Phishing is the leading attack vector against schools. While user awareness training is essential, the strongest defense is stopping phishing emails before they ever reach staff and students.
Microsoft 365 (Exchange Online Protection) and Google Workspace provide built-in security controls that can block or quarantine phishing attempts at no extra cost.
Here’s how to configure them.
Microsoft 365 (Exchange Online / Entra)
Microsoft Documentation: https://learn.microsoft.com/en-us/defender-office-365/anti-phishing-policies-mdo-configure
1. Enable Anti-Phishing Policies
- Go to the Microsoft 365 Security & Compliance Center.
- Navigate to Threat Management → Policy → Anti-Phishing.
- Enable built-in impersonation protection to detect lookalike domains and spoofed accounts.
Impact: Helps prevent phishing that impersonates staff, leadership, or vendors.
2. Quarantine Suspicious Messages
- Instead of sending suspicious emails to Junk, configure Quarantine policies.
- Go to Threat Policies → Quarantine Policies.
- Set suspicious or high-confidence phishing to quarantine for IT review.
Impact: Keeps dangerous emails out of inboxes but allows IT to release false positives.
3. Block Automatic Forwarding
- Attackers often set forwarding rules after compromise.
- Go to Exchange Admin Center → Mail Flow → Remote Domains.
- Disable auto-forwarding to external domains.
Impact: Prevents silent exfiltration of sensitive student/staff emails.
4. Create Transport Rules (Mail Flow Rules)
- Go to Exchange Admin Center → Mail Flow → Rules.
- Block messages containing specific phishing keywords or from known bad domains.
- Example rule: Block subject lines containing “Password Expired” from outside domains.
Impact: Adds an extra layer of defense tailored to your environment.
Google Workspace
Google Workspace Documentation: https://support.google.com/a/answer/9157861?hl=en&src=supportwidget0&authuser=0
1. Turn On Phishing & Spam Protection
- Admin Console → Apps → Google Workspace → Gmail → Safety.
- Enable Protect against spoofing, phishing, and malware.
- Turn on enhanced pre-delivery message scanning.
Impact: Stops many phishing attempts before delivery.
2. Disable Automatic Forwarding
- Admin Console → Apps → Gmail → User Settings.
- Under “Forwarding,” disable automatic forwarding for all users except IT staff who require it.
Impact: Prevents data exfiltration via hidden forwarding rules.
3. Create Content Compliance Rules
- Admin Console → Apps → Gmail → Compliance → Content Compliance.
- Add a rule to detect messages with specific keywords, suspicious file types, or domains.
- Action: Quarantine message for IT review.
Example:
- If subject line contains “Password Expired” AND sender domain is not school-owned → Quarantine.
Impact: Blocks targeted phishing that bypasses default filters.
4. Enable Attachment & Link Scanning
- Admin Console → Gmail → Safety.
- Enable “Scan incoming messages for suspicious attachments and links.”
- Reject or quarantine detected threats.
Impact: Protects against malicious attachments and drive-by phishing links.
Phishing prevention doesn’t always require expensive tools. Schools can dramatically reduce the number of phishing emails that ever reach staff and students by using built-in configurations in Microsoft 365 and Google Workspace, like quarantines, forwarding restrictions, anti-phishing policies, and content compliance rules.
Combined with regular user training, these no-cost controls go a long way toward protecting sensitive student and staff data.
Disclaimer: The instructions and configuration steps provided above are accurate as of the time of publication. However, Microsoft 365 and Google Workspace regularly update their security features and admin settings. Always refer to the most recent official Microsoft and Google Workspace documentation before making changes in your environment.
Comments
Post a Comment