Create a bypass rule

To allow 0Flaw to function, you will need to add the IP address we use to send our emails. Go to the Microsoft Exchange settings and open Mail flow > Rules.

Exchange settings interface - Rules section

Now click on Add a rule > Create a rule

Exchange rule creation interface

We will use the IP address 159.183.234.18 to send our emails. This IP address is dedicated to 0Flaw and therefore cannot be used by third parties.

Start by naming your gateway: the name doesn't matter much, so call it 0Flaw bypass for example.

Rule naming interface

To apply the rule only to this IP 159.183.234.18, in the Apply this rule if… list, select The sender.

Sender selection in rule

Then The sender's IP address is in one of these ranges or matches exactly.

Target IP address configuration

Add the IP 159.183.234.18.

IP address configuration

Then

Final threshold configuration
SCL (Spam Confidence Level) configuration

You should have a rule like this:

Final configured rule
2

Add SkipSafeLinksProcessing header

From time to time, some links sent by 0Flaw are marked as suspicious. This is why we suggest adding an additional header to avoid this phenomenon.

For this, add a rule as before then:

Select Modify message properties… then define a message header.

Properties modification interface

Then on the right, call the property X-MS-Exchange-Organization-SkipSafeLinksProcessing.

X-MS-Exchange-Organization-SkipSafeLinksProcessing property configuration

Set the value to 1.

Setting value to 1

You're all set, so don't forget to save the rule.

3

Add BypassClutter header

Some organizations offer their employees the possibility to use a "clutter folder" in newer versions of Outlook and Exchange.

Add another rule like the previous one with:

property: X-MS-Exchange-Organization-BypassClutter
value: 1

Third BypassClutter rule configuration
4

Enable Phishing Simulation option

Microsoft recently released an additional option that allows 0Flaw phishing emails to pass very easily. Go to the Advanced delivery options and click Edit.

Advanced delivery options interface

This will open a side panel. You will need to enter both the domain name yourprotectionidentity.com that we use to send phishing emails and the IP address 159.183.234.18. Finally, add the domains hosting our phishing pages.

These domains have been generated for you by the platform and should be used instead of domain1.com, domain2.com...

Phishing domains configuration

Once added, click Save

5

Modify the green/red list

To fully authorize emails sent from our sending IP, we need to add one last parameter, for this go to this page and click Add.

Green/red list page interface

This will open a side panel. You must enter the following information *, 159.183.234.18 This allows authorizing all senders from 0Flaw's sending IP.

Authorization list configuration

Once added, click Add and you're done!

6

Add 0Flaw phishing page URLs to Safe Links

To avoid blocking our 0Flaw phishing URLs by Microsoft Defender, we need to add a configuration in Safe Links, Navigate to this page and click Create.

If the page is empty, you probably don't have Microsoft Defender, you can skip to the next step.

Empty Safe Links page - Microsoft Defender not available

Once you have clicked, a page opens, you must choose a name for your safe links policy, for example "0Flaw Safe links Policy".

Safe Links policy naming

Add the audience you want to send phishing emails to in the following section, it can be users, groups or domains.

Then, take the time to carefully follow these settings in the image below 👇.

Safe Links configuration settings

Click on "Manage URL" and add the domains in the image below 👇

Safe Links URL management interface

These domains have been generated for you by the platform and should be used instead of domain1.com, domain2.com...

Then click "next" and choose default for notification.

Then click "next" and click "finish".

7

Test the configuration

Now that you have configured Microsoft Outlook to receive 0Flaw emails, return to the platform and test the configuration.

Note: the configuration may take a few minutes to propagate. If everything is properly configured and you encounter a problem, wait 10 minutes and try again.




Speak with an integration expert

Follow these steps to optimize your configuration and ensure the success of your phishing campaigns.