Description
Shield deployment for Microsoft 365 tenants is quick and easy. Completing the pre-flight checklist items is necessary for deployment to be successful. Below are steps to prepare for and complete all steps to onboard your domain to Shield.
Applies to:
Microsoft 365
Prepare for Shield Deployment
Complete the Pre-flight Checklist
Before proceeding, ensure that all items on the Shield Pre-flight Checklist (Not-for-Resale [NFR] domain | all other domains) are performed.
Completing the Pre-flight Checklist is required to ensure a successful and speedy Shield deployment and for Shield to function properly after deployment.
Deploy Shield
Activate Shield from the Mailprotector Console or add a new organization from the Shield Portal.
To activate Shield from the Mailprotector Console:
- NFR domain: From the Reseller level, click on the Shield tab then click on Activate Shield.
- All other domains: Go to the Domain then click on the Shield tab. Click on Open Shield.
To add a new organization from Shield Control, sign in to Shield and ensure you are a Shield Superuser or Administrator for your parent organization. Then click on Organizations, then click on New Organization.
The deployment screen will appear. For a video guide through deployment, please watch below.
Step 1: Connect to Microsoft
Sign in to Microsoft
Use Global Administrator credentials to sign in to the Microsoft 365 tenant you are adding to Shield then Accept permissions for the Shield app.
Step 2: Set Up Domains with Shield
Click Start to begin deploying the domains in the M365 tenant to include in your Shield deployment, or click Skip through those that will not.
Provide DNS credentials for updating SPF and DKIM records:
DNS setup is performed via Entri, which allows for automatic or manual DNS record changes:
- Click Authorize to continue with automatic configuration.
- Click on >> Or forward login to someone else if you need someone else to authorize for you.
- Click on Go to our manual setup if you want to do it yourself or work with a DNS provider that is not available in Entri.
Step 3: Configure Mail Flow
Click on Configure mail flow to automatically configure the Inbound and Outbound Connectors, Transport Rules, and Trusted ARC Sealer.
When Mail Flow setup is complete, click Next to continue to the final step.
Organization Successfully deployed
Shield will stay in passthrough mode until you're ready to activate the organization. Only messages with Dangerous Results will be held by Shield.
See Configuring Risk Levels for more information about Dangerous Results.
If you're ready now, click on Activate users to be brought into Shield Control. The deployment process is now complete.
Getting Help
If you need assistance with these steps, please contact the Partner Success team.
Related to
Updated