Recent Discussions
Preset policies have suddenly started notifying users of quarantined messages
Hi all. We have been using preset policies (standard and strict) for some time and were happy with the fact that they don't notify users of messages which have been quarantined (and nor is it possible to change the notification policy). However, quarantine notifications suddenly started turning up in users' mailboxes at the weekend. Have Microsoft changed something or released an unplanned change? Hoping you can help clarify the situation.Solved10KViews0likes24CommentsEnable Quarantine Notifications for Strict protection (Strict Preset Security Policy)
How can I enable quarantine notifications for the preset strict protection policies. There is no way to assign a quarantine policy to strict protection policies.Solved11KViews0likes19CommentsPhishing attack simulator incorrectly emails people the message, "Because you were recently phished"
Hi folks, * I am evaluating Microsoft Phishing Attack Simulator with a 4 user pilot * None of the 4 users were phished in any of the 3 simulations that I actioned * At the end of each simulation, users are correctly being emailed a message with a link to phishing traning * However, the email with the link to the phishing training contains this wording: "Because you were recently phished, we require you to take training(s) to recognize phishing attacks in future." * The wording I quote is troublesome since it: a) Is inaccurate; none of the users were phished b) Presents me (and potentially my colleagues in IT Support), negatively, since it makes us look like we aren't in control of the simulation technology (ie it looks like we don't understand the reality of how each user responded in the simulations) c) Risks alienating us from our users My questions thus are: 1) Is anyone else impacted with this issue? 2) Is there a way for the wording I refer to, to be constructively edited? Any help is always appreciated. Regards, Steve7.9KViews0likes19Commentsadd to whitelist or safe senders from quarantine
Hello all I see its possible to block a sender from within the quarantine. Is it also possible to whitelist or add a sender to "safe senders" list from within the quarantine ?Solved73KViews1like18CommentsDefender bulk unsanction
I want to unsanctioned all Generative AI apps in cloud catalogue with a risk score 7 or below. But this is 970 apps and I don't feel like doing this one page of 20 at a time I'll be there all day. Can someone suggest a powershell script to set anything in that category risk score 0-7 as unsanctioned?494Views0likes12CommentsAll the mail from one mail adress arrive in quarantine with an SCL = 5
All the emails sent to us by our customer (email address removed for privacy reasons) arrive in our quarantine with an SCL score of 5. However, the email address passes the DMARC tests perfectly (test carried out with https://www.dmarctester.com/). The domain is not blacklisted, and emails from his colleagues email address removed for privacy reasons and email address removed for privacy reasons arrive with no problem. The content of the email shouldn't be the problem either, as an empty email is also quarantined. What additional diagnostic work can I do to understand why the SCL for each of his emails scores 5?2.3KViews0likes12CommentsDefender for Office Policy Assignment by Domain
Hello - Sorry, this is a little bit long... We've been testing MDO and have run into an issue that seems like a 'bug' but, I've been unable to find any other reports of it online. I have a ticket open with MS but, that's moving along very slowly as they're insistent on re-doing all the troubleshooting I've already done. But, I digress... The problem we've found is in the MDO policy assignment - confirmed in anti-phish and anti-malware. If I assign the policy to a user and/or group/DL, the policy works as expected. However, if I use the domain assignment (as we were hoping to do for the full deployment), the assigned policy is being ignored and the message(s) is being passed on to the Default policy. For example, I have a custom anti-malware policy that's my priority 0 policy. In it, I have assigned a specific group with some test accounts. I also assigned a domain (one of my owned/registered tenant domains). I also added a specific file extension to the disallowed list so that I could test. Then, I send a test email, with an attachment with that extension, to an account that's a member of the assigned group as well as another account that's a member of the assigned domain. The expectation is that both of those messages should be blocked. However, that's not the case. The message to the account that's part of the assigned group is blocked (as expected) but, the message to the accounts that's part of the assigned domain is successfully delivered (attachment and all). It doesn't seem to matter which accounts, groups or domains I use, I can readily repeat the issue everytime. As an additional test, I added a random extension to the block list of the Default malware policy - one that's not included in my custom policy - and sent test emails again with an attachment of that file type. The expectation being that all accounts should receive the message. But, nope, that's not what happened. The account(s) assigned to the custom policy by group/account received the message (as expected) and the one assigned by domain was blocked. To me, that's pretty clear evidence that there's some kind of issue with domain assignment in the policies. That particular message basically bypassed the policy to which it was assigned and was handled by the Default policy. As mentioned, I haven't found any other similar reports online, and to this point, Microsoft hasn't alluded to any issues. Surely others are using domains to assign their MDO policies. Has anyone run into this and, if so, have you found some sort of resolution for it? Thanks, RobinSolved2.6KViews0likes10CommentsMy emails are being quarantined by Office 365 and I need help
I am having really bad issue. We use Google Business for email and Sendgrid SMTP service via our ERP Odoo to send transactional emails. But since last week all of the customers and suppliers that use office 365 are not seeing our emails. Their are being quarantined for suspicion of phishing. WE have been sending the same emails since 2021 so I don't understand how all of a sudden our emails are being blocked. If i send an email with any attachment including my logo in my signature, the email gets blocked but If i send the email with nothing in it it goes through... Let me know if anyone has an idea because I am loosing my mind, i do not know what to do.Solved23KViews0likes10CommentsReport Message Add-in going away?
