Home
%3CLINGO-SUB%20id%3D%22lingo-sub-754274%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-754274%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20great%20to%20finally%20be%20able%20to%20report%20messages%20via%20an%20UI%20tool!%20Any%20chance%20to%20make%20it%20accept%20anything%20other%20than%20.eml%20files%20for%20direct%20upload%20though%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-756365%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-756365%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F58%22%20target%3D%22_blank%22%3E%40Vasil%20Michev%3C%2FA%3E%2C%20I%20believe%20you%20can%20also%20submit%20attachments%20and%20URLs%20for%20direct%20uploads%2C%20what%20other%20options%20were%20you%20thinking%20of%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-756368%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-756368%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F26091%22%20target%3D%22_blank%22%3E%40Pragya%20Pandey%3C%2FA%3ECould%20we%20share%20some%20information%2Fguidance%20on%20the%20%22rescan%20result%22%20tab%2C%20and%20expectations%2Fresult%3F%3C%2FP%3E%0A%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3C%2FBLOCKQUOTE%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-759554%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-759554%22%20slang%3D%22en-US%22%3E%3CP%3EThanks%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F26091%22%20target%3D%22_blank%22%3E%40Pragya%20Pandey%3C%2FA%3E.%20There's%20no%20mention%20above%20of%20how%20a%20security%20team%20opts%20out%20of%20automatic%20submission%20of%20end%20user%20reporting%20to%20Microsoft%2C%20and%20thus%20only%20has%20the%20ability%20to%20do%20admin%20submissions.%20Is%20the%20change%20above%20to%20be%20implemented%20for%20everyone%20by%20default%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-763654%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-763654%22%20slang%3D%22en-US%22%3EHello.%20Is%20it%20possible%20to%20query%20for%20submissions%20through%20an%20API%3F%20Something%20like%20MessageID%2C%20From%2C%20To%2C%20Subject%2C%20Date.%20That%20would%20enable%20the%20security%20team%20to%20build%20integrations%20to%20monitor%20user%20submitted%20mails.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-752622%22%20slang%3D%22en-US%22%3EEmpower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feedback%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-752622%22%20slang%3D%22en-US%22%3E%3CP%3EOne%20of%20the%20frequent%20requests%20we%20hear%20from%20Office%20365%20customers%20is%20the%20ability%20for%20security%20teams%20to%20easily%20report%20suspicious%20email%20messages%20or%20content%20to%20Microsoft%20and%20get%20feedback.%20Today%20I%E2%80%99m%20super%20excited%20to%20announce%20that%20we%E2%80%99re%20rolling%20out%20this%20capability%20to%20customers%20world-wide.%20This%20builds%20on%20a%20powerful%20capability%20Office%20365%20already%20supports%20-%20the%20ability%20for%20end%20users%20to%20report%20suspicious%20emails%20to%20their%20security%20teams%20and%20Microsoft.%20With%20the%20feature%20set%20we%E2%80%99re%20announcing%20today%2C%20security%20teams%20that%20want%20to%20defer%20reporting%20issues%20to%20Microsoft%20until%20after%20they%20have%20reviewed%20the%20messages%20themselves%20can%20now%20do%20so.%20What%E2%80%99s%20more%20-%20security%20teams%20can%20get%20immediate%20feedback%20on%20these%20submissions%20within%20the%20Office%20365%20Security%20and%20Compliance%20Center%2C%20dramatically%20reducing%20the%20time%20to%20investigate%20and%20response%20to%20issues%20and%20take%20corrective%20actions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOne%20of%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2Fthe-evolution-of-microsoft-threat-protection%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Threat%20Protection%3C%2FA%3E%3CSPAN%3E'%3C%2FSPAN%3Es%20most%20important%20elements%20is%20the%20ability%20to%20secure%20emails%20and%20collaboration%20services%20with%20%3CA%20href%3D%22https%3A%2F%2Fproducts.office.com%2Fen-us%2Fexchange%2Fadvance-threat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20Advanced%20Threat%20Protection%3C%2FA%3E(ATP).%20Office%20365%20ATP's%20strength%20of%20signal%20offers%20comprehensive%20and%20best-in-class%20protection%20against%20sophisticated%2C%20targeted%20and%20zero-day%20phishing%20and%20malware%20attacks.