Cloudflare Docs
Area 1 Email Security
Area 1 Email Security
Visit Area 1 Email Security on GitHub
Set theme to dark (⇧+D)

Retraction guide for Microsoft Office 365

Email workflow for retracting emails with Microsoft Office 365

In this tutorial you will learn how to set up email retraction for Microsoft Office 365.

​​ 1. Authorize Area 1 with Office 365 for retraction

For message retraction to successfully execute, Area 1 needs to be authorized to make API calls into the Office 365 Graph API architecture. The account used to authorize Area 1 requires the Privileged role admin role.

When assigning user roles in the Office 365 console, you will find these roles in User permissions > Roles configuration > Identity admin roles.

​​ How does the authorization work?

The authorization process grants Area 1 access to the Azure environment with the least applicable privileges required to function. The Enterprise Application that Area 1 registers (the Area 1 Security Synchronator) is not tied to any administrator account. Inside of the Azure Active Directory admin center you can review the permissions granted to the application in the Enterprise Application section.

Permissions required for Area 1 to access Office 365

  1. Log in to the Area 1 dashboard, and select Settings (the gear icon).

  2. Go to Email Configuration > RETRACT SETTINGS.

    Access the retract settings in Area 1

  1. You need to authorize Area 1 to execute retractions through the Graph API of Office 365. Make sure that the account that you will be using to authenticate has the appropriate administrative roles assigned. Select Authorize to start the process.

    Select Authorize to start the process of authorizing Area 1 to access Office 365

  2. The Area 1 dashboard will redirect you to a Microsoft login page. Select or enter the appropriate account to initiate the authentication process.

    Select an account or enter a new account to authorize Area 1

  3. Once authenticated, the system will show a dialog box with a list of the requested permissions. Select Accept to authorize the change.

    Select Accept to authorize Area 1 in Office 365

  4. Upon authorization, you will be automatically redirected to the Area 1 dashboard, with a notification that the authorization completed successfully. Select Dismiss to clear the notification.

    Select Dismiss to dismiss the success notification

​​ 2. Configure auto-retraction actions

You can set up auto-retraction to automatically move messages matching certain dispositions to specific folders within a user’s mailbox.

To set up automatic retraction:

  1. Log in to the Area 1 dashboard.

  2. Go to Settings (the gear icon).

  3. On Email Configuration, go to Retract Settings > Auto-Retract.

  4. Select Edit.

  5. For each disposition, choose which folder the message should be sent to:

    • No Action: Do not move the message.
    • Junk Email: Sends the message to the junk or spam email folder.
    • Trash: Sends the message to the trash or deleted items email folder.
    • Soft Delete — user recoverable (Microsoft only): Sends the message to the user’s Deleted Items folder. Messages can be recovered by the user.
    • Hard Delete — admin recoverable (Microsoft and Google): Completely deletes messages from a user’s inbox. For Office 365, the message will be deleted and cannot be recovered without using the admin eDiscovery feature. For Google Gmail messages cannot be recovered, even by the admin.
  6. Select Update Auto-retract Settings.

​​ Post delivery retractions for new threats

Area 1 is continuously gathering new information about phishing campaigns. Users might have email messages in their inboxes that were scanned by Area 1 but not retracted initially because, at the time of scan, these email messages had not been identified as a threat. To mitigate risk, Area 1 offers you tools to re-evaluate email messages at a fixed time interval based on knowledge Cloudflare may have acquired since initial delivery. Any email messages that fit this new threat knowledge will be retracted.

You can enable two options:

  • Post Delivery Response: Area 1 will continue to re-evaluate emails already delivered to your users’ inboxes at a fixed time interval in search for phishing sites or campaigns not previously known to Cloudflare. If any email messages fitting these new criteria are found, Area 1 retracts them.
  • Phish Submission Response: Area 1 will retract emails already delivered that are reported by your users as phishing, and are found to be malicious by Area 1. Retraction will occur according to your configuration.

​​ 3. Configure journaling

​​ 1. Configure connector for delivery to Area 1 (if required)

If your email architecture does not include an outbound gateway, you can skip this step and proceed to the next one.

On the other hand, if your email architecture requires outbound messages to traverse your email gateway, you may want to consider configuring a connector to send the journal messages directly to Area 1.

  1. Log in to the Exchange admin center, and go to Mail flow > Connectors.

    Go to the connectors area

  2. Select Add a connector.

  3. Configure the new connector as follows:

    • Connection From: Office 365
    • Connection to: Partner Organization

    Configure the connector

  4. Select Next.

  5. Configure the connector as follows:

    • Name: Deliver journal directly to Area 1
    • Description: Deliver journal directly to Area 1
    • Turn it on: Enabled.

