Important Microsoft 365 Security Update
EasyITGuys has applied an added layer of security protection to certain managed Microsoft 365 environments in response to an active phishing threat.
Who this applies to: This protection applies only to active EasyITGuys business clients enrolled in a co-managed or fully managed IT and Cybersecurity Department experience (Microsoft 365 security management is included).
What happened
A large phishing campaign has been targeting Microsoft 365 users. Because of this, our Cloud Security Team put an additional protection in place to help block suspicious sign-in activity tied to known malicious sources.
In simple terms: We added another layer of protection to help reduce the risk of unauthorized access to covered Microsoft 365 accounts.
Why we took action
Our Cloud Security Team identified an active phishing campaign leveraging device code phishing techniques and other advanced social engineering methods. In some cases, the campaign used personalized AI-generated phishing lures to improve believability and reduce the likelihood of detection.
Due to the scale and effectiveness of this activity, we implemented this added preventative control to help protect covered client Microsoft 365 environments from malicious authentication attempts.
What you should know
- This was done as a proactive security measure.
- This applies only to covered managed business clients.
- No action is needed from most end users.
- If additional security restrictions are needed, our team can review those options with you.
Questions? If you are an active managed client and would like to discuss tighter security settings or additional account protections, please contact your account manager.
Technical details
For clients who want the additional detail, a Conditional Access policy was deployed to help block sign-in activity associated with known malicious infrastructure.
What this means: A new Conditional Access policy was deployed to help block authentication attempts associated with confirmed adversary infrastructure connected to this phishing campaign.
| Conditional Access Parameter | Value |
|---|---|
| Policy Name | Block – Confirmed Adversary Infrastructure |
| Users or Agents | All Users Included |
| Exclusion Group | CAP – Emergency Access Exclusion |
| Target Resources | All Resources |
| Network / Named Location | Confirmed Adversary Infrastructure |
| Conditions (Locations) | Confirmed Adversary Infrastructure |
| Grant | Block Access |
Additional items created
As part of this deployment, the following supporting items were also created:
CAP – Emergency Access Exclusion
Confirmed Adversary Infrastructure
The emergency access exclusion group is a standard Microsoft 365 requirement for broad block policies and is empty by default. The named location contains IP ranges associated with known threat activity.
Good to know: This action was taken as a protective measure to strengthen security and reduce exposure to known phishing infrastructure. If you are an active managed client and would like to discuss additional lockdown measures or further hardening options, please contact EasyITGuys.
Questions
If you have questions about this alert or would like to review additional Microsoft 365 security restrictions, account protection options, or other protective controls, please contact EasyITGuys.
Need a team that does not skip steps?
EasyITGuys helps businesses implement layered IT, cybersecurity, and Microsoft 365 protection with a proactive, standards-driven approach.
Discover more from EasyITGuys
Subscribe to get the latest posts sent to your email.



