Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support

Office 365 Rules to Prevent Ransomware

16.02.21 03:27 AM By jack.zhang

CLOUD SERVICE SOLUTION BY BROCENT

BROCENT provides the professional IT service of designing and implementing the the multi-cloud to the clients in compliance to local regulation and business needs, especially for the differentiated needs on computing, storage, data inter-cloud backup, web hosting with ICP, and various database service provision.

Microsoft 365 helps protect your business against ransomware by preventing potentially dangerous files, like JavaScript, batch, and executables, from being opened in Outlook. To increase this level of protection by adding rules that block or warn you of additional types of files, follow these steps.

  1. From the admin center at https://admin.microsoft.com, choose Exchange under Admin centers.

  2. From the menu on the left, choose mail flow.

  3. On the rules tab, choose the arrow next to the plus (+) symbol, and then choose Create a new rule.

  4. On the new rule page, enter a name for your rule, scroll to the bottom, and then choose More options.

  5. Under Apply this rule if, select Any attachment, and then select file extension includes these words.

  6. In the box under specify words or phrases, enter the file extensions that you want the rule to be applied to, such as file extensions that can contain macros. Use the plus (+) symbol to add them one at a time.

    Learn more about file types by reading Protect against ransomware.

  7. Scroll down to review your list, and then choose OK.

  8. On the new rule page, choose add condition, and then choose a condition under Do the following.

    You have many rule options to choose from, but in this example we'll choose to Notify the recipient with a message.

  9. Enter message text for your notification, and then chose OK.

  10. Optional: On the new rule page, choose add exception, and enter any details for exceptions to your rule, such as messages from trusted senders.

  11. On the new rule page, choose Save, and review the rule summary information provided.

Microsoft 365 &AZURE

Cloud design and setup for Exchange, SharePoint, Azure AAD, Azure Storage, and Intune MDM solutions

AMAZON AWS 

Cloud Implementation Service for VDI Desktop as a service, Online Storage and Backup, and Applications on the ECS Server

ALICLOUD

Cloud Design for Website Hosting, Load Balance, ECS Hosting Service, and Rational Cloud Database Service

TENCENT CLOUD

Setup the ECS Application Hosting, MYSQL in the cloud, Website Hosting and ICP Service, and Intelligent DNS.