HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

21st June 2025 | HowTo HowTo: Powershell script for avoiding SPAM, Clutter, Junk in 365

Microsoft M365 PowerShell Scripts: 

  • Bypass SPAM, Clutter and Junk in M365.

Microsoft PowerShell scripts automate a more realistic and successful phish testing environment when set up correctly.  This is one of two scripts that help deliver phishing tests into end-users inboxes and automates downloading images without warning or end-user interaction by adding CyberHoot sending domains to each user’s safe senders list.

You can find more information on how to implement PowerShell scripts through Exchange here and through Azure Active directory here.

How to By-Pass Junk, Spam, and Clutter:

Implement these four mail flow rules to bypass Junk, Spam and Clutter by IP and email Header. This script also sets up the X-Header for mail filters in series.

PowerShell Script to Bypass Clutter Spam and Junk Folders in M365

Save this text file as a .ps1 file and then run as a PowerShell script with appropriate permissions.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more