%20To%20give%20you%20a%20sense%20of%20the%20scale%20that%20we%20deal%20with%2C%20in%20the%20course%20of%201%20year%20in%202018%2C%20Office%20365%20ATP%20blocked%205%20billion%20phish%20emails%20and%20analyzed%20300k%20phish%20campaigns%2C%20protecting%204%20million%20unique%20users%20from%20advanced%20threats.%20Analyzing%20such%20a%20huge%20amount%20of%20data%20helps%20continuously%20improve%20the%20machine%20learning%20algorithms%2C%20leading%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F10%2F17%2Fhow-office-365-learned-to-reel-in-phish%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehighest%20accuracy%20and%20effectiveness%20in%20the%20industry%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20923px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123160i3E205EAFC5E127F6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Impact.png%22%20title%3D%22Impact.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EPhish%20email%20statistics%20from%20Office%20365%20from%20January%202018%20to%20September%202018.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20935px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123161i02F5937EDAA0A16A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Phish.png%22%20title%3D%22Phish.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EThe%20impact%20to%20end%20users%20in%202018%20from%20the%20enhanced%20anti-phish%20capabilities%20in%20Office%20365%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20proud%20as%20we%20are%20about%20the%20effectiveness%20offered%20by%20Office%20365%20ATP%2C%20we%20also%20know%20that%20no%20solution%20is%20100%25%20effective.%20For%20this%20reason%2C%20we%20also%20offer%20powerful%20feedback%20loops%20through%20which%20suspicious%20emails%20can%20be%20reported%20by%20end%20users%20to%20Microsoft%20to%20feed%20into%20the%20overall%20intelligence%20and%20continually%20improve%20the%20service%20to%20better%20protect%20customers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEnd%20users%20can%20report%20suspicious%20messages%20they%20see%20in%20their%20inbox%20to%20Microsoft%20using%20the%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fsupport.office.com%2Fen-us%2Farticle%2FUse-the-Report-Message-add-in-b5caa9f1-cdf3-4443-af8c-ff724ea719d2%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EReport%20Message%20plug-in%3C%2FA%3Ein%20Outlook%20and%20Outlook%20Web%20Access.%20Organizations%E2%80%99%20security%20teams%20can%20also%20review%20these%20user-reported%20messages%20in%20the%20Office%20365%20Security%20and%20Compliance%20Center%20to%20better%20understand%20the%20attacks%20users%20are%20seeing%20and%20update%20their%20security%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123162i3DC9134151A6AF89%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Read-time.png%22%20title%3D%22Read-time.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EReal-time%20report%20showing%20all%20user-submitted%20emails%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EFrom%20the%20SecOps%20perspective%2C%20these%20submissions%20form%20an%20important%20source%20of%20intelligence%20and%20can%20trigger%20investigation%20and%20remediation%20workflows%20to%20significantly%20reduce%20the%20time%20to%20detect%20and%20respond%20to%20an%20attack%20and%20therefore%20limit%20the%20scope%20of%20impact%20of%20an%20attack%20within%20the%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Report%20Message%20plug-in%20is%20therefore%20an%20invaluable%20tool%20for%20users%20to%20flag%20suspicious%20content%20to%20not%20only%20their%20security%20teams%2C%20but%20directly%20to%20Microsoft%20as%20well.%20But%20some%20organizations%20don%E2%80%99t%20want%20their%20users%20to%20submit%20emails%20directly%20to%20Microsoft%2C%20as%20they%20may%20contain%20sensitive%20information.%20They%20want%20these%20submissions%20to%20first%20be%20reviewed%20by%20their%20security%20teams%20before%20being%20submitted%20to%20Microsoft.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EToday%20we%E2%80%99re%20excited%20to%20announce%20that%20the%20email%20submission%20experience%20will%20now%20be%20available%20to%20security%20teams%20and%20admins%20from%20the%20same%20place%20where%20they%20review%20user-reported%20messages%20within%20the%20Office%20365%20Security%20and%20Compliance%20Center.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20this%20new%20capability%2C%20admins%20can%20easily%20submit%20emails%20and%20content%2C%20provide%20more%20details%2C%20and%20receive%20immediate%20feedback.