Configure Inbound mail on Office 365 to reject non-EMS emails
You should configure Office 365 to block any inbound email that does not originate from Email Security product.
The recommended approach to this is described below.
- Log in to the Office 365 Admin Center, and navigate to Admin Centers and then Exchange.
- In the left-hand pane, click Mail Flow and then Rules.
- Click + and then click Create a new rule.
- In the New Rule page, enter a Name to represent the rule. For example, CloudUSS EMS IP restriction.
- Scroll down and click More options.
- From the Apply this rule if drop-down menu, select The Sender and then Is Located... and then Outside the organization.
- From the Do the following drop-down menu, select Reject the message with the Explanation...
- Click Enter text and enter the message that you want to include in the non-delivery report (NDR) that will be sent to the email's sender. For example:
IP restricted, not using MX record. Please ensure your DNS is up-to-date and try sending this message again.
- Click Add exception.
- Select Sender and then Sender's IP address is in the range or exactly matches, and enter the Cloud USS IP for your cluster - Europe, United States, United Arab Emirates.
- Click + to add each of the IP addresses for your region.
- Once all the IP addresses have been added, click OK.
- Click on Add Exceptions to add an Or logic condition and add A message header includes... and the value X-MS-Exchange-Inbox-Rules-Loop and add your email domain name to the header content value.
- Scroll to the Properties of the rule section. Under Match sender address in message, select Header or Envelope.
- Click Stop processing more rules.
- Click Save.
- Verify that the new rule displays at the top of the list of mail flow rules. If it's not at the top, select the rule and use the Up arrow to move it.
Office 365 is now configured to block any email that does not originate from EMS.0