On this page
Our recommendation: Use Network for Learning's email protection service
We recommend your school or kura uses Network for Learning (N4L)'s service, which is fully funded. This should be used in addition to your email service’s baseline security settings.
N4L email protection services – N4L
N4L email protection FAQs – N4L
If you want to speak to someone, you can contact their customer support team.
Email: [email protected]
Freephone (NZ only): 0800 LEARNING (532 764)
This is a separate service to N4L’s Safe and Secure Internet.
If you prefer to configure your own settings, we also have recommended settings for Google and Microsoft. Read our guidance below.
Google Workspace security settings
We recommend your school implement the following settings. To implement these changes, you will need admin access to your school’s Google Workspace.
Settings to protect your email domain from spoofing
Spoofing is where an unauthorised person sends emails as your school.
You will need to have security settings in place to prevent spoofing. This means emails you send, such as your school newsletter, are not classed as spam for parents, caregivers and whānau | families.
These settings are:
- Sender Policy Framework (SPF)
- Domain-based Message Authentication, Reporting and Conformance (DMARC)
- Domain Keys Identified Mail (DKIM).
See more information on what these settings are and how they work.
Protecting your email domain from spoofing
If you do not have an information technology (IT) provider, we strongly recommend you join SchoolDNS. Liverton Security can help you move to SchoolDNS and implement SPF, DKIM DMARC at the same time.
Implementing Sender Policy Framework (SPF)
SPF is an email authentication standard that lets receivers of your emails know that they are coming from a legitimate source. It also informs email providers what they should do with emails that do not match the SPF records.
Guidance on implementing SPF on your Google Workspace.
Mail security configurations - sender policy framework
Guidance on implementing SPF on your Google Workspace
Implementing Domain Keys Identified Mail (DKIM)
DKIM adds a digital signature to your outgoing emails so that you can prove you are who you say you are to the email recipient.
Increase security for outgoing email with DKIM – Google
Implementing Domain-based Message Authentication, Reporting and Conformance (DMARC)
DMARC builds off SPF and DKIM. It tells email providers what they should do with emails that do not match the SPF or DKIM records – allow, quarantine (often into spam or junk), or block.
Increase security for forged spam with DMARC – Google
Pre-delivery scanning
This feature provides an additional level of protection by scanning emails for potential phishing prior to being sent to users. This is a straightforward configuration to enable. See the video below for the steps to do this.
Mail Security Configurations - Spam, Phishing and Malware Setting
Pre-delivery scanning
Blocked senders
If your staff or students are receiving unwanted emails, such as spam or phishing, you can easily block the senders.
Block senders
Mail Security Configurations - Spam, Phishing and Malware Settings
DNS settings mail exchange record configuration from Gmail
Mail exchange (MX) records determine where your email messages are delivered to. The correct MX records will ensure successful mail delivery via Google. When you do not have an MX record, the sender’s computer will not know where to send their email to.
We recommend talking to your IT provider or IT lead to review this configuration setting.
DNS Settings MX Record configuration for Gmail
Mail Security Configurations
Disabling POP and IMAP
POP and IMAP allow users to sync their school Gmail account with another email provider, such as Microsoft Outlook or Apple Mail. Unfortunately, this is also a common method cyber criminals use to hack your emails. We recommend disabling it for your school.
Client Access - POP and IMAP
Mail Security Configurations
Additional settings
These settings will provide an additional level of protection to your school.
Security Sandbox
Google’s ‘security sandbox’ scans incoming email message attachments for malicious software and viruses. If the sandbox detects a malicious attachment, it will not be sent to the recipient.
Spam, Phishing and Malware Settings Security Sandbox
Mail Security Configurations
Email allowlist
An allowlist creates a list of trusted addresses. This means appropriate emails can reach your staff and students, instead of their spam mailbox.
Email Allowlist
Mail Security Configurations
Comprehensive mail storage
Comprehensive mail storage generates email notifications when you use Google services. For example:
- creating a Google calendar event
- sharing a Google Drive file.
