Reject Direct Send
On June 26, “Bleeping Computer” announced a Microsoft vulnerability that’s being exploited by bad actors. The TLDR is this: In the Exchange Admin Center, enable the “Reject Direct Send” setting, unless you absolutely need it for some sort of legacy printer/scanner. Better yet, upgrade that scanner to support authentication so you can “Reject Direct Send”.
What’s going on
The feature “Direct Send”, according to Bleeping Computer, exists to allow a device on your network to send an email without actually logging into Exchange Server with a valid username and password. Direct Send allows a device to construct an email which appears to be sourced from within your organization, which bypasses the ordinary SPF, DKIM/DMARC features designed to prevent spoofing of emails.
For email servers which allow Direct Send, a bad actor can get an email onto your network (with a malevolent attachment) that will be difficult for end-users to see as suspect, or potentially dangerous.