Event banner
Microsoft Defender for Office 365 Ask Microsoft Anything
Event details
1. Tamper Protection prevents ANY other product or RMM to manage your AV except Microsoft. This is clearly "by product design". Is this changing?
2. Tamper Protection also prevents any third-party updates from Microsoft sources and instead, triggers events and warnings in many RMM's that aren't Microsoft's. Will this change?
3. Intune/Defender for Cloud/Whatever You Call It Today is in 3 different locations for management and in each of those, there are dozens of useless categorizations that hide what someone is attempting to work with. A clear case in point is any type of Anti-Spam filtering. The flyouts and the multiple clicks to do simple things are slow, and the platform itself is often unresponsive because of it. Can you get a better design UI?
4. Email "protection" is miserably inaccurate. The defaults were to quarantine messages and not alert anybody. I had dozens of customers furious they lost business because of this. Now, you've added that functionality it but turned it off by default. Customers need to know they have a blocked email, not admins. We're not gatekeepers for organizations email flow. The default needs to be Users notified and if the company is large enough to have someone to be a gatekeeper, they can turn that OFF.
5. "Secure by Default" by definition means it's a Default setting that can be changed. You're using the word wrong if you can't open the overaggressive controls back up for SMB's that simply need to do their work, not fight MOTW or missing emails in quarantine.
6. You're writing this suite now for Large Corporations and eschewing the SMB and mid-size space by doing so. 80% of companies are SMB, they are where you grew this part of the business, but they don't have the staff to manage these defaults.
7. Why are there 'Devices" and 'Assets' in Intune as major categories when they're the same thing?
8. What's being done about Servers?
- Melanie_CohenMay 31, 2023
Microsoft
6. You're writing this suite now for Large Corporations and eschewing the SMB and mid-size space by doing so. 80% of companies are SMB, they are where you grew this part of the business, but they don't have the staff to manage these defaults.
Answer: We're heavily investing in SMB and would love to keep in touch on challenges the customers would like us to solve in the collaboration protection space. Please sign up at aka.ms/JoinCCP where we can engage more in detail.
- FaithEbenezerOquongMay 31, 2023
Microsoft
4. Email "protection" is miserably inaccurate. The defaults were to quarantine messages and not alert anybody. I had dozens of customers furious they lost business because of this. Now, you've added that functionality it but turned it off by default. Customers need to know they have a blocked email, not admins. We're not gatekeepers for organizations email flow. The default needs to be Users notified and if the company is large enough to have someone to be a gatekeeper, they can turn that OFF. Answer: In message center post MC505088(with title "Microsoft Defender for Office 365: Quarantine Notifications enabled for Preset Security Policies"), we made changes to the preset policies to enable Quarantine Notification for these policies as of Early Feb 2023. Preset policies that Quarantine email message should have corresponding "DefaultFullAccessWithNotificationPolicy" Quarantine policy assigned to it. With this change, End users should be notified when email messages land in their Quarantine folder. 5. "Secure by Default" by definition means it's a Default setting that can be changed. You're using the word wrong if you can't open the overaggressive controls back up for SMB's that simply need to do their work, not fight MOTW or missing emails in quarantine. Answer: There is future plans to allow for customization of a Quarantine policy that is linked to the preset security policies. please stay tuned for this. - FaithEbenezerOquongMay 31, 2023
Microsoft
4. Email "protection" is miserably inaccurate. The defaults were to quarantine messages and not alert anybody. I had dozens of customers furious they lost business because of this. Now, you've added that functionality it but turned it off by default. Customers need to know they have a blocked email, not admins. We're not gatekeepers for organizations email flow. The default needs to be Users notified and if the company is large enough to have someone to be a gatekeeper, they can turn that OFF.
Answer: In message center post MC505088(with title "Microsoft Defender for Office 365: Quarantine Notifications enabled for Preset Security Policies"), we made changes to the preset policies to enable Quarantine Notification for these policies as of Early Feb 2023. Preset policies that Quarantine email message should have corresponding "DefaultFullAccessWithNotificationPolicy" Quarantine policy assigned to it. With this change, End users should be notified when email messages land in their Quarantine folder.
5. "Secure by Default" by definition means it's a Default setting that can be changed. You're using the word wrong if you can't open the overaggressive controls back up for SMB's that simply need to do their work, not fight MOTW or missing emails in quarantine.
Answer: There is future plans to allow for customization of a Quarantine policy that is linked to the preset security policies. please stay tuned for this.
- BrookeLynnWeenigMay 31, 2023
Microsoft
Hi Joe, thank you so much for your questions we are working with our product team to get you all the answers you need related to Microsoft Defender for Office 365. One clarification, on question 8 can you be more specific on what you are asking about servers? - MalvikaBalarajMay 31, 2023
Microsoft
Hi Joe, thank you for your questions. Regarding questions 1, 2, 3, 7 and 8 we are focusing on answering questions related to Microsoft Defender for Office 365 in this AMA. For questions related to other products, you can join our CCP Teams channel: aka.ms/JoinCCP