13. Review email apps and change availabilityNext upon the list
of hardening your environment, is disabling unused email apps. What happens a lot of times is the hacker will gain entry into the user's mailbox and then setup an IMAP or a
POP connection to the mailbox to send out the spam/phishing emails to everyone else.
Assuming your users are using the browser
or a modern application, for example, Outlook then we can go ahead and disable those email apps. You can disable the email apps using a conditional access policy but I didn't want to write a book so I'm going to show you how to disable it fora user. I'll write another article on conditional access policies that will have that listed so stay tuned. Open
Exchange admin center >
Recipients >
Share with your friends: