Event banner
Microsoft Detection and Response Team (DART) AMA
Event Ended
Tuesday, Mar 15, 2022, 09:00 AM PDTEvent details
We are very excited to announce our Microsoft Detection and Response Team (DART) AMA!
About DART: Our job is to respond to compromises and help our customers become cyber-resilient. This is al...
Trevor_Rusher
Updated Feb 16, 2022
LGP124
Microsoft
Mar 15, 2022Hi Nathan, could you please clarify your question here "What can be done to improve the speed at which Microsoft reacts to a breached O365 Customer?" Are you rereferring specifically to DART or Microsoft in general?
ExMSW4319
Mar 15, 2022Iron Contributor
I am assuming that DART considers malware posted via O365 to be as high a priority as that posted via any other source, but it comes with the additional complication that Microsoft itself is the disseminating organisation. I would therefore expect it to instead be something of a commercial priority. How, therefore, do I alert Microsoft that one of its own customers is projecting a file or URL that none of the other security authorities we work with has yet recognised as malign? It seems that all I have is Outlook Report Message or the WDSI portal.
- eolsonMar 15, 2022
Microsoft
Using Outlook Report Message will still be your best bet next to the WDSI portal. If you submit via the WDSI portal, you have the option of submitting as a home customer, enterprise customer or software developer. If you are a Microsoft customer, I would recommend opening a case because that will get you the quickest response or identifying yourself as an enterprise customer during the WDSI submission process.