Table of contents
Get insights delivered straight into your inbox every week!

Best Practices for Encrypting External Emails in Microsoft 365

Encrypting external emails in Microsoft 365 is essential to protect sensitive information from interception and unauthorized access. This guide explains the three main encryption methods available - Microsoft Purview Message Encryption (MPME), S/MIME, and TLS - and how to set them up effectively. Here's what you need to know:

  • Microsoft Purview Message Encryption (MPME): User-friendly, works through a web portal, and supports features like "Do Not Forward" and custom policies. Best for organizations needing flexibility and ease of use.
  • S/MIME: Offers strong, certificate-based encryption for end-to-end security but requires complex certificate management. Ideal for industries with strict compliance needs.
  • TLS: Secures data during transit between servers but doesn’t protect stored emails. Suitable for basic protection in less sensitive communications.

Quick Comparison

Feature MPME S/MIME TLS
Ease of Use High (web portal access) Low (certificate setup) High (automatic)
Security Strength High Very High Medium
Recipient Requirements No extra software needed Certificates required None
Best Use Case Flexible external sharing Strict compliance needs Basic data protection

To implement encryption effectively:

  1. Set Up Policies: Use tools like data loss prevention (DLP) rules and sensitivity labels to automate encryption.
  2. Train Employees: Teach users how to handle sensitive data and assist external recipients.
  3. Review Regularly: Update policies quarterly to align with changing regulations and business needs.

For small businesses, MPME strikes the right balance between security and usability. S/MIME suits industries like finance and healthcare, while TLS works for routine exchanges. Choose the method that fits your organization's needs and the technical capabilities of your recipients.

Main Encryption Methods for External Emails in Microsoft 365

Microsoft 365

Microsoft 365 provides three main encryption methods for securing external emails, each with its own features and limitations. Here's an overview of these methods and what they bring to the table.

Microsoft Purview Message Encryption

Microsoft Purview Message Encryption

Microsoft Purview Message Encryption (MPME) combines email encryption with rights management using Microsoft Purview Information Protection. This approach secures emails for both internal and external users without requiring additional software. External recipients receive a notification email with a link to an encrypted message portal, where they can access the email using their existing credentials or a one-time passcode.

MPME supports three levels of protection:

  • Do Not Forward: Blocks recipients from forwarding, copying, or printing the message.
  • Encrypt-Only: Offers basic encryption without restricting how the message is used.
  • Custom Templates: Allows administrators to create tailored rights management policies.

For emails using the Do Not Forward option or custom templates, attachments up to 25 MB are protected. The Encrypt-Only option allows administrators to configure attachment settings. Additional features include revoking messages, setting expiration dates, logging external activity, and applying custom branding. Organizations can also use Bring Your Own Key (BYOK) for enhanced key management.

That said, MPME is not considered true end-to-end encryption since Microsoft can access plaintext content on its servers before re-encrypting it for the portal. It also has some limitations: attachments stored in SharePoint or OneDrive aren’t supported, and the encrypted portal only works for email messages - not calendar invites or voicemail.

S/MIME Encryption

S/MIME (Secure/Multipurpose Internet Mail Extensions) uses certificate-based encryption to secure emails and their content, even after they’ve reached the recipient's inbox. It works by encrypting messages with digital certificates, which also serve as a digital signature to verify the sender’s identity and ensure the message hasn’t been tampered with.

When users manage their own keys, S/MIME can provide true end-to-end encryption. However, it’s not the easiest option for external communications. Both the sender and recipient must install individual digital certificates on their devices, and managing these certificates through Certificate Authorities adds complexity. Many email clients also require extra configuration, making S/MIME less practical for everyday external use.

TLS Encryption

Transport Layer Security (TLS) provides server-to-server encryption, securing data while it’s in transit between email servers. By authenticating server identities and creating secure connections, TLS helps prevent eavesdropping and man-in-the-middle attacks. It’s straightforward to deploy and offers a basic level of protection during transmission.

