Stop Phishing Emails Before They Hit Your Inbox

Cybercriminals still rely on phishing more than any other tactic to trick employees and gain access to business systems.
Hackers don’t break in. They log in using stolen credentials from phishing emails. One click on a fake invoice or login page is all it takes. If you’re running a business, especially with Microsoft 365, your inbox is the front line. This week’s tip shows how to shut that door fast.


What To Do: Harden Your Microsoft 365 Anti-Phishing Policy

Microsoft 365 has strong phishing filters, but many organizations leave them at default. That’s not enough. Here’s how to tighten protection:

  1. Log into Microsoft 365 Security Center
    Go to security.microsoft.com using an account with Security Admin or Global Admin rights.
  2. Open Threat Policies
    From the left menu, go to:
    Email & collaboration > Policies & rules > Threat policies
  3. Open Anti-Phishing Settings
    Under Policies, click Anti-phishing. You’ll see your existing policies or have the option to create a new one.
  4. Create a New Policy or Edit the Default
    • Click + Create to build a new policy
    • Or click into the Default policy to enhance it
    • Name the policy and assign it to key users or groups
  5. Add Targeted Users
    In the “Users to protect” section:
    • Add executives, finance, and HR users
    • These are the most commonly impersonated
  6. Configure Impersonation Protection
    Under “Impersonation settings”:
    • Add domains and users to watch for impersonation
    • Microsoft will flag and filter emails that look like they come from these sources
  7. Enable Mailbox Intelligence
    • Turn this on under Mailbox Intelligence settings
    • It helps detect unusual sender behavior based on past communication patterns
  8. Turn on Spoof Intelligence
    • Found under Spoof settings
    • Blocks senders who fake trusted external domains or internal addresses
  9. Set Action Policies
    For flagged phishing attempts:
    • Set to move to Quarantine
    • Optionally, alert admins or notify the user with a warning banner
  10. Review Policy Priority and Apply
  11. If you have multiple policies, ensure the right priority is set
  12. Click Submit to activate your changes

Why It Matters

  • 90% of successful cyberattacks start with phishing
  • Small businesses are 3x more likely to be targeted due to weaker defenses
  • Microsoft’s default settings do not cover impersonation or VIP users

These settings create a second layer of defense. If attackers spoof your domain or send fake executive emails, this catches them early.


Extra Tip: Add External Email Warnings

Train users with visual cues. Add a banner to all emails from outside your organization. Example:

“CAUTION: This email originated outside the company. Do not click links or open attachments unless you recognize the sender.”

This one line trains your users without the need for constant reminders.


Action Steps

  • Set a calendar reminder to review anti-phishing policies quarterly
  • Train your team on how to report suspicious emails
  • Pair technical controls with user awareness

Need Help Locking This Down?

SOClogix offers a full Microsoft 365 and email cyber audit. We will:

  • Review your current threat protection policies
  • Check for gaps in user impersonation and spoofing settings
  • Assess risks across mail flow, inbox rules, and admin roles
  • Give you a short, actionable report with fixes that matter

Schedule your audit. One conversation could stop the next breach.

Next Week:
We’ll show you how to block ransomware using a simple Microsoft Defender setting.

author avatar
Matt Johnson CEO