🎉 Our Office 365 Reporting Tool is now available in Azure Marketplace 🚀
This website uses cookies to improve your experience. We'll assume you're ok with this. Know more.

How to View Users' Inbox Rules in Exchange Online

The new Exchange admin center no longer allows Office 365 admins to view inbox rules configured by each user in their mailboxes! Many admins are seeking a way to view users' inbox rules without signing into potentially compromised mailboxes. If you're one of them, you’ve come to the right place! This guide will show you how to securely view and manage inbox rules in Microsoft 365 using other solutions, ensuring the security and integrity of your organization’s email system.

Native Solution

Microsoft 365 Permission Required

High

Global Admin or Exchange Admin.

Solution Using Exchange Online PowerShell

  • You can view inbox rules by connecting to Exchange Online PowerShell.
  • Windows PowerShell Windows PowerShell
     Connect-ExchangeOnline
  • Run the PowerShell cmdlet below to retrieve all inbox rules in Exchange Online.
  • Windows PowerShell Windows PowerShell
     Get-Mailbox | ForEach-Object {   $mailbox = $_.PrimarySmtpAddress
    Get-InboxRule -Mailbox $mailbox | Select-Object @{Name="Mailbox";Expression={$mailbox}}, Name, Description } | Export-Csv -Path "<OutputFile>" -NoTypeInformation -Append –Force 
Using Exchange Online PowerShell

Note Deprecated in New Exchange Admin Center

  • Previously, Microsoft allowed office admins to view their users' inbox rules through View another mailbox»organize email (after selecting the desired mailbox)»inbox rules in the EAC.
  • However, with the deprecation of the classic admin center, this path is no longer available in the new Exchange admin center.
  • Microsoft has not yet provided a workaround or solution for accessing inbox rules through this new interface.
AdminDroid Solution
More than 150 reports are under the free edition.

Microsoft 365 Permission Required

Any user with report access delegated by the Super Admin.

StepsUsing AdminDroid

ad
  • Login to the AdminDroid Office 365 Reporter.
  • Go to the All Inbox Rule Configurations report under Analytics»Exchange Analytics»Inbox Rules.
Using AdminDroid

The report offers a thorough breakdown of inbox rules, capturing all aspects such as mailbox UPN, configured conditions, actions, exceptions, and more, leaving no detail unexplored.

inbox-rules-actions-ad-2
  • Examine the utilization of inbox rules by users, particularly for the prevalent actions chosen for automation. You can use our built-in chart functionality to present this data.

Easily Streamline Inbox Rule Management in Microsoft 365!

Spot inbox rules configured with forwarding or deleting to ensure compliance with DLP policies and safeguard against data breaches.

Witness the report in action using the

Exchange OnlineImprove Email Integrity by Managing Inbox Rules in Microsoft 365

Showing 1 of 5

How to manage inbox rules for a shared mailbox?

Managing inbox rules for a shared mailbox is crucial for maintaining security and efficient workflow in Microsoft 365. Shared mailboxes are often used by various teams like sales, support, HR, etc., and they rely heavily on mailbox rules to handle emails consistently. So, it is essential to monitor and manage inbox rules on shared mailboxes.

Review Inbox Rules Using PowerShell

It's important to regularly review the inbox rules for all shared mailboxes. This helps to identify any unauthorized or suspicious rule creations. Use the following PowerShell cmdlet to retrieve all inbox rules for shared mailboxes.

Get-Mailbox -ResultSize Unlimited -RecipientTypeDetails SharedMailbox | ForEach-Object {
$mailbox = $_.PrimarySmtpAddress
Get-InboxRule -Mailbox $mailbox | Select-Object @{Name="Mailbox";Expression={$mailbox}}, Name, Description  } 

This cmdlet will list all inbox rules for each shared mailbox, providing a clear overview for administrators.

Create Inbox Rules Using PowerShell

Creating inbox rules can help manage emails efficiently. For example, you might want to flag emails of particular email types or from specific senders in shared mailboxes. Use the following cmdlet to create a new inbox rule in a shared mailbox after replacing SharedMailboxName with your shared mailbox name.

New-InboxRule "CheckActionRequired" -MyNameInToBox $true -FlaggedForAction Any -MarkImportance "High" -Mailbox "<SharedMailboxName>"

This rule flags any email where your name is in the To box and marks it as high importance. You can also create custom inbox rules using PowerShell as per your needs.