However, TLS only encrypts data while it’s in transit. Once the email reaches the recipient’s server, it is stored in plain text, which makes it unsuitable for highly sensitive information like financial records or medical data. Additionally, older versions of TLS (1.0–1.2) are vulnerable to attacks such as POODLE, DROWN, and SLOTH.

How to Set Up Encryption for External Emails in Microsoft 365

Configuring encryption for external emails in Microsoft 365 involves a series of steps tailored to your organization's specific needs and technical setup. The process varies depending on the encryption method you choose, so understanding the requirements and options is key.

Setting Up Microsoft Purview Message Encryption

Microsoft Purview Message Encryption (MPME) is built on Azure Rights Management, making it essential to activate this service before proceeding. Here's how to get started:

Verify Azure Rights Management is Active

For MPME to function, Azure Rights Management must be enabled. In most Microsoft 365 plans, this service activates automatically. If it’s not active, you can enable it manually via the Microsoft 365 admin center under Azure Information Protection. If your organization uses AD RMS, you’ll need to migrate to Azure RMS before using MPME.

Manage Your Tenant Key

By default, Microsoft handles the root key for Azure RMS, which is sufficient for most organizations. However, if your compliance standards require more control, you can opt for a "bring your own key" (BYOK) approach. Make sure this step is completed before configuring MPME if you choose to manage your own keys. Once Azure RMS is active and key management is set, you can move on to automating encryption.

Set Up Mail Flow Rules for Encryption

To automate encryption, verify your MPME status using Exchange Online PowerShell. Then, create mail flow rules that trigger encryption based on specific conditions, such as emails sent to external domains, messages containing particular keywords, or emails tagged with sensitivity labels. For recipients using non-Outlook clients like Gmail or Yahoo, encrypted messages will include a wrapper message for access. Features like message expiration and revocation are only available when recipients use the web portal, so you may want to enforce portal access with custom branding and tailored mail flow rules.

Setting Up S/MIME for Certificate-Based Encryption

S/MIME encryption provides robust security but requires digital certificates for each user, making it more labor-intensive to implement.

Certificate Requirements and Deployment

Each user sending or receiving S/MIME-encrypted emails needs a digital certificate for signing and encryption. These certificates must be obtained from a trusted Certificate Authority and published to your on-premises Active Directory. Afterward, synchronize user certificates with Microsoft 365 to ensure proper verification of digital signatures and decryption of messages. This process includes setting up a certificate collection in Exchange Online to facilitate secure communication.

Configure Email Client Support

S/MIME is compatible with various email clients, including Outlook, Outlook on the web (for Windows), and mobile apps like Outlook for iOS and Android or Exchange ActiveSync. Each device requires users to install their certificates, which must be renewed periodically through your Certificate Authority. Proper configuration is necessary for each client to handle S/MIME encryption seamlessly.

Automating Encryption with Policies and Labels

Once encryption is configured, automation ensures consistent practices across all outgoing emails. Microsoft 365 provides several tools to streamline this process, including DLP policies, sensitivity labels, and mail flow rules.

Data Loss Prevention (DLP) Integration

DLP rules can automatically encrypt emails containing sensitive information, such as Social Security numbers or credit card details. By setting specific conditions, you can ensure encryption is applied whenever regulated data is detected.

Sensitivity Labels for Classification

Sensitivity labels make it easy to classify and protect emails. For instance, labels like "Confidential - External" or "Restricted - Partners Only" can automatically apply encryption. These labels can be assigned manually by users or automatically based on content analysis. Once applied, the system handles the encryption process, combining security with ease of use.

Mail Flow Rules for Consistent Enforcement

You can create additional mail flow rules to encrypt emails sent to specific partner organizations, emails with particular subject line patterns, or messages based on the sender’s department or role. To simplify operations, you can also set exceptions for trusted external partners with their own encryption systems or exclude automated system messages from encryption. This approach balances strong security with reduced complexity.