Logging on to the Threat Policy page today and was presented with the below message. "The User reported message settings page will start moving for some tenants in late-March 2022 from the Policies & rules section to the Settings section of the Microsoft 365 Defender portal. Also to simplify reporting messages in your organization, we'll be integrating the report feature directly into Outlook's default Junk and Phishing buttons starting. You will no longer need the Report Message add-in. All tenants will see the new change by end of April 2022. " Does this mean the Report Message-Add In is going away? How will users report Phishing? Will the Report Message-Add In quit working? I can't find any additional information on this topic so I would appreciate any info. Thanks.5KViews0likes10CommentsSee which email triggers "User requested to release a quarantined message"
Hi, I'm trying to automate response to incidents regarding "User requested to release a quarantined message". The problem with this incidents is that it doesn't list which specific email the user requested a release for, nor do I find it in any logs. I know the email is listed under Email & collaboration --> Review --> Quarantine, but I want to retrive the information through KQL-queries. Anyone who knows if this is possible?Solved3.9KViews0likes9CommentsHow to classify E-Mails with *.html or *.htm attachments as spam?
A tenant is receiving currently an enormous amount of phishing emails with *.html or *.htm attachments. 99% of the e-mail which contain such an attachment are phishing e-mails. What's the best approach to filter out those e-mails? They are using the standard protection threat policies.6.3KViews1like9CommentsBest practice advice
Hello all I am fairly new to Defender for O365. I am the cloud admin for a small company roughly 1000 accounts. We are moving from mimecast to Defender for O365. I read the article regarding preset security polices, and thought this would be a good place to start, so i enabled the standard policy for all the domains we host. Considering you cannot edit a preset policy i had to edit the default policy to fill in the gaps to account for the things like safe senders, blocked senders, safe domains and blocked domains. Is this the correct strategy to use? From my understanding the preset security policy will take precedence. How does the precedence work? If i create safe senders in the default anti-spam policy will these settings take effect even though the safe senders are not mentioned in the Standard preset security policy ? https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/preset-security-policies?view=o365-worldwideSolved5.7KViews1like9CommentsLimit access to Quarantine (and only quarantine)
The enduser quarantine is reachable at https://security.microsoft.com/quarantine Based on our security policies, we have limited access using Conditional Access and the cloud app “Microsoft Admin Portals.” Consequently, no user can directly access the quarantine. We have made the necessary exceptions to ensure the quarantine functions properly. However, there is an issue: Users without proper permissions can still navigate extensively within the portal. For example: On the left-side navigation, they can click on “Start.” Within the “Next steps” section, there is a link to “Advanced Hunting.” Although they cannot perform any actions there, the link remains accessible. Additionally, under “Additional Resources,” users can click on any admin center, albeit with limited functionality. Is there anyone with an idea on how to restrict users to the quarantine area only, preventing access to other sections of the portal?1.9KViews3likes8CommentsZAP Failed to move the messages
Hi Community, we are getting for two weeks a lot of "Messages containing malicious entity not removed after delivery" Alerts, which i could not understand the reason. In Email Entity it says "ZAP failed to move the message". As one sample Email from Alert; Email was classified as Spam and into the Junk Folder sent. But after 12 Minutes it was as Phish / Normal classified but it could not be moved to quarantine (it should be so because we set the anti-spam Policy with this action). Is there anything related to our Policies? or is it a a problem at microsoft backend? How can i find the reason and solution for that ? Thanks6KViews0likes7CommentsBlocking International Countries
We have a conditional access policy that logs off accounts after 5 failed attempts. We also have an international policy blocking all international countries and IPs. unfortunately, these attempts on our accounts happen before our international blocks. I have spent way too much time with Msoft support to get nowhere. Does anyone know how to just block even the attempt of logging on from international countries?9.9KViews0likes7CommentsOutlook report add-in
Hello In an effort to move away from users using "safe senders" in outlook we are considering using the report add-in. However when i review the permissions the add-in has its a bit concerning. Im reluctant to push out this add-in because the add-in has permissions to read and change email in a users mailbox. Seems excessiveSolved2.8KViews0likes7CommentsTrojan:HTML/Phish.JS9
Had 67 detections of Trojan:HTML/Phish.JS9 over 2 days from C:\Users\***\AppData\Local\Microsoft\Windows\INetCache\IE\6JGSCFQJ\authorize[1].htm. Have tried to "collect file" but am being constantly advised that it can take up to 3 days. I have used Hunting to try to find where the file originated but there is nothing in email or web traffic that links it. My instinct is that this is a false positive. How do I speed the process of collection or actually track where the file originated?4KViews1like6CommentsSecure Score and preset security policies
Dear community members, I have a 365 tenant with Business Standard and Defender for Office P1 licenses. At the moment, Secure Score for this tenant is ~50%, even though Standard Protection preset policy is applied to all recipients. If I also manually create all the different policies, Secure Score jumps to ~80%, however to my understanding this is purely cosmetic as these policies never get applied - the preset policy always take precedence. Am I missing anything here, or Secure Score ignores preset policies? EDIT: One more example for this issue is that in Recommended Actions there are recommendations to enable Safe Links and Safe Attachments, which are already enabled by Standard Protection.4.5KViews0likes6Comments
Events
Recent Blogs
- We are pleased to announce that Microsoft Defender for Office 365 now features large language model (LLM)-powered responses within the submission workflow. This update provides security and Exchange ...Jul 01, 2025991Views0likes0Comments