Introduction
This document describes the configuration steps required to integrate Cisco Secure Email (CES) with Microsoft 365 quarantine.
Overview
In modern email infrastructures, multiple security layers are often implemented, resulting in emails being quarantined by different systems. To streamline user experience and improve notification consistency, it is beneficial to centralize quarantine management in a single platform. This guide explains how to redirect unwanted messages—such as spam and graymail—identified by Cisco CES into the Microsoft 365 user quarantine.
Prerequisites
To complete this configuration, ensure you have the following:
- An active tenant in Cisco Secure Email Gateway
- An active tenant in Microsoft Exchange online.
- Access to Microsoft 365 (O365) services
- A Microsoft 365 Defender license (required to configure quarantine policies and notifications)
Configure Microsoft 365 (O365)
Start by setting up Microsoft 365 to receive and manage quarantined messages.
Enable Quarantine Notifications in Microsoft Exchange online
You can refer to the official Microsoft documentation to configure user notifications for quarantined messages:
Microsoft Quarantine Notification configuration
Create a Mail Flow Rule
Once notifications are active, configure a rule that redirects messages marked by Cisco Secure Email Gateway to Microsoft’s hosted quarantine.
- Open the Microsoft Exchange Admin Center.
- From the left-hand menu, go to Mail Flow → Rules.
- Click Add a rule, and then select Create a new rule.
- Set the rule name to: CSE Quarantine Rule.
- Under Apply this rule if, select The message header, then choose matches text patterns.
- In the header name, enter: X-CSE-Quarantine, and set the value to match: true.
- Under Do the following, choose Redirect the message to, and select Hosted Quarantine.
- Save the configuration.
- After saving, ensure the rule is enabled.
In the picture you can see how the rule looks like.
Microsoft Rule
Configure Cisco Secure Email
In Cisco CES, you can add a custom header (X-CSE-Quarantine: true) to any message we want to redirect to Microsoft’s quarantine.
These messages can be flagged by any content filter or engine in CES. In this example, we configure it for Suspect Spam messages.
- Open the Cisco Secure Email Management Console.
- Go to Mail Policies → Incoming Mail Policies.
- Edit the policies you wish to modify (for example, select the Default Policy).
- Click on the Spam settings for the selected policy.
- Under Suspect Spam, change the action from Quarantine to Deliver.
- Click on Advanced and add a custom header:
- Header name: X-CSE-Quarantine
- Value: true (same value used in the Microsoft rule)
- Click Submit, then Commit Changes to apply the configuration.
In the picture you can see how the configuration looks like.
CES configuration
Verify
From this point on, emails identified by Cisco CES as potential spam are going to be tagged with the custom header. Microsoft 365 detects this tag and redirect the message to the user quarantine.
Users w¡are going receive quarantine notifications according to the Microsoft 365 configuration.