This stores a copy in the sender’s mailbox which could be useful for tracking or investigations.
Safety Settings Comprehensive Mail Storage
Mail Security Configurations
Automatic forwarding
We recommend turning off automatic email forwarding. This is to avoid phishing or spam emails from being sent on. Forwarding addresses should be reviewed and managed by administrators, as explained in this video.
Client Access - Automatic Forwarding
Mail Security Configurations
External reply warning
An external reply warning appears when you draft an email to someone who is not within your school. This helps to prevent emails being sent to the wrong person.
Client Access - External Reply Warning
Mail Security Configurations
Disable Gmail web offline
We recommend turning off Gmail web offline in case a device is lost or stolen. Gmail web offline allows users to read, respond to, and search emails from their device when they are not online, for example when they are travelling.
Client Access - Gmail Web Offline
Mail Security Configurations
Deactivate test domain alias
We recommend turning off Google’s default test alias. This is an account that is set up using your school domain, for example [email protected] followed by .test-google-a.com.
Cyber criminals may try to use this test domain alias to email phishing attacks to other schools or organisations from your own email address.
Mail Domains - Test Domain Alias
Mail Security Configurations
Microsoft 365 security settings
We recommend your school implement the following settings. To implement these changes, you will need admin access to your school’s Microsoft 365.
Settings to protect your email domain from spoofing
Spoofing is where an unauthorised person sends emails as your school.
You will need to have security settings in place to prevent spoofing. This means emails you send, such as your school newsletter, are not classed as spam for parents, caregivers and whānau.
These settings are:
- Sender Policy Framework (SPF)
- Domain-based Message Authentication, Reporting and Conformance (DMARC)
- Domain Keys Identified Mail (DKIM).
For more information on what these settings are and how they work, see the link below.
Protecting your email domain from spoofing
If you do not have an IT provider, we strongly recommend you join SchoolDNS. Liverton Security can help you move to SchoolDNS and implement SPF, DKIM DMARC at the same time.
Implementing Sender Policy Framework (SPF)
SPF is an email authentication standard that lets receivers of your emails know that they are coming from a legitimate source. It also informs email providers what they should do with emails that do not match the SPF records.
Implementing Domain Keys Identified Mail (DKIM)
DKIM adds a digital signature to your outgoing emails so that you can prove you are who you say you are to the email recipient.
By default, Microsoft will sign outgoing emails on your behalf. You can change this so that your outgoing emails will be signed by your school domain.
Set up DKIM to sign mail from your Microsoft 365 domain – Microsoft
Implementing Domain-based Message Authentication, Reporting and Conformance (DMARC)
DMARC builds off SPF and DKIM. It tells email providers what they should do with emails that do not match the SPF or DKIM records – allow, quarantine (often into spam or junk), or block.
You can also use DMARC to create reports that help you to identify everything that is sending email for your email domain. This can help you identify malicious spoofing of your email domain. We recommend that a DMARC reporting service is used to create easily readable reports.
Set up DMARC to validate the From address domain for senders in Microsoft 365 – Microsoft
Using Microsoft’s recommended security policies
If you have an IT provider or an IT lead, you can set up additional security policies. Microsoft has pre-defined best practice security control settings for email. These settings build upon their default security settings.
When Microsoft adds an additional security setting due to a new cyber threat, the settings for your school will automatically be updated.
Choose between standard and strict policies
Microsoft provides 2 settings:
- Standard protection – provides a suitable level of security for most users against spam, phishing, and malware (malicious software).
- Strict protection – provides more comprehensive protection for staff who receive a lot of spam or phishing or have admin accounts.
We recommend implementing standard protection for all users to start. Upgrade selected users to strict if they experience large numbers of phishing emails.
Read more information on the different settings between default, standard and strict.
Recommended settings for EOP and Microsoft Defender for Office 365 security – Microsoft
Implementing standard or strict policies
To implement these policies you will need to have admin access to your Microsoft tenancy. Microsoft has steps to follow.
Enable Security Presets in Microsoft Defender for Office 365 – Microsoft