Modify Inbox Rules Using PowerShell

Sometimes, you may need to modify existing rules in a shared mailbox to better suit your needs. For instance, you might want to change the importance of flagged emails. Use the following cmdlet to modify a rule.

Set-InboxRule "CheckActionRequired" -MarkImportance "Low" -Mailbox "<SharedMailboxName>" 

Ensure to replace SharedMailboxName with your shared mailbox name before execution. This cmdlet changes the importance of the "CheckActionRequired" rule from high to low. Additionally, you can modify inbox rules based on various parameters using PowerShell.

Delete Inbox Rules Using PowerShell

To maintain security and efficiency, it's crucial to remove unnecessary or harmful rules that users might have created. Use the following cmdlet to remove an inbox rule.

Remove-InboxRule "CheckActionRequired" -Mailbox "<SharedMailboxName>" 

This cmdlet deletes the "CheckActionRequired" rule from the specified mailbox. You can also delete inbox rules using PowerShell based on various parameters.

By regularly monitoring inbox rules for shared mailboxes, Microsoft 365 admins can ensure secure and efficient email management. However, relying solely on PowerShell for managing inbox rules can be challenging, as it requires knowledge of scripting and may not offer a user-friendly interface.

To effectively keep track of shared mailbox rules without the hassle, AdminDroid offers a solution!

  • With the "Shared Mailboxes with Inbox Rules" report, admins can monitor all the inbox rules set up across the shared mailboxes in one place, simplifying the process and securing the email environment.
shared-inbox-rules-ad

How to find mailboxes with forwarding rules in Microsoft 365?

Monitoring mailboxes with forwarding rules is crucial for admins to prevent data leaks and unauthorized access. For example, an employee might set up a rule to forward emails containing sensitive data to an external personal account, which poses a significant security risk. Once a mailbox with suspicious forwarding rules is identified, admins can review and remove these rules or prevent the user from setting such rules.

To view all the mailboxes having forwarding rules in your Microsoft 365, use the following PowerShell script.

$mailboxes = Get-Mailbox -ResultSize Unlimited
$forwardingMailboxes = @()
foreach ($mailbox in $mailboxes) { 
  $rules = Get-InboxRule -Mailbox $mailbox.Alias
  foreach ($rule in $rules) { 
    if ($rule.ForwardTo -or $rule.ForwardAsAttachmentTo) { 
       $forwardingMailboxes += [PSCustomObject]@{ 
          Mailbox       = $mailbox.Alias
          RuleName      = $rule.Name
          ForwardTo     = $rule.ForwardTo -join ", "
          ForwardAsAttachmentTo = $rule.ForwardAsAttachmentTo -join ", "
            }
         }
     }
}
$forwardingMailboxes | Format-Table -AutoSize
forwarding-inbox-rules-faq2

While using PowerShell scripts to monitor forwarding rules is effective, it can be time-consuming. This method also needs to be run periodically, making it tedious.

AdminDroid offers a suite of powerful reports that streamline the monitoring of forwarding rules in Microsoft 365, aiding admins in detecting and addressing unauthorized forwarding.

  • The Mailbox with Forwarding Inbox Rules report provided by AdminDroid makes it easy to identify email forwarding rules in user mailboxes.
  • This in-depth report provides valuable insights into which mailboxes have forwarding enabled with other key details, aiding in tracking misconfigured rules.
mailbox-with-internal-and-external-frwd-rules-faq2

How to create an alert for external forwarding rules in Microsoft 365?

Suspicious inbox forwarding rules pose significant security risks, as attackers often use them in Business Email Compromise (BEC) attacks. By setting up forwarding rules, attackers can automatically send copies of incoming emails to external addresses, allowing them to intercept sensitive information without detection. This makes it crucial to create alerts for the creation of forwarding rules in Microsoft 365 to promptly identify and mitigate these threats.

