Abnormal Security Migration: Mail Flow Architecture

Mail Flow Architecture

This page exists to map the real control points in the enterprise mail path before any migration decisions are made. Do not treat Abnormal as a drop-in replacement for ESA without first documenting where ESA currently enforces policy, where mail routing occurs, and where telemetry is generated.

Current-State Questions

Answer these first:

  • Is Cisco ESA currently inline for inbound mail, outbound mail, or both?

  • Does ESA terminate SMTP directly from the internet, or sit behind another gateway or provider?

  • Where are MX records currently pointed?

  • What downstream path exists after ESA: M365, Exchange hybrid, relay hosts, journaling, or archive systems?

  • Which teams own DNS, M365 tenant config, transport rules, and user-facing phishing workflows?

Current-State Control Points

Control Point What to Capture

MX and ingress routing

Internet-facing entry point, MX dependencies, failover path, third-party relays

ESA policy enforcement

Spam, malware, URL filtering, content filters, DLP, encryption, quarantine, message tracking

Mail delivery target

Exchange Online, hybrid Exchange, shared mail relays, SaaS routing, internal appliances

User remediation workflow

Quarantine review, help desk escalation, release workflow, phishing reporting path

Logging and SIEM feed

Syslog, API, export jobs, dashboards, retention, ownership

Target-State Thinking

Abnormal changes the operating model:

  • ESA is an inline SMTP security gateway.

  • Abnormal is primarily an API-centric SaaS detection and response platform integrated with Microsoft 365.

That means the migration is not just a product swap. It is a control-plane redesign.

You need to document which protections move to:

  • M365 native controls

  • Abnormal behavioral detections

  • Sentinel analytics and response

  • operational process changes for analysts and end users

Architecture Deliverables

Minimum deliverables for this page family:

  • current mail flow diagram

  • future mail flow diagram

  • list of enforcement points lost, retained, or replaced

  • logging path before and after migration

  • rollback path if Abnormal enablement causes detection or workflow gaps