All we need is an easy explanation of the problem, so here it is.
People using outlook.com as their mailbox may know this: If you receive an e-mail with a web link in it and copy the link with “right-click + copy link location” you will receive an outlook protection link. For example “https://test.com“, will become this protection link (in my case):
This is some sort of protection, but I cannot see what attack it is preventing. Does anyone know for what this “link wrapping” is? I also wonder, what the data and sdata parameters are. (Seem to be hashes? [of the website?])
How to solve :
I know you bored from this bug, So we are here to help you! Take a deep breath and look at the explanation of your problem. We have many solutions to this problem, But we recommend you to use the first method because it is tested & true method that will 100% work for you.
Safe Links is a feature that originated in Office 365 Exchange Online Advanced Threat Protection. https://products.office.com/en-us/exchange/online-email-threat-protection
By wrapping the link, you give Microsoft a chance to check the URL before letting you through. So if it is say a link to download a virus or malware, it can show you a block page or warning page instead. The service also do some advanced stuff like visit the page on your behalf and scan for threats just in time, or show you the destination in a sandboxed page to prevent malware.
This is better than scanning the email at delivery time because some links may be to phishing sites or zero day malware that has not yet been discovered. But by the time you click the message in your inbox, it may have been caught (and thus will be blocked).
In a corporate environment, this is also helpful because it allows you to get metrics on who clicked on what. If an employee clicked through to a phishing site, you can look at the logs to determine who also clicked on that link as take action.
Note: Use and implement method 1 because this method fully tested our system.
Thank you 🙂