Audit report showing encrypted messages sent
Messages are encrypted automatically according to rules. However, there is no way to confirm for audit purposes that a message was actually encrypted.
+1 on a report that shows non-TLS connections so that we can identify partners or possibly internal relay devices that may have misconfigured email settings to not use TLS or may not know that TLS is an option.
Hi. I don`t know sice when but I think we have the report avaliable.
You can see it at "Security and compliance" Dashboard, "Outbound and Inbound mail flow", "Connector report", "Request report"
Has anything been made available to produce a report like this?
Back in August 2015 somebody posted 'Further, I need a report of all emails that went in and out and whether they went TLS or not. The report could be very simple: a message ID, sender, recipient, and TLS/SMTP would be adequate.' We are still in the same position with unidentifiable users accessing office 365 with no TLS. This is appalling. In my view Microsoft is in breach of the GDPR in this matter. I plan to report it to Data Protection authorities. Also their servers are not working with TLS 1.3. My browsers all work with 1.3 as do my websites.
Artur Rajtmajer commented
Apparently we have quite few Outbound messages sent from our tenant with No TLS or TLS 1.0, but there is no way of telling who/when sent these, so effectively the TLS report in Office 365 is useless. There is no way to trace these with Mail Flow or Connector Report.
In the on-premises Exchange that information would be in:
C:\Program Files\Microsoft\Exchange Server\Vxx\TransportRoles\Logs\ProtocolLog
Microsoft Office 365 Business Support Team has no idea how to get that information - with 31st Oct approaching this is just unbelievable.
John C commented
With the October 31 deadline fast approaching, there needs some Microsoft action on this. It looks like this issue was originally "voiced" in 2015.
I regularly review headers and found some strings that we may be able use to search for version number in the headers. This issue is, how to generate the report.
Unfortunately, neither Message Trace nor eDiscovery search in headers.
"version=TLS1 " (with the space for TLS 1.0)
"version=TLS1_1" (TLS 1.1)
The problem will be detecting emails without TLS. (I am guessing we could search for messages without "version=TLS" in the header
Dan McLaughlin commented
I agree. The only information the TLS report gives us is the number of emails inbound and out bound for TLS and non TLS emails. I am sure there is a way they can give us the information on the actually emails sent and received.
Security and Compliance/Mail Flow/Dashboard/Mail flow insights
/Outbound and Inbound mail flow/Messages protected in transit (by TLS)/View Details.
With older TLS versions being sunset, this is a must!!!
We need to see details of emails:
Sender email address
Recipient email address
We need to know which are the domains failing to negotiate TLS with us.. I can't find any info about it
encrypted email flow report in office 365, how can i generate a report like that?
Jesse Honigberg commented
this is crazy that this feature is missing. It has been standard in Zix for 5 years and we get advanced analytics out of Smarsh.
Further, I need a report of all emails that went in and out and whether they went TLS or not. The report could be very simple: a message ID, sender, recipient, and TLS/SMTP would be adequate.