The concerning aspect is that Microsoft 365 appears to trust these emails, however one of effective solution is to implement an inbound lockdown rule.
>>> Locking Down O365 Connections
If you haven't already done so, it's important to do so.
If you have, there is an update to the rule recommended due to the specifics of the current attack.
In spite of having the lockdown rule though, the end user also receives the NDR (because it's from me@domain.com to me@domain.com) which often includes the original email as an attachment.
The recommendation therefore is UPDATE the lockdown rule to quarantine these messages rather than rejecting them with NDR that would have the original message delivered to the sender, which since spoofed is the recipient user.
Solution:
- Go into exchange online -> mail flow -> rules
- Locate the "Proofpoint Inbound Lockdown Rule" and edit the CONDITIONS
- Change the "Reject the message" with "Unauthorized IP" to "Redirect the message to" and the select "hosted quarantine"
- This will cause these emails to go to O365 quarantine instead.

Make sure priority is zero and you have the option "STOP PROCESSING MORE RULES" checked.
Note if you are using a 3rd party e-signature product (exclaimer, codetwo, etc) then further considerations are required. Contact our support team at support@vircom.com to assist.
Save everything.
Additional recommended actions for Microsoft 365 customers
Here are some tips for protecting your organization:
- Determine if your organization is actively using Direct Send; if appropriate, enable “Reject Direct Send” via PowerShell: Set-OrganizationConfig -RejectDirectSend $true
- Audit mail flow rules for accepted unauthenticated relay IPs; monitor message headers for spoofing attempts that are flagged by Microsoft with compauth=fail
- Enforce email authentication (SPF, DKIM, DMARC) with strict DMARC reject and SPF hard fail policies, where possible, by partnering with a trusted service like Red Sift OnDMARC from Vircom to ensure deliverability of legitimate email
- Use advanced email security solutions like Proofpoint Essentials from Vircom to bolster Microsoft’s native protections