Sign In  |  Register  |  About Livermore  |  Contact Us

Livermore, CA
September 01, 2020 1:25pm
7-Day Forecast | Traffic
  • Search Hotels in Livermore

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

How to Delete Unwanted, Spam Emails from Your Office 365 Mailbox

 

Delete Spam Emails from Office 365 MailboxesPhoto from Getty Images

Originally Posted On: https://healthcareitsm.com/blog/delete-spam-office-365/

 

It builds and builds and creates anxiety, getting in the way of an otherwise productive workday. Spam emails often contain malicious links or attachments that can infect user computers with viruses, malware, or ransomware. Deleting specific spam, can help prevent security breaches and protect your user’s sensitive information.

Even though manually deleting spam is not email protection, sometimes emails still get through. It gets decision makers in situations where they may opt-out of getting additional email security. Let’s consider the top reasons companies may not have a certain level of cyber security set in place.

Top Reasons a Company Doesn’t Opt for More Email Security

Lack of awareness: Business owners are unaware of the importance of email security and the potential risks associated with insecure email communication or lack of email security training.

Complexity Concerns

Email security can be complex and require technical expertise. As a result, some individuals and organizations may not have the knowledge or resources to implement strong email security measures.

Cost

Some email security solutions can be expensive, and smaller organizations or individuals may not have the budget to invest in these solutions.

Healthcare ITSM Recommendation: Purchase add-on email security – For special pricing, contact us and ask us why we like Mimecast so much.

Contact Us

Our Favorite Email security platform.

mimecasthttps://www.mimecast.com/

mimecast awards
mimecast awards

How to Delete Spam Using Microsoft Office 365 PowerShell

Tasks – Time 10 mins (First time 1 hour)

  1. Setup PowerShell
  2. Logging-in to O365 Exchange Using PowerShell
  3. Create a Compliance Search
  4. Delete the Emails Listed from the Compliance Search.
  5. Block Emails on O356 Spam Filter

1. Setup PowerShell

If this is your first time, please start with these steps. Skip if completed in the past.

Open PowerShell as an administrator

PowerShell

Run the command: set-executionpolicy remotesigned

 

Answer with: a

(This allows for scripting permission)

script permission

Run the Command: Import-Module ExchangeOnlineManagement

 

import module

2. Logging-in to Exchange Using PowerShell

Run the Command: Connect-IPPSSession -UserPrincipalName email@domain.com

*Note: Change the email@domain.com to your email address

*Note: Email must have Office 365 Admin Access

change email domain

Sign-in to your account – If you have MFA setup this will prompt.

 

microsoft password

Wait for the log-in to complete!

 

Windows PowerShell

install PowerShell

3. Create a Compliance Search

Step 1

*Change the Highlighted parts in the script to fit your email deletion needs.

*Change the Highlighted parts in the script to fit your email deletion needs.

****Extreme Warning****  Be very specific, so you do not delete emails you don’t mean to delete. An example of a bad day: Delete all emails in the system that end with gmail.com

To learn more, see link below:

 

New-ComplianceSearch (ExchangePowerShell) | Microsoft Learn

Run the command:

 

$Search=New-ComplianceSearch -Name “UniqueName” -ExchangeLocation All -ContentMatchQuery ‘(From: Customerreply@mimecast.com)’

Start – ComplianceSearch -Identity $Search.Identity

step 1

* Example of multiple emails and/or subject

 

$Search=New-ComplianceSearch -Name “Phishing attempt” -ExchangeLocation All -ContentMatchQuery ‘(From:sendquick21@gmail.com) AND (Subject:”Inmailing System Interruption For anne ID:8205544455“)’

Start – ComplianceSearch -Identity $Search.Identity

Step 2

 

Check the Compliance Search to assess whether your search has collected what needs to be deleted.

step two

emails in Tenant

Run the command: Get-ComplianceSearch -Identity ” UniqueName” | Format-List

 

*Note: if there are many emails in the Tenant, please check the status by scrolling down and seeing the status.

 task three

Once completed and the Results are confirmed, it’s time to Delete.

4. Delete the Emails Listed from Compliance Search

Run the Command: New-ComplianceSearchAction -SearchName ” UniqueName ” -Purge -PurgeType HardDelete

*Note: that it does take time to run, so be patient.

* There are different types of deletion in this command. Please see which one suits your needs.

how to delete spam emails

To check the status:

Run the command: Get-ComplianceSearchAction -Identity UniqueName_Purge | Format-List

5. Blocking Email on Office 365 Spam Filter

Log-in to : https://security.microsoft.com/antispam

1. Open Anti-Spam inbound policy (default)

blocking spam

2. Scroll to the bottom and click: “Edit Allowed and blocked senders and domains”

 

 delete spam emails in outlook

3. Add the blocked sender or domain.

 

how to delete spam emails in outlook365

Healthcare Is Lacking Cyber Security

Cyber security threats are rising and are aimed to hit hospitals and healthcare providers. Consultation and help from an outsourced, expert team can save you and your company a lot of time and potential dollars.

Some things are common enough to quickly share throughout an office email:

  • Do not click links or open attachments from unknown sources. This includes links and attachments in your personal email on company WiFi.
  • Do not share your password or enter it in systems that you don’t recognize.
  • Steer clear of online dangers while keeping a professional and acceptable technology use behavior.
  • Report any issues immediately to your manager:
  1. Pop-ups or dangerous software running on your computer
  2. Files are not able to be opened anymore
  3. Computer shows a window asking you to call a phone number
  4. Files moved, disappeared, or copies of files moved to a different folder
  5. Lost or stolen technology
  6. Concerns or indicators of compromise

Further Reason for Concern

  • According to the 2021 Verizon Data Breach Investigations Report, email-related incidents accounted for 36% of all breaches.
  • According to the 2021 Cost of a Data Breach Report by IBM Security, malicious attacks were the most common cause of data breaches, with 52% of all incidents being caused by malicious attacks, and email attacks were the top vector for malicious attacks, accounting for 24% of incidents.
  • According to a 2020 report by Cybersecurity Ventures, phishing attacks, which often use email as a delivery method, are expected to cost businesses $11.5 billion globally in 2021.

Contact Healthcare ITSM for Cyber Security and More

Unwanted emails clutter your inbox and get in the way of momentum during the workday. This is one example of how an easy fix can make a huge impact. We provide core services aligned with the IT service management framework. Whether you’re a startup or enterprise-level company providing healthcare, our holistic approach allows your organization the freedom to focus on core business.

In addition to cyber threats, we address needs related to help desk, information systems, projects and infrastructure, and IT finance. Contact us today to gain a better perspective of how we can help your healthcare business grow and succeed.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Copyright © 2010-2020 Livermore.com & California Media Partners, LLC. All rights reserved.