Here are the steps to create an alert for forwarding rules in Microsoft 365 Defender:

  • Go to the Alert policies page in Microsoft 365 Defender.
  • Click +New Alert Policy, then name your policy and add a suitable description.
  • Set the severity to High and the category to Mail flow. Click Next.
  • Select the Created mail forward/redirect rule under the 'Activity is' dropdown.
  • Choose Every time an activity matches the rule for how the alert should be triggered. Click Next.
  • Email notifications are selected by default. Select alert recipients.
  • Set the Daily notification limit and click Next.
  • Review your settings, choose Yes, turn it on right away, and click Submit.
  • Click Done.

alert-policy-page-in-ms-defender

By following these steps, you can effectively create alerts for forwarding rules in Microsoft 365, enhancing your organization's ability to detect and respond to potential security threats promptly. However, these alerts are general and do not specify whether the forwarding rules are set to external or internal addresses. Determining this requires a thorough investigation of each rule, which can be tedious.

Monitoring external forwarding rules is a breeze with AdminDroid's dedicated reports!

To effectively keep track of external forwarding rules, AdminDroid provides a report on Inbox Rule Configuration Changes with External Forwarding under Exchange Analytics. These reports offer detailed insights like event time, user who created, rule name, forwarding addresses, etc.

External forwarding alerts made easy with AdminDroid!

You can set up alert polices to notify you when an external forwarding inbox rule is created, in just a few clicks.

  • Apply filter for 'New-InboxRule' operation in the specified report.
  • Hit the bell-icon in the report interface.
  • Click 'Create Alert Policy' button to set up policy.

external-forwarding-rule-creation

How to identify the user-removed inbox rules in Microsoft 365?

Tracking inbox rules removed by users in Microsoft 365 is crucial for various reasons:

  • Detecting if malicious rules were removed to cover tracks after an attack.
  • Ensuring compliance with organizational policies regarding email management.
  • Identifying if rule removals are causing issues with email flow or user experience.
  • Auditing user actions for accountability and identifying training needs.

In Microsoft 365, traditional methods for monitoring user-removed inbox rules have been deprecated. This has made it cumbersome for admins to track these changes, as there is currently no convenient built-in way to generate reports on removed inbox rules by users. The lack of straightforward tracking increases the risk of missing critical security and compliance issues.

Until Microsoft introduces a more convenient solution, AdminDroid offers a robust alternative.

  • AdminDroid's audit reports not only showcase the rules removed by users but also include all rule operations performed by users, such as enabling and disabling rules.
  • Navigate to Analytics»Exchange Analytics»Inbox Rule Audit in AdminDroid.
  • Go to the Other Operations to access the Enabled/Disabled/Removed Inbox Rule Changes report.
removed-inbox-rules-faq1

In addition, AdminDroid provides granular details of every inbox rule and configuration in easily digestible charts and graphs. This comprehensive approach ensures admins have full visibility into inbox rule changes, enhancing security, compliance, and user accountability.

inbox-rules-chart-faq1

How to prevent users from creating potentially harmful inbox rules in Microsoft 365?

Have you heard of Outlook rules attacks? These attacks involve cybercriminals exploiting the rules feature to automate malicious actions such as deleting or exfiltrating sensitive emails. This can happen without the user's knowledge, making the attack hard to detect and allowing continued unauthorized access.

Given these risks, it's crucial to prevent compromised or suspicious users from creating harmful rules. While inbox rule creations can be disabled for all Outlook Web App users via the global setting OWAMailboxPolicy-Default, this might not be a viable option. So, let's walk through how to disable inbox rule options for a particular user in Microsoft 365:

  • Login to the Exchange Admin Center.
  • Click on "Roles" and then select "Outlook web app policies".
  • Click on New OWA policy to create a new policy.
  • Name your policy and click Next.
  • Under the "Features" section, click on Information Management.
  • Uncheck "Inbox Rules" and configure the rest of the policy settings as per your requirements.
  • Click Create to confirm the new settings.

Now apply this policy to the suspicious user using PowerShell:

  • Open PowerShell and connect to your Exchange Online environment.
  • Run the following command to apply the policy to a specific user.
Set-CASMailbox -Identity "<UPN>" -OWAMailboxPolicy "<PolicyName>" 

Once inbox rules are disabled for a user, they will no longer be able to create, manage, or access any rules. Additionally, any rules that were already created will also be inaccessible and cannot be modified by the user.

AdminDroid Exchange Online ReporterMonitoring All Microsoft 365 Inbox Rules Made Easy!

AdminDroid's Exchange Online auditing tool provides insights into inbox rule configurations and operations for all Exchange Online mailboxes. This robust monitoring and auditing capability is vital for admins to uphold organizational policies, detect unauthorized access, and prevent data breaches.

