Configuration

This topic describes how to configure Phishing Response and the systems that it interacts with so that Phishing Response operates correctly.

Phishing Response uses a Sensor, similar to Agari Phishing Defense, to identify malicious messages and the threats within those messages. Sensor setup is completely managed by your Agari sales engineer, but you will need to configure your Microsoft Office 365 settings so that the Sensor receives copies of your email messages. This configuration is referred to as dual-delivery or journaling. See Configure Dual Delivery: Office 365.

NOTE: If you also subscribe to Agari Phishing Defense, your Phishing Response instance uses the Phishing Defense Sensors and does not need Phishing Response-specific ones.

Phishing Response also receives malicious message reports from within your organization. Many email products and add-ons provide as-easy-as one-click reporting of spam, phish, and other malicious messages from within mail client software. See Configure Malicious Message Reporting.

You will also have to authorize Phishing Response to access Microsoft Graph, the API (application programming interface) so Phishing Response can interact with your message store. See Authorize Microsoft Graph.