Overall Flow Diagram
Before You Start
You’ll need: Exchange admin and Security admin permissions.
What you’ll set up:
a mail contact for PhishArm
Microsoft’s built-in Report button + a reporting (shared) mailbox
Mark that mailbox as a SecOps mailbox (advanced delivery)
An outbound connector (direct report forwarding)
Mail flow rules to route reported messages
Step 1: Add Mail Contact in the Exchange admin center
Step 1: Add Mail Contact in the Exchange admin center
Now that the plugin is installed, it’s time to set up the Right-Hand reporting email contact.
To do this, log in to your Exchange Admin Center, then go to Recipients > Contacts to add the reporting email.
Click Add a mail contact.
In the New Mail Contact pane, type your details:
a) Display Name: The name that would appear on the Contacts page.
b) Alias: Type PhishArm as the Alias name.
c) External email address: Type [email protected] as a contact.
Click Next. The Mail contact information (optional) appears.
Click Next.
The Review mail contact displays the summary of data entered.
Review the data and click Create.
The new contact will take a while to appear on the Contacts page. You can refresh the page or wait for some more time for the contact to occur.
Why this matters: This contact is the external destination for forwarded report emails.
Step 2: Configure the Microsoft native report button and the Internal mailbox
Step 2: Configure the Microsoft native report button and the Internal mailbox
Important: As per the NEW CHANGES from Microsoft, Microsoft now recommends routing phishing simulated reports to a dedicated internal mailbox. So, create a specific shared mailbox within the organization where all phishing simulation reports will be collected.
Once the mail contact is set up, the next step is to enable the feature and configure a few important policies and rules in Microsoft 365 Defender.
Follow the steps below to enable the settings and set up the necessary rules:
Log in to your Microsoft 365 Defender portal and navigate to Settings > Email & collaboration > User reported settings.
On the User reported settings page, enable the toggle button.
Select the built-in reporting option, as it is easy to report.
You can configure messaging criteria based on your company’s needs. Select the Customize messages option, choose your preferred language for the prompt, set new messages in each tab, and click save.
Inside the reported email destination, select "My reporting mailbox" from the Send reported messages to: drop-down.
Important: Provide the email address of the internal reporting mailbox where these reports will be sent.
6. Click on the Save button.
Now, the Microsoft plugin has been configured.
Tip: Using the built-in button keeps things simpler and supported across Outlook apps.
Reference: user-reported settings
Step 3: Configure SecOps mailbox
Step 3: Configure SecOps mailbox
To prevent Microsoft filtering from blocking the reported-message flow, inform Defender that the mailbox is used for Security Operations (SecOps).
Go to Microsoft 365 Defender Portal -> On the left menu click on Email & collaboration -> Click on Policies & rules -> click on Threat Policies.
Under Rules Section, click on Advanced Delivery -> click on SecOps mailbox -> Click Edit.
Inform Microsoft that the newly created mailbox is a “SecOps mailbox” so emails are forwarded correctly and not quarantined or filtered.
Reference: Microsoft’s guidance on why this is required can be found here.
On the page, click “Add” (or “Edit” if a SecOps mailbox already exists).
Search for and select the newly created mailbox, then click “Add”.
That’s it, this step is complete!
Step 4: Create The Outbound Connector
Step 4: Create The Outbound Connector
You’ll set up a connector from Office 365 → Partner organization that routes via RH Hostname and enforces TLS.
in EAC → Mail flow → Connectors → Add.
From: Office 365 | To: Partner organization.
Name: RH Direct Report Forwarding | Status: On.
Use of connector: Use only when I have a transport rule set up that redirects messages to this connector.
Routing: Route email through these smart hosts:
Note: Ask the Support team to share the RH Hostname with you.
6. Security restrictions: Always use TLS and only accept certificates from trusted CAs.
7. Validate the connector by using reports@phisharm and confirm that Validation is successful.
References: connectors to partners + general connector setup
Step 5: Add Mail flow rules in the Exchange admin center
Step 5: Add Mail flow rules in the Exchange admin center
Step 6: Report the Phishing Email
Step 6: Report the Phishing Email
Now, log in to Outlook and report the email. Below are various ways to report emails from different devices/operating systems. Choose the method that suits you appropriately.
Desktop App- Windows
Open the email you want to report.
a) From the top menu, click the Report drop-down and select Phishing/Junk. The email will be reported and will appear on the Right-Hand PhishArm dashboard. (In Step 2, if you have selected Ask me before reporting, you’ll be prompted to confirm your actions.)
Desktop App- Mac
Right-click on the email you want to report.
a) Select Report > Report Phishing/Junk. The email will be reported and will appear on the Right-Hand PhishArm dashboard. (In Step 2, if you have selected Ask me before reporting, you’ll be prompted to confirm your actions.)
Mobile
Frequently Asked Questions
Frequently Asked Questions
Why do we need a connector in this setup?
The connector makes sure that reported emails are routed out of Office 365 and delivered safely to the PhishArm address ([email protected]
). Connectors are Microsoft’s supported method to extend mail flow to trusted partners.Can’t I just set a forward rule?
Regular forwarding rules work inside your tenant. When you need to send reports to an external system (like PhishArm), you need a connector so Microsoft recognizes it as an allowed, secured route. This avoids the mail being blocked, false positives, or failing TLS checks.How does the SecOps mailbox avoid false positives?
By designating the mailbox as a SecOps mailbox in Advanced Delivery, Microsoft ensures:
Legitimate test/simulation emails aren’t misclassified as threats.
User-reported real emails arrive unchanged for analysis.
Security tools don’t create “false positives” by filtering out mail that you actually want your team to investigate.
Why do we need to mark the reporting mailbox as a SecOps mailbox?
When you don’t mark it, Microsoft’s normal security filters (spam, phishing, junk) can still block, quarantine, or alter user-reported messages. That means your analysts might never see the original, intact email.How does the connector work with the mail flow rules?
The mail flow rules act like “filters” that catch reported messages and then hand them off to the connector. The connector then delivers those messages to PhishArm through the secure path (RH Mail Server
). Think of the rules as “When to use” and the connector as “How to send.”Why a smart host?
A smart host lets you route matching messages through a partner’s system. This is a standard Microsoft pattern for conditional/partner routing.