This admin procedure will provide background information on modifying an existing email connector.
Connectors
Connectors are a collection of instructions that customize the way your email flows to and from your Microsoft 365 or Office 365 organization.
Connectors are used in the following scenarios:
- Apply security restrictions or controls to email that's sent between your Microsoft 365 or Office 365 organization and a business partner or service provider.
- Relay mail from devices, applications, or other non-mailbox entities in your on-premises environment through Microsoft 365 or Office 365.
- Avoid gray listing that would otherwise occur due to the large volume of mail that's regularly sent between your Microsoft 365 or Office 365 organization and your on-premises environment or partners.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.EmailDelivery
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Modifying a TLS Email Connector
- Navigate to Exchange Admin Center – Connectors, select the connector you wish to alter.
- Upon opening the policy, all the information of the policy will be displayed. 3 points of interest will be available to You can modify the sections as needed.
- Name or Status: Adjusts the non-functional aspects of the connector, such as the Name or Description. Additionally, you will be able to turn the connector On or Off from this prompt.
- Name or Status: Adjusts the non-functional aspects of the connector, such as the Name or Description. Additionally, you will be able to turn the connector On or Off from this prompt.
-
- Sent Email Identity: Specifies which sender domains or sending server IPs will be referenced for connector enforcement.
- Sent Email Identity: Specifies which sender domains or sending server IPs will be referenced for connector enforcement.
-
- Restrictions: Specifies how messages will be handled if they do not fall within connector security compliance parameters.
- Restrictions: Specifies how messages will be handled if they do not fall within connector security compliance parameters.
- Once the necessary alterations have been made, select the Save button located at the bottom of anyone of the specified sections to finalize the modification process.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.