Best Practices for Secure External Email Encryption

Managing encryption policies, training users, and maintaining technical oversight are essential for securing external email communications. These steps ensure your encryption measures stay effective as your communication needs change.

Regular Policy Reviews and Updates

Make it a habit to review encryption policies every quarter to keep up with compliance requirements. During these reviews, check which emails are encrypted, identify any gaps, and ensure your rules align with your organization's security goals.

Stay alert to regulatory updates that could impact your encryption practices. For instance, healthcare organizations need to adjust policies when HIPAA guidelines change, while financial services must track updates to SEC communication rules. Be sure to document any changes and share them with your IT team and employees.

Use tools like the Microsoft 365 compliance center to monitor encryption usage. Metrics such as encryption success rates, user adoption, and external feedback can help you pinpoint areas for improvement. For example, if certain departments bypass encryption or external partners face access issues, these insights can guide your adjustments.

User Training and Awareness

Educating employees about encryption is just as important as implementing secure policies. Train them to recognize sensitive information that requires encryption, such as financial reports, contract details, or customer data. Additionally, teach them how to help external recipients access encrypted content smoothly.

Provide simple instructions for external recipients. A straightforward guide that employees can share with external partners can reduce confusion and support requests. This improves the overall experience for everyone involved.

During training sessions, demonstrate how modern encryption tools like Microsoft Purview Message Encryption work with most email platforms. Show the differences between encrypted and unencrypted emails to emphasize the importance of using encryption effectively.

Key Management and Certificate Lifecycle

Keeping up with certificate renewals is critical to avoid disruptions. Digital certificates generally expire every one to two years, so set up automated reminders 90, 60, and 30 days before expiration to ensure timely renewals.

Maintain an inventory that tracks certificates, their expiration dates, and assigned users. This is especially important when employees leave or change roles, as their certificates may need to be revoked or reassigned.

Test certificates regularly across all devices and email platforms. For example, ensure that S/MIME certificates work consistently on desktop Outlook, mobile apps, and web-based email clients. Regular testing helps you catch and resolve issues before they affect users.

Managing Risks with External Recipients

While internal encryption processes are essential, managing risks with external recipients is equally important. Disable automatic forwarding for encrypted emails to prevent sensitive data from being sent to unintended recipients. Set up mail flow rules to block or limit forwarding for messages containing confidential or regulated information.

Check access logs to monitor how external partners interact with encrypted content. If certain partners frequently encounter access issues, consider providing them with detailed instructions or alternative secure communication options. Some organizations even use dedicated secure portals for regular external collaborators.

When sharing encryption credentials or portal access with external recipients, follow secure protocols. Avoid sending access details through the same channel as the encrypted message. Instead, use a separate method like a phone call or a different email account to share this information securely.

Scaling with Third-Party Solutions

For organizations handling large-scale email operations, third-party solutions can help manage encryption more efficiently. Primeforge offers integrated Microsoft 365 solutions that include automated DNS setup, US-based IPs, and scalable workspace management to handle high email volumes.

With Primeforge's workspace management features, different departments or subsidiaries can maintain their own encryption settings while benefiting from centralized administration. The platform also automates DNS configurations, ensuring that SPF, DKIM, and DMARC records are correctly set up across all domains.

When evaluating third-party providers, focus on factors like Microsoft 365 compatibility, encryption policy automation, and the ability to maintain sender reputation. Primeforge's compliance-focused infrastructure makes it a strong choice for industries such as healthcare, financial services, and legal sectors where encryption is a top priority.