    Name the connector and give it a description

  6. Select Next.

  7. Configure the Use of connector setting as follows:

    • Select Only when email messages are sent to these domains.
    • In the text field, enter journaling.mxrecord.io as the host address, and select + to add the domain.

    Configure use of connector

  8. Select Next.

  9. Configure the Routing setting as follows:

    Configure the routing setting

  10. Select Next.

  11. In Security restrictions, you need to keep the default TLS configuration. Review the following settings:

    • Make sure the Always use Transport Layer Security (TLS) to secure the connection (recommended) checkbox is selected.
    • In Connect only if the recipients email server certificate matches this criteria select Issued by a trusted certificate authority (CA).

    Configure security restrictions

  12. Select Next.

  13. You need to validate the connector by using your tenant’s specific journaling address. To find this address, go to the Area 1 dashboard > Support > Service Addresses page.

    Validade the connector

  14. Add the address and select Validate.

  15. Once the validation completes, you should receive a Succeed status for all the tasks. Select Next.

    Validation success if all goes well

  16. Review the configuration and select Create connector.

    Review your connector

Your connector is now active. You can find it in Exchange admin center > Mail flow > Connectors.

Connector active

​​ 2. Configure journal rule

  1. Log in to the Microsoft Purview compliance portal.

  2. Go to Data lifecycle management > Exchange (legacy).

  3. Select Settings (the gear icon).

  4. In Send undeliverable journal reports to enter the email address of a valid user account. Note that you cannot use a team or group address.

    Configure undeliverable emails

  5. Select Save.

  6. Still in the Exchange (legacy) screen, select Journal Rules.

    Select journal rules

  7. Select New rule to configure a journaling rule, and configure it as follows:

    • Send journal reports to: This address is specific to each customer tenant, and can be found in your Area 1 dashboard. For example, <customer_name>@journaling.mxrecord.io.
    • Journal Rule Name: Journal Messages to CloudflareArea 1
    • Journal messages sent or received from: Everyone
    • Type of message to journal: External messages only
  8. Select Next.

  9. Verify the information is correct, and select Submit > Done.

    Verify the journal rule information

Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Area 1. After it propagates, you can access the Cloudflare Area 1 dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Area 1 from your Exchange server.

​​ 3. Compliance

​​ Create Office 365 distribution lists

For compliance purposes, you might be required to process emails in certain geographic regions such as India or the EU. If that is your case, you should create Office 365 distribution lists for each geographic region where you need to process your emails, before configuring your journal rule.

​​ Configure journal rule

After creating the distribution lists based on regions for your users, configure your journal rule:

  1. Log in to the Microsoft Purview compliance portal.

  2. Go to Data lifecycle management > Exchange (legacy).

  3. Select Settings (the gear icon).

  4. In Send undeliverable journal reports to enter the email address of a valid user account. Note that you cannot use a team or group address.

    Configure undeliverable emails

  5. Select Save.

  6. Still in the Exchange (legacy) screen, select Journal Rules.

    Select journal rules

  7. Select New rule to configure a journaling rule, and configure it as follows:

    • Send journal reports to: This address is specific to each customer tenant, and can be found in your Area 1 dashboard. If you need to process emails in certain geographic regions, refer to the Geographic locations table for more information on what address you should use.
    • Journal Rule Name: Journal Messages to CloudflareArea 1
    • Journal messages sent or received from: A specific user or group and select the user group you created above.
    • Type of message to journal: External messages only
  8. Select Next.

  9. Verify the information is correct, and select Submit > Done.

    Verify the journal rule information

Once saved, the rule is automatically active. However, it may take a few minutes for the configuration to propagate and start pushing messages to Cloudflare Area 1. After it propagates, you can access the Cloudflare Area 1 dashboard to check the number of messages processed. This number will grow as journaled messages are sent to Cloudflare Area 1 from your Exchange server.

​​ 4. Manual message retraction

When retraction is enabled, you can manually retract messages that were not automatically retracted.

  1. Log in to the Area 1 dashboard.

  2. Select the search bar. From the drop-down menu, select Mail Trace.

    Select the search bar and select Mail trace from the drop-down menu

  3. This will update the search dialog and allow you to search for the messages to retract. Enter the search parameters to find the emails you are looking for.

  4. To retract a single message, select the three dots next to the message, and select Retract. To retract multiple messages, first select the checkboxes on the messages you want to retract. Then, select the three dots > Retract.

    Retract the messages from the search results

  5. Choose where you want to retract the message to, and select Retract message.

    Choose your retraction destination

  6. If the retraction was successful, there will be positive confirmation on Area 1’s dashboard.

    Message confirming the retraction was successful