Prevent false positive email marked as spam in office 365

Tips for Office 365 Admins to prevent good email marked as spam from being sent to quarantine as a false positive. Customize a safelist and other options to prevent good email marked as spam.

Prevent false positive email marked as spam in office 365

  1. Obtain the headers for the message you want to allow in your mail client such as Outlook or Outlook Web App, as described in Message Header Analyzer.
  1. Open the message.
  2. Go to Options > properties.
  3. Copy the internet headers section.
  4. Go to Message Header Analyzer.
  5. Paste the internet headers section.
  6. Click analyze
  1. Search for the IP address following the CIP tag in the X-Forefront-Antispam-Report header manually or by using the message header analyzer.
  2. Add the IP address to the IP Allow list by following the steps in “Use the EAC to edit the default connection filter policy” in Configure the connection filter policy.
  3. In the Exchange admin center (EAC), navigate to Protection > Connection filter, and then double-click the default policy.
  4. Click the Connection filtering menu item and then create the lists you want: an IP Allow list, an IP Block list, or both.
  5. Click  . In the subsequent dialog box, specify the IP address or address range, and then click ok. Repeat this process to add additional addresses. (you can also edit or remove IP addresses after they have been added.)
  6. Optionally, select the enable safe list check box to prevent missing email from certain well-known senders. How? Microsoft subscribes to third-party sources of trusted senders. Using this safe list means that these trusted senders aren’t mistakenly marked as spam. We recommend selecting this option because it should reduce the number of false positives (good mail that’s classified as spam) you receive.
  7. Click save. A summary of your default policy settings appears in the right pane.
  • Note:
  • If you add an IP address to both lists, email sent from it is allowed.
  • IPv4 IP addresses must be specified in the format nnn.nnn.nnn.nnn.
  • You can also specify classless inter-domain routing (cidr) ranges in the format nnn.nnn.nnn.nnn/rr.
  • You can specify a maximum of 1273 entries, where an entry is either a single IP address or a cidr range of IP addresses from /24 to /32.

 

Source: Prevent false positive email marked as spam with a safelist or other techniques – Office 365

 

Add PowerShell to Windows Explorer Context Menu in Windows 10

Here’s a quick tutorial on how to add PowerShell to the Windows Explorer context menu in Windows 10.

Source: Add PowerShell to Windows Explorer Context Menu in Windows 10 – Petri

1. Open the Registry Editor. You can do this by clicking on Start and typing regedit.

2. Navigate to the following path:

HKEY_CLASSES_ROOT\Directory\Shell

Create a new key by clicking Edit > New > Key.

Call the new key “PowerShell.”

3. Modify the default string in the “PowerShell” key by right-clicking it and selecting “Modify…”

Call the new value “Open PowerShell Here.” Click “OK.

4. In the PowerShell key, create a new key by clicking Edit > New > Key.

5. Call the new key “command.”

6. Modify the default string in the command key by using the following text:

C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoExit -Command Set-Location -LiteralPath ‘%L’

Click “OK.”

7. Add a new string by clicking Edit > New > String value.

Let’s call it “Icon.”

8. Modify the value by using the following text:

“C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe”,0

Click “OK.”

9. After completing these steps, close the registry, and open Windows Explorer. Go to any folder of your choice and right-click the folder