Choosing the Right Encryption Method for Your Needs

Picking the right encryption method boils down to your organization's specific needs, the types of external recipients you work with, and your technical capabilities. Each method has its own strengths, and understanding these differences can help you make the best choice. Here's a quick comparison of key features across three popular encryption methods:

Encryption Methods Comparison

Feature Microsoft Purview Message Encryption S/MIME Encryption TLS Encryption
Recipient Experience Web portal access, no software needed Native email client integration Transparent, no extra steps
Security Strength High (AES-256) Very High (certificate-based) Medium (transport-level only)
Compliance Coverage Excellent for regulations Strong audit trails Basic protection
Deployment Ease Simple setup through admin center Complex certificate management Automatic with most providers
Key Management Microsoft-managed Organization-managed certificates Provider-managed
Mobile/Web Support Universal browser access Limited mobile support Full compatibility

Microsoft Purview Message Encryption stands out for its broad compatibility, allowing users to access encrypted messages through a web portal without needing extra software. This makes it a great choice for organizations working with a wide range of external partners.

On the other hand, S/MIME encryption provides top-notch security with its certificate-based system, but it requires more technical setup. It’s especially useful for industries like law, finance, and healthcare where end-to-end encryption and strong authentication are essential.

TLS encryption provides basic protection during email transmission but doesn’t secure messages at rest. It’s a good option for less sensitive communications where keeping things simple for the recipient is a priority.

Selecting the Best Option for External Recipients

Your choice of encryption should align with the capabilities and needs of the people you communicate with most frequently. Different recipient groups have varying technical skills and security requirements.

For government agencies and large corporations, S/MIME is often the go-to option. These organizations typically have IT teams equipped to handle certificate management, making it easier to implement this method.

For small businesses and individual clients, Microsoft Purview Message Encryption is usually a better fit. Since these recipients may lack dedicated IT support, the web portal approach removes technical hurdles while still providing strong security.

When working with international partners, consider local email standards and connectivity. Microsoft Purview Message Encryption’s web-based system tends to work well globally, while S/MIME might face compatibility issues with some international email providers.

In mixed recipient environments, a hybrid approach often works best. For example, you can use S/MIME for regular business partners who can manage certificates and rely on Microsoft Purview Message Encryption for occasional external communications. Conditional access policies can help automate these decisions based on recipient domains or the sensitivity of the content.

If your organization uses Primeforge’s Microsoft 365 infrastructure, automated DNS management simplifies configuration. Primeforge handles SPF, DKIM, and DMARC settings automatically, which is crucial for maintaining S/MIME authentication and ensuring reliable TLS encryption.

Compliance is another critical factor. For example, healthcare organizations under HIPAA often find that Microsoft Purview Message Encryption strikes the right balance between security and usability for patients and external providers. Meanwhile, some financial services companies may prefer S/MIME for its detailed audit trails.

The volume and frequency of your communications also matter. High-volume senders can benefit from automated encryption policies that route messages to the appropriate method based on their type. Primeforge’s workspace management tools make it easy to set different encryption defaults for various departments or communication scenarios, streamlining the process without sacrificing security.

Finally, before rolling out your chosen method across the board, test it with a small group of external recipients. This can help you spot any potential issues with access, user experience, or technical compatibility, ensuring a smoother deployment.

Conclusion: Key Points for Encrypting External Emails

To wrap things up, let’s highlight the essential strategies for encrypting external emails effectively. Microsoft Purview Message Encryption offers a user-friendly solution with universal access via a web portal. On the other hand, S/MIME provides robust, certificate-based encryption for industries like healthcare, finance, and legal, where strict compliance is a must. Meanwhile, TLS ensures basic protection during email transmission but doesn’t safeguard stored data, making it more suitable for routine exchanges.

S/MIME stands out for its high-security authentication but requires technical expertise and ongoing certificate management. In contrast, Microsoft Purview Message Encryption is easier to implement, making it a practical choice for small businesses and individual clients. The main takeaway? Choose your encryption method based on your organization’s security needs and your recipients’ capabilities. Large corporations and government agencies often excel with S/MIME, while simpler solutions work better for smaller setups.

