- Admin permission to your Cloud App Security console
- One Exchange Online ATP (Advanced Threat Protection) policy with Real-time Scanning enabled
- One or more Exchange Online mailboxes protected by Cloud App Security as a selected target of the test policy
- One external email address e.g. Gmail, Zoho, Exchange, Yahoo, etc.
To test Advanced Spam Protection, please ensure that:
- The “Enable Advanced Spam Protection” option is checked.
- The rules are applied to “All messages”.
Antispam Engine - BEC
- Compose an email with an external email service (e.g., Gmail, with the subject “ThisIsTrendmicroSNAPBECTesting”) and send it to your test target mailbox.
- In the Logs tab, confirm that the email is detected by “Antispam engine” and that the Security Risk Name is “BEC".
Antispam Engine - Other Spam
- Compose an email with an external email service (e.g., Gmail, with the subject “ThisIsTrendmicroCSASSubjectRuleTesting”) and send it to your test target mailbox.
- In the Logs tab, confirm that the email is detected by “Antispam engine” and that the Security Risk Name is “Other spam”.
Antispam Engine - Phishing
- Compose an email with an external email service (e.g., Gmail, with the subject “ThisIsTrendmicroPhishingTesting”) and send it to your test target mailbox.
- In the Logs tab, confirm that the email is detected by “Antispam engine” and that the Security Risk Name is “Phishing”.
Antispam Engine-Writing Style
- Ensure that “Enable writing style analysis” under “Writing Style Analysis for BEC” is checked in the test policy.
- Go to “High Profile Users” in Administration > Global Settings and add a user from your organization.
- Change the display name of the sender’s email to that of the high-profile user.
Here are the settings related to Gmail:
- Compose an email with an external email service (e.g., Gmail, with the subject “ThisIsTrendmicroPhishingTesting”) and send it to your test target mailbox.
- In the Logs tab, confirm that the email is detected by “Writing style analysis” and that the Security Risk Name is “BEC”.
Pattern-Based Scanning
- Download an EICAR file from Download Anti Malware Testfile – Eicar.
- In the Malware Scanning test policy, ensure that "Scan all files" is selected and that the rules are applied to "All messages".
- Send an email with the EICAR file attached to the test user. In the example below, an internal email using Exchange Online within the same organization is composed to avoid detection by most online email services.
- In the Logs tab, confirm that the email is detected by Pattern-Based Scanning and the Security Risk Name is "Malware: Eicar_test_file".
TrendX (Predictive Machine Learning)
- In the Malware Scanning test policy, ensure that "Scan all files" is selected and that the rules are applied to "All messages".
- In the Malware Scanning test policy, ensure that “Enable Predictive Machine Learning” and “Allow Trend Micro to collect suspicious files to improve its detection capabilities” are checked.
- Download TrendX.zip and unzip the file with the password “virus”.
- Compose an email with the unzipped files attached and send it to the test target mailbox. In the example, an internal email using Exchange Online within the same organization is composed to avoid detection by most online email services.
- In the Logs tab, confirm that the email is detected by Predictive Machine Learning and that the Security Risk Name is “Malware: Ransom.Win32.TRX.XXPE1”.
- In the File Blocking test policy, ensure that “Enable File Blocking” is checked and that “Block All Files” is selected for “Type of File Blocking”.
- Compose an email with any file attached and send it to the test target mailbox.
- In the Logs tab, confirm that the email is detected and that the Security Filter is “File Blocking”.
- In the Virtual Analyzer test policy, ensure that “Enable Virtual Analyzer” is checked and that the rules are applied to “All messages”.
If the option is greyed out, please change “Apply to” in “Malware Scanning” rules to “All messages” firstly because VA analysis is dependent on the malware scanning result.
- Download the PDF sample and unzip it with the password “virus”.
- Compose an email with the unzipped pdf file attached and send it to the test target mailbox. In the example, an internal email using Exchange Online within the same organization is composed to avoid detection by most online email services.
- In the Logs tab, switch the Type to “Virtual Analyzer” and confirm that there is a record with Virus Name as “HEUR_PDFF.SPACE”.
- Add a test DLP policy for Exchange Online. Ensure that “Enable Real-time Scanning” is selected and that the test user is set as "Selected Targets".
- Ensure that “Enable Data Loss Prevention” is selected and “All: Credit Card Number” is set as "Selected Compliance Template(s)".
- Compose an email with some test credit card numbers like below. If you don’t have one, you may find some from Test Payflow Transactions (paypal.com).
- In the Logs tab, switch the Type to “Data loss Protection” and confirm that there is a record with the credit card numbers under Violating Content.