HowTo: Configure CyberHoot's Report Phish Integration for M365

HowTo: Configure CyberHoot's Report Phish Integration for M365

Microsoft 365 Built-in “Report Phish” Integration


🔹Overview

Microsoft 365 supports a native Report button in Outlook that users click to report suspicious email. Admins can configure these reports to be delivered to a designated reporting mailbox.

This guide assists your organization in sending user reports to CyberHoot.


1️⃣ Access Microsoft Defender Portal

  1. Open your browser and go to:
    👉
  2. Sign in with an admin account that has one of these roles:
     Global Administrator
     Security Administrator
    Exchange Administrator

2️⃣ Open User Reported Settings

You can get to the correct page either of two ways:

Option A — Navigate Manually

From the Defender portal:

  1. Select System (gear icon ⚙️
    at bottom left)
  2. Choose Settings, Email & collaboration
  3. Click User reported settings(Microsoft Learn)

Option B — Use Direct Link

If you have permission, you can jump straight to the configuration page:

👉


3️⃣ Turn on Monitoring of Reported Messages

On the User reported settings page:

  1. Look at the top — find Monitor reported messages in Outlook
  2. Check the box
    to enable it.
    • If this setting isn’t enabled, the rest of the configuration won’t work.

4️⃣ Configure the Report Button

Below the Outlook settings:

  1. Under Select an Outlook report button configuration, choose:
    Use the built-in Report button in Outlook
    • This ensures users see the native Report (flag/Phish) option in Outlook clients.

5️⃣ Choose Where Reported Messages Go

In the Reported message destinations select:

Option

Meaning

My reporting mailbox only

Sends reports only to your designated mailbox


6️⃣ Enter Your Reporting Mailbox

Below the destination choice:

  1. In the field Add an Exchange Online mailbox to send reported messages to, enter your internal mailbox address (e.g., reportphish@yourdomain.com
    ).
    • Only internal domain mailboxes are accepted here.
    • Microsoft will not let you enter an external domain directly at this step.
  2. Click Save when done.

7️⃣ Verify the Report Button Works for Users

Have a test user perform these steps:

  1. Open a suspected phishing email in Outlook (desktop or web).
  2. Click Report → Report phishing.
  3. Confirm the message is delivered to the reporting mailbox.
    • You can also check the User reported tab under Actions & submissions → Submissions in Defender (optional).(Microsoft Learn)

8️⃣ Forward Reports to CyberHoot

  1. Create an internal mailbox (e.g., reportphish@yourdomain.com
    ).
  2. In Exchange Online, configure that mailbox to forward all received reports to your CyberHoot ingestion address.
    • Keep a copy
      in the internal mailbox if you want retention/audit.
    • This ensures only this mailbox has external referencing forwarding, not all users.

8️⃣.1️⃣ Allow External Forwarding for the Reporting Mailbox Only

Microsoft blocks automatic external forwarding by default.
You must enable it only for the reporting mailbox.

  1. Go to:
  2. Navigate to:
    Email & collaboration → Policies & rules → Threat policies → Anti-spam
  3. Click:
    Anti-spam outbound policy (Default)
  4. Click:
    Edit protection settings
  5. Under Forwarding rules
  6. Select On – Forwarding is enabled
  7. Leave all the other settings to their Default

8️⃣.2️⃣ Configure Mailbox Forwarding in Exchange Admin Center

Now configure the reporting mailbox to forward to CyberHoot.

  1. Go to:
  2. Navigate to:
    Recipients → Mailboxes
  3. Select the mailbox:
    reportphish@yourdomain.com
  4. Select:
    Mailflow settings
  5. Click:
    Email forwarding
  6. Toggle Forward all emails sent to this mailbox to On
  7. Enable:
    Deliver message to both forwarding address and mailbox
  8. Click Save

📌
Result:
User-reported messages arrive in the internal mailbox and are automatically forwarded to CyberHoot.

8️⃣.3️⃣ Validate the Full Flow

  1. Send a test phishing email to a user
  2. User clicks Report phishing
  3. Confirm:
    • Message arrives in the internal reporting mailbox
    • Message forwards to CyberHoot
    • The original email is preserved as a 
    .eml
    attachment

 

    • Related Articles

    • HowTo: Configure CyberHoot's Report Phish Integration for Google Workspace

      Google Workspace "Report Phish" Integration ? Overview Gmail's built-in "Report Phishing" button sends reports only to Google's internal Alert Center — it does not forward to a custom mailbox. To route user-reported phishing emails to CyberHoot, a ...
    • HowTo: Allow-List CyberHoot’s AttackPhish Simulation Servers in M365

      Detailed Instructions From Microsoft: https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/skip-filtering-phishing-simulations-sec-ops-mailboxes?view=o365-worldwide Once you click the link above, follow the instructions under ...
    • HowTo: CyberHoot’s API Documentation

      Overview CyberHoot’s API allows for the following information to be pulled from the platform: Customers Managers Users Administrators Compliance Metrics Training Schedules Partner Settings Subscription Information Email Logs Reporting More ...
    • HowTo: Allow-List CyberHoot’s Mail-Relays in M365

      High-Level Instructions: This HowTo video walks you through allow-listing CyberHoot’s Mail-Relay by either Domain Name or IP Addresses in Microsoft’s O365 environment. This process is very similar whether you use the domain names shown below or the ...
    • HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

      New CyberHoot businesses need to allow our training and phishing emails to reach their user’s inboxes directly. This article describes the two steps needed to make this happen. Note: If you wish to create an allow-list just for yourself personally ...