Automated policies can significantly reduce administrative burdens. By setting conditional access rules - based on factors like recipient domains, content sensitivity, or departmental needs - you ensure consistent protection without requiring manual intervention for every email.

Still, even the best encryption tools can be undermined if users aren’t properly trained. Regular user education is essential to prevent mishandling and guard against threats like social engineering.

Final Recommendations

Start with a phased rollout. Testing encryption with a small external group first allows you to address compatibility issues and refine your approach based on real-world feedback.

Schedule quarterly policy reviews to keep your encryption settings aligned with changing regulations and business goals. Compliance frameworks like HIPAA, SOX, and GDPR are constantly evolving, so your encryption strategies should adapt as well.

Invest in ongoing training for your team. Beyond initial onboarding, regular refresher courses and updated guidelines are necessary to maintain awareness as new threats and technologies emerge.

Consider using third-party tools to simplify encryption management. For example, Primeforge integrates seamlessly with Microsoft 365, offering features like automated DNS configuration and centralized workspace management. These tools can streamline operations and ensure encryption policies remain consistent across departments.

Keep an eye on encryption performance metrics. Metrics like delivery success rates, recipient access rates, and user feedback can help you identify areas for improvement and ensure your encryption strategy supports efficient communication.

Finally, maintain comprehensive documentation of your encryption processes. Include troubleshooting guides and escalation procedures to handle recipient issues quickly and efficiently. This ensures smooth communication with external partners and minimizes delays caused by technical challenges.

FAQs

What are the main differences between Microsoft Purview Message Encryption, S/MIME, and TLS for securing emails?

Microsoft Purview Message Encryption offers a straightforward way to secure emails, seamlessly integrating with Microsoft 365. It’s particularly useful for encrypting messages sent to external recipients, as it doesn’t require a complicated setup. S/MIME, by contrast, uses certificate-based encryption, providing a high level of security for internal communications. However, it does come with the added complexity of managing digital certificates, which can make it less intuitive for some users. Then there’s TLS, which encrypts data during transmission, safeguarding emails as they’re sent. But keep in mind, TLS doesn’t provide end-to-end encryption, meaning the content isn’t protected once it’s delivered.

Each of these options has its strengths: Purview stands out for its ease of use, S/MIME is ideal for secure internal communication, and TLS works well for protecting emails in transit, though it has its limitations.

What’s the best way for small businesses to choose an email encryption method in Microsoft 365?

Small businesses should begin by evaluating their security needs, compliance obligations, and budget constraints. Microsoft 365 provides a range of options tailored to different requirements. For instance, tools like Microsoft Purview Message Encryption and S/MIME are excellent for businesses that demand higher security levels and need to share information externally. On the other hand, for simpler needs, Outlook's built-in encryption tools - such as the 'Encrypt' feature - offer a straightforward and budget-friendly alternative.

When deciding, think about factors like user-friendliness, compatibility with your current systems, and whether your business must adhere to specific regulations. If compliance is a top concern, advanced solutions like Purview or S/MIME are more appropriate. For those managing outreach or multiple email accounts within Microsoft 365, platforms like Primeforge can simplify the process. They offer features like automated DNS setup and customizable infrastructure to ensure secure and efficient email delivery.

How can employees and external recipients be trained to use encrypted emails effectively in Microsoft 365?

To help employees and external recipients make the most of encrypted emails in Microsoft 365, it's crucial to provide straightforward training on tools like Microsoft Purview Message Encryption and S/MIME. Walk users through the steps to send encrypted emails, identify encrypted message indicators, and manage encrypted messages correctly. This hands-on approach can boost confidence and reduce the likelihood of mistakes.

It's equally important to highlight secure communication habits. Encourage practices like creating strong passwords, enabling multi-factor authentication, and protecting sensitive information. Regular security awareness sessions can reinforce these habits, helping both internal and external users stay aligned with compliance and data protection standards.

Related Blog Posts