Address
88 Harbour St. Toronto, Ontario, M5J0C3.
Mon – Fri: 9AM–5PM EST
Sat – Sun: Closed
Back

How to Enable Impersonated Domain Protection in Microsoft 365: Step-by-Step Guide

Impersonated domain attacks are on the rise, making it easier for cybercriminals to trick employees with emails that look like they come from trusted sources. If you use Microsoft 365, enabling impersonated domain protection is a vital step to securing your company’s communications. This guide walks you through the process clearly, even if you’re not an IT expert.

What Is Impersonated Domain Protection?

Impersonated domain protection helps prevent attackers from sending emails that appear to come from your organization’s trusted domains. This feature is part of the anti-phishing tools included in Microsoft 365 Defender, helping safeguard your business against increasingly sophisticated threats. When set up correctly, it can help keep phishing attempts out of your inbox and protect your company’s reputation.

Step-by-Step: Enable Impersonated Domain Protection in Microsoft 365

Step 1: Sign in to Microsoft 365 Defender

Start by visiting the Microsoft 365 Defender portal. Sign in using your administrator account that has the necessary permissions to manage security policies.

Step 2: Navigate to Threat Policies

In the left-hand menu, click on Email & collaboration. Under the Policies & rules section, select Threat policies.

Step 3: Access Anti-Phishing Policies

Click Anti-phishing. Here, you’ll see a list of existing policies. Either click on an existing policy or choose Create to start a new one tailored to your needs.

Step 4: Configure Impersonation Protection

Within the policy settings, find the Impersonation protection section and be sure that Enable impersonation protection is checked. Now you can begin adding the domains you want to shield:

  • Click Add under the Impersonated domain section.
  • Type in your organization’s domain (like yourcompany.ca) and any trusted domains you want to protect.
  • Once you’ve entered all relevant domains, click Save.

You can also decide what happens to detected impersonated messages. For example, you might want suspicious emails sent straight to Junk or even Quarantine for review. Choose the action that best matches your company policy.

Step 5: Review and Save the Policy

Before applying changes, double-check all your settings. Confirm that you’ve added the necessary domains and chosen the right actions. When you’re ready, click Save to activate impersonation protection.

Step 6: Monitor Policy Effectiveness

After setup, monitoring is key. Go back to the Microsoft 365 Defender portal and use the Reports section under Email & collaboration to view statistics on impersonation attempts and blocked threats.

Extra Tips for Effective Protection

  • Check Your Licensing: Some features require Microsoft Defender for Office 365 Plan 1 or Plan 2 (included in E5 supplies). Make sure your subscription includes impersonation protection.
  • User Training: Teach staff how to spot phishing messages—even with protection in place, human awareness is crucial. For more, read our tips on Cyber Security.
  • Review Policies Regularly: As your organization grows or threats evolve, re-visit anti-phishing rules for optimal coverage.
  • Consider Backup Solutions: Even the best filters can’t stop every threat. Regular Backup Services (Server & Microsoft 365) ensure your data is safe if malware does slip through.

Partner with Canadian Cybersecurity Experts

Enabling Microsoft 365 impersonation protection is just one part of a full cybersecurity strategy. At System Support, we’ve been helping Canadian businesses for over 15 years to stay secure and productive. Whether you need Managed IT Services, cyber risk assessments, or day-to-day support, our team is here to help.

Ready to bolster your email security and protect your business from evolving threats? Request a quote for tailored cybersecurity services today!

Ashkan Dastmalchi
Ashkan Dastmalchi
https://systemsupport.ca

Leave a Reply

Your email address will not be published. Required fields are marked *

Looking for Immediate Support?

Drop your phone number or email—we’ll be in touch shortly to assist you.