Skip to main content

Allowlisting - Bypass Safe Link/Attachment Processing of M365 Advanced Threat Protection (ATP)

In order for GrintOps emails to function correctly, there are two sections that require additional rules to bypass Microsoft's Advanced Threat Protection system.

Note: As a precaution, we recommend waiting 1 hour after enabling these bypass policies to begin testing.

Step 1. Bypass ATP Attachments Scanning

To bypass ATP Attachment Processing, set up the following mail flow rule:

  1. Log into the Microsoft 365 (formerly Office 365) portal and select "Admin centers" > "Exchange".


  2. Select "Mail flow" to expand the settings menu then select "Rules".


  3. Click "Add a rule".
    ATP - Attachment Bypass Rule - IP addresses - New Rule.png
  4. Click "Create a new rule".


  5. Give the rule a name, e.g., "Bypass ATP Attachment Processing - IP Address".

    mceclip0 (1).png




  6. Under "Apply this rule if" select "The Sender..." > "IP address is in any of these ranges or exactly matches"


    mceclip1.png



  7. Then enter each of GrintOps IP addresses, clicking the "Add" button for each. (A complete list of our IP addresses can be found here.) Then hit "Save".

    mceclip2.png

  8. Under "*Do the following" select "Modify the message properties..." > "set a message header".

    WhatsApp Image 2025-07-17 at 22.50.58_cceff991.jpg



  9. Edit the properties of this by selecting the "Enter text" buttons:


    Use the following entries:
    Set the message header to "X-MS-Exchange-Organization-SkipSafeAttachmentProcessing" and set the value to "1".


  10. Click "Next".
  11. Leave all settings in "Set rule settings" as their default values and click "Next".


  12. Review your settings and click "Finish".

    WhatsApp Image 2025-07-17 at 22.37.35_f530fe42.jpg


Step 2. Bypass ATP Safe Link Scanning

Note: The next rule to implement is dependent on whether you use Defender for Office 365 (ATP) Plan 1 or Plan 2.

Do not implement BOTH rules below as they will interfere with each other.

If you do not know which Defender plan you have, simply follow the guide for Plan 2If the Safe Links policy (on step 4) is not available, you have Plan 1.

Step 2. Plan 1 - Mail Flow Rule (ATP Link Bypass)

  1. Log into the Microsoft 365 (formerly Office 365) portal and select "Admin centers" > "Exchange".
  2. Select "Mail flow" to expand the settings menu then select "Rules".

  3. Click "Add a rule".


  4. Click "Create a new rule".
  5. Give the rule a name, e.g. "Bypass ATP Link Processing - GrintOps IP Address".

    mceclip0 (1).png




  6. Under "Apply this rule if" select "The Sender" > "IP address is in any of these ranges or exactly matches".

    WhatsApp Image 2025-07-17 at 22.46.50_1ae896ca.jpg



  7. Then enter each of GrintOps IP addresses, clicking the "Add" button for each. (A complete list of our IP addresses can be found here.) Then hit "Save".

    mceclip2.png



  8. Under "*Do the following" select "Modify the message properties..." > "set a message header".

    WhatsApp Image 2025-07-17 at 22.43.47_6d1bfc05.jpg



  9. Edit the properties of this by selecting the "Enter text" buttons:


    Use the following entries:
    Set the message header to "X-MS-Exchange-Organization-SkipSafeLinksProcessing" set the value to"1".


  10. Click "Next".
  11. Leave all settings in "Set rule settings" as their default values and click "Next".


  12. Review your settings and click "Finish".

    WhatsApp Image 2025-07-17 at 22.37.35_bdae2dc8.jpg


Step 2. Plan 2 - Threat Policy (Safe Link Bypass)

  1. Visit your Microsoft 365 Admin Center and click "Security" to open the Microsoft 365 Defender page.
  2. Click "Policies & rules" > "Threat policies"
  3. Click Safe Links 
  4. Either edit the existing ATP Link Policy and click "Edit policy" or click the "Create" button to make a new one and call it something descriptive (e.g. GrintOps Safe Link Bypass). Once done, click Next.

    WhatsApp Image 2025-07-17 at 22.38.19_a097b961.jpg

     
  5. Ensure the policy includes all employees within your organisation. If you have a group that can be used for this, then select the group or simply select the domain that your employees have all their email addresses under (as shown in the example below). Once done, click Next.
  6. Leave all items as default but select the Manage 0 Urls hyperlink under the "Do not rewrite URLs..." field. Then click to add URLs:
  7. Finally, in the "Do not rewrite the following URLs" section, add domains that GrintOps use for phishing landing pages. Please see our Allowlisting - Quick Reference article for a full list of our landing page domains. Each landing page domain needs to be added.
    Note: Each domain must be added using the format *.[rootdomain]/* so if you are adding the domain "authwebmail.com", you need to enter *.authwebmail.com/* 

       The following are examples of phishing website domains:

authwebmail.com/*
*.authwebmail.com/*
cmail31.com/*
*.cmail31.com/*
securesupportcloud.com/*
*.securesupportcloud.com/*
webnotifications.net/*
*.webnotifications.net/*
alerting-services.com/*
*.alerting-services.com/*

The following are examples of Manage URLs to Not Rewrite:


  1. Click Next and then Select Submit. And you're all done! These changes may take up to an hour to take effect.