Using transport rules as a security tool (Part 2)
This is Part 2 of our series on using transport rules as a security tool. Each article will be linked in the table below as they are published: Part 1 β Setting up the mailboxPart 2 β Itβs all about those transport rules (you are here)Part 3 β Reducing the haystack Spam / Phishing Campaigns … Continue reading “Using transport rules as a security tool (Part 2)”