Skip to content
English
  • There are no suggestions because the search field is empty.

Enabling Reported Threats Delete for Microsoft

In this article you will learn to enable Reported Threats Delete for Microsoft.

Click below for a full screen walkthrough video.
▶️ Enabling Reported Threats Delete for Microsoft

 

Part 1: Adding API Permissions in Azure Active Directory

This part should have been completed in your initial technical integration but may need to be reviewed.

  1. Visit https://entra.microsoft.com/.
  2. Click App Registrations.



  3. Click View All Applications in the directory. 



  4. Search for and click CyberNut Admin



  5. Verify that you have the following permissions granted. (inc Mail.ReadWrite)

  6. If the permissions are set you can move on to Part 2 below.  If they are not set complete the procedures here.

Part 2: Creating and Managing a Self-Signed Certificate

Creating a Certificate Using PowerShell

Open PowerShell with administrative privileges on your district machine and execute the following script. Please replace "YourStrongPasswordHere" with any password of your choice. You will only need this password once when uploading your certificate to the CyberNut Admin Portal.

# Define certificate parameters
$certDnsName = "CyberNutCert"
$certPassword = ConvertTo-SecureString -String "YourStrongPasswordHere" -Force -AsPlainText
$certDirectory = "C:\Certificates"
$certPfxPath = "$certDirectory\CyberNutCert.pfx"
$certCerPath = "$certDirectory\CyberNutCert.cer"
$certValidityPeriod = 365 # Valid for 1 year

# Create the directory if it doesn't exist
if (-Not (Test-Path -Path $certDirectory)) {
New-Item -ItemType Directory -Path $certDirectory
}

# Create a new self-signed certificate
$cert = New-SelfSignedCertificate -DnsName $certDnsName -CertStoreLocation "cert:\LocalMachine\My" -KeyExportPolicy Exportable -KeySpec Signature -NotAfter (Get-Date).AddDays($certValidityPeriod)

# Export the certificate to a .pfx file with a password
Export-PfxCertificate -Cert $cert -FilePath $certPfxPath -Password $certPassword
Write-Host "Certificate created and exported to $certPfxPath"

# Import the certificate into the Current User's certificate store
$certImported = Import-PfxCertificate -FilePath $certPfxPath -CertStoreLocation "Cert:\CurrentUser\My" -Password $certPassword
Write-Host "Certificate imported successfully into the CurrentUser\My store."

# Optionally export the public certificate to a .cer file
$thumbprint = $certImported.Thumbprint.ToUpper().Trim()
$certToExport = Get-ChildItem -Path "Cert:\CurrentUser\My" | Where-Object { $_.Thumbprint.ToUpper().Trim() -eq $thumbprint }

if ($certToExport) {
Export-Certificate -Cert $certToExport -FilePath $certCerPath
Write-Host "Public certificate exported to $certCerPath"
} else {
Write-Host "Certificate not found in the store. Public certificate export skipped."
}

Write-Host "Script completed successfully."

Locate the certificate.

The output of this Powershell script will indicate where both CyberNut certificate files are saved. You should have two certificates with the extensions .pfx and .cer.

Uploading the Certificate to Azure

Go to Microsoft Entra admin center at https://entra.microsoft.com/ and click App Registrations and then View all applications in the directory.

Click the CyberNut Admin app.

Click Certificates & secrets section, click on Upload Certificate and upload the .cer file you previously generated using the Powershell script.

You should now see your uploaded certificate in this section.

Image

Assigning Exchange Administrator Role

Lastly, please click on Roles and Administrators in your CyberNut Admin app registration and click the blue hyperlink that says here.

Search for the Exchange Administrator role in the input field and select the words (not the checkbox).

Image

On the next screen, click on Add Assignments and search for CyberNut Admin. Click the checkbox and click add to assign the role.

Image

Now, under Exchange Administrator | Assignments, you should see CyberNut Admin is assigned as indicated below.

Image

Upload CyberNut .pfx file to CyberNut Admin Portal

Visit the CyberNut Admin Portal at http://admin.cybernut.com and login via SSO. Click on Settings >Threat Manager.

Then click the Upload button under Microsoft Certificate.

Upload the the .pfx generated by the Powershell script for your certificate.

Enter the same password you created in the Powershell script and enable the Reported Threats Delete toggle at the top. Click Save when you are finished.

Note: Ensure you are entering the same password from the Powershell script. If there is a typo, your threats will not delete!