Master Email Rules with AdminDroid's Inbox Rule Configuration Reports!

The 'All Inbox Rule Configurations' report provides a comprehensive overview of all inbox rules in your Microsoft 365 environment. It includes details such as mailbox display name, mailbox UPN, rule name, configured conditions, actions, exceptions, and more, allowing you to effectively monitor and manage inbox rules.

A Quick Summary

Track Inbox Rules with Junk Configurations

Regularly review and adjust inbox rules with junk configurations to prevent important emails from being mistakenly filtered as junk emails.

Instant Alerts for Inbox Rule Changes

Use AdminDroid's alerting feature to detect Microsoft 365 inbox rule changes and stop unauthorized actions, such as auto-forwarding, deleting, etc.

Monitor Archive Inbox Rule Configuration Changes

Audit archive-based inbox rules to ensure compliance with data retention policies and identify potential data leakage risks.

Visualize Inbox Rules in your Microsoft 365

Easily monitor the inbox rules and its configurations with AdminDroid's AI-powered charts, enabling quick identification of outdated rules to streamline email management.

Securely Handle Forwarding Inbox Rules

Keep a close watch on all internal and external inbox forwarding rules across your organization to prevent unauthorized email forwarding to personal accounts or external addresses.

Find Enabled and Disabled Mailbox Rules

Identify all enabled and disabled inbox rules in your organization and check them for any suspicious mailbox rules that are currently enabled.

Ultimately, AdminDroid empowers admins to effectively manage Microsoft 365 mailbox rules with its detailed reports and specialized charts. It enhances visibility into inbox rule usage, enabling swift action against any suspicious activities.

Kickstart Your Journey with AdminDroid

Your Microsoft 365 Companion with Enormous Reporting Capabilities!

Common Errors and Resolution Steps While Managing Inbox Rules in Microsoft 365

The following are possible errors and troubleshooting hints for the inbox rules report in Microsoft 365.

Error: The specified mailbox Identity:"Jimin@contoso.com" doesn't exist.

This error occurs when the specified user does not have the appropriate Exchange Online licenses.

Troubleshooting hint :To fix the problem, make sure the user has the right Exchange Online licenses. You can do this by accessing the Microsoft 365 admin center»Users»Active users. From there, choose the specific user and assign the necessary licenses under "Licenses and apps." Additionally, double-check that the mailbox address is entered correctly to avoid any errors.

Error: Cannot open mailbox. Server = PN3P287MB0337.INDP287.PROD.OUTLOOK.COM, mdbGuid = 92ab37a3-733e-4918-89e6-40998c5df90e, maiboxGuid = c4bc9de5-d444-40e4-8d87-b59a10d2b098

This error occurs when attempting to configure a junk-based inbox rule for another user's folder in PowerShell.

Troubleshooting hint :To configure this inbox rule for others, delegated access to the respective mailbox is required.

Error: Folder Lalisa@contoso.com:/Junk Email doesn't belong to 203589fd-e1be-4629-b101-2f17bdc55e12. You cannot move it.

This error occurs when you try to move the junk email from one mailbox to the junk folder of a different mailbox in Exchange Online PowerShell.

Troubleshooting hint :You can only move junk email in a mailbox to its respective junk folder. For example:

New-InboxRule –Mailbox Shan@contoso.com -Name "Move to Junk" -BodyContainsWords "Offer" -MoveToFolder "Shan@contoso.com:/Junk Email" 

Error: Cannot bind parameter 'RulesQuota' to the target. Exception setting "RulesQuota":The property (RulesQuota (Microsoft.Exchange.Data.ByteQuantifiedSize)) is out of range.

This error occurs when the value provided exceeds the default RulesQuota limits.

Troubleshooting hint :Ensure the quota value is within the valid range of '32 KB (32,768 bytes)' to '256 KB (262,144 bytes)'. The actual value should be expressed in kilobytes (KB), such as '200 KB'.

Set-Mailbox -Identity "MailboxIdentity" -RulesQuota "32 KB" 

Error: The term 'Get-InboxRule' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.

This error occurs when you execute the PowerShell command without connecting to the proper modules.

Troubleshooting hint :Connect to the Exchange Online PowerShell module using the following cmdlet.

Connect-ExchangeOnline