WebSite X5Help Center

 
Nicolai Stoltt H.
Nicolai Stoltt H.
User

E-mail form object - Office 365 - phishing/spoofing  en

Author: Nicolai Stoltt H.
Visited 2507, Followers 1, Shared 0  

Hi,

When sending e-mails from Website X5 through an Office 365 mail account, we do have some issues with phishing and characteristics of the phishing schema/spoofing.

If we apply the feature "Include the collected data in CSV format" we simply don't receive any e-mail.

We are using the PHP Mailer (recommended) e-mail script type.

We get a warning when receiving the e-mail, that the sender did not furfill the control of fraud, and that the sender possible not is the person that the person tell it is?


Here's a link from Microsoft that descrips the problem.

https://support.office.com/en-US/article/How-Office-helps-protect-you-from-phishing-schemes-BE0DE46A-29CD-4C59-AAAF-136CF177D593

It seems, that the structure of the generated e-mail is NOT furfilling the demands from Microsoft.

Microsoft advice is to inform the sender immediately and destroy the e-mail!

I've tried to setup SMTP settings via SSL and specify account credentials but can't get it to work in Website X5.

Works fine other places..  please help.

Posted on the
2 ANSWERS
Incomedia
Claudio D.
Incomedia

Hello Nicolai,

What exactly happens with you use the SMTP script option?

In case of use of an external email it is better to use authenticated SMTP since then the sender is always verified. As anternative, if you use the email of the domain where you have the website you can use all the other script options.

Are you using the correct SMTP data you received for the office 365 account?

Many thanks!

Read more
Posted on the from Claudio D.
Nicolai Stoltt H.
Nicolai Stoltt H.
User
Author

Hi Claudio,

Yes, I'm using the correct auth. data to my office 365 account. I'm using the same credentials in other applications where it works fine. I'll try to create a small test project with one e-mail form and try different solutions regarding TLS/SLL.

I'll bee back again..

Read more
Posted on the from Nicolai Stoltt H.