![]() |
![]() |
![]() |
![]() |
Installing Forcepoint Email Security in Microsoft Azure > Post-Deployment Steps: All Versions > Configure mail flow in Office 365
|
2.
|
3.
|
From the left navigation pane, select Mail Flow.
|
a.
|
From the top of the page, click Connectors, and then click the plus sign (+) to add a new connector.
|
b.
|
c.
|
Click Next.
|
e.
|
Click Next.
|
f.
|
From When do you want to use this connector, select Only when I have a transport rule set up that redirects messages to this connector.
|
g.
|
Click Next.
|
h.
|
i.
|
Click the plus sign (+) and enter the public IP address for the Forcepoint Email Security VA in Azure appended with your domain name.
|
j.
|
Click Next.
|
k.
|
From How should Office 365 connect to your email server, select Always use TLS to secure the connection.
|
l.
|
Select Any digital certificate, including self-signed certificates.
|
m.
|
Click Next.
|
o.
|
p.
|
Click Validate.
|
q.
|
Click Close.
|
r.
|
5.
|
a.
|
From the top of the page, click Connectors, and then click the plus sign (+) to add a new connector.
|
b.
|
This time, in the field From, select Your organization's email server and in the field To, select Office 365.
|
c.
|
Click Next.
|
e.
|
Click Next.
|
f.
|
From How should Office 365 identify email from your email server, select one of two options.
|
![]() |
For best practice, select By verifying that the IP address of the sending server..., and enter all public IP addresses for the Forcepoint Email Security VA in Azure.
|
![]() |
Alternatively, select By verifying that the subject name on the certificate... and enter the CN of a signed certificate purchased through a vendor like Godaddy or Digicert.
|
g.
|
Click Next
|
a.
|
c.
|
Click More options.
|
d.
|
Select the condition Apply this rule if the recipient is outside the organization, as shown in the following images.
|
e.
|
Select the action Redirect to... the following connector.
|
f.
|
Add the exception Except if the sender IP address is in any of these ranges or exactly matches.
|
g.
|
Select the condition Apply this rule [Apply to all messages].
|
h.
|
If you select [Apply to all messages], go to Forcepoint Security Manager and configure your email appliance to accept relays on internal email messages, by adding the IP ranges from Exchange Online to the Trusted IP group. If this step is not done, internal email messages will not be accepted by the appliance. See Adding an IP address group in Forcepoint Email Security Administrator Help for more information.
|
i.
|
Save the rule; click Save.
|
a.
|
Go to http://www.spamhaus.org/lookup.lasso and enter each IP.
|
![]() |
![]() |
![]() |
![]() |
Installing Forcepoint Email Security in Microsoft Azure > Post-Deployment Steps: All Versions > Configure mail flow in Office 365
|