%20The%20feedback%20provided%20by%20Microsoft%20will%20also%20offers%20valuable%20insights%20into%20configurations%20that%20may%20have%20caused%20a%20false%20positive%20or%20a%20false%20negative%2C%20reducing%20the%20time%20to%20investigate%20issues%20and%20improving%20the%20overall%20effectiveness.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20this%20new%20submission%20process%2C%20admins%20can%3A%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ESubmit%20suspicious%20emails%2C%20files%2C%20and%20URLs%20to%20Microsoft%20for%20analysis%3C%2FLI%3E%0A%3CLI%3EReceive%20immediate%20feedback%20on%20their%20submissions%3C%2FLI%3E%0A%3CLI%3EFind%20and%20remove%20rules%20allowing%20malicious%20content%20into%20the%20tenant%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EFind%20and%20remove%20rules%20blocking%20good%20content%20into%20the%20tenant%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EHere%E2%80%99s%20a%20quick%20run%20through%20of%20the%20experience.%20You%20can%20also%20learn%20more%20about%20it%20in%20our%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252FOffice365%252FSecurityCompliance%252Fadmin-submission%26amp%3Bdata%3D02%257C01%257Cv-dysnod%2540microsoft.com%257C2b4c6b08132e4348669b08d7096c53fc%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636988233193888314%26amp%3Bsdata%3D1KC5wyNryACaQ0%252FsvV0MsmKZsP7GXLDgv6QF2dKpyx0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etechnical%20docs%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStep%201%20%E2%80%93%20Log%20in%20to%20the%20Security%20and%20Compliance%20Center%20or%20the%20M365%20Admin%20Center%20as%20Global%20Admin%2C%20Security%20Admin%2C%20or%20Security%20Reader.%20Click%20on%20the%20%E2%80%98Submissions%E2%80%99%20node%20under%20%E2%80%98Threat%20Management%E2%80%99.%20You%20will%20see%20all%20the%20end%20user%20reported%20messages%20here.%20Under%20the%20%E2%80%98User%20Reported%E2%80%99%20tab.%20To%20create%20a%20new%20admin%20submission%20from%20the%20portal%2C%20click%20the%20%E2%80%98New%20Admin%20Submission%E2%80%99%20on%20the%20top%20left.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123163i78BC0F177BA30D25%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22details.png%22%20title%3D%22details.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStep%202%20%E2%80%93%20Enter%20all%20the%20details%20related%20to%20the%20submission%20such%20as%20submission%20type%2C%20recipients%2C%20reason%20for%20submission%20and%20submit.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123164i19C32B7C28FDDABC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22review.png%22%20title%3D%22review.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStep%203%20%E2%80%93%20Review%20the%20status%20of%20your%20submission.%20You%20can%20see%20the%20progress%20of%20the%20submission%20after%20it%20is%20submitted.%20You%20can%20also%20drill%20down%20into%20specific%20submissions%20and%20see%20what%20was%20submitted%2C%20what%20it%20was%20submitted%20as%2C%20and%20reason%20for%20submission%2C%20as%20well%20as%20what%20verdict%20was%20issued.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20870px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123165iE962EF516DA54097%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22sender.PNG%22%20title%3D%22sender.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20577px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F123166i4D1844E4CEAA4BD9%2Fimage-dimensions%2F577x480%3Fv%3D1.0%22%20width%3D%22577%22%20height%3D%22480%22%20alt%3D%22take%20action.jpg%22%20title%3D%22take%20action.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EStep%204%20%E2%80%93%20Take%20actions%20to%20fix%20the%20suggested%20configuration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20can%20be%20a%20great%20tool%20to%20manage%20false%20positives%20and%20help%20fix%20configurations%20issues%20that%20may%20result%20in%20EOP%2FOffice%20365%20ATP%20not%20performing%20optimally.%20In%20the%20future%20we%E2%80%99ll%20not%20only%20present%20the%20config-related%20issues%20but%20also%20automatically%20fix%20them.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ETo%20whom%20is%20it%20available%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAll%20Office%20365%20customers%20will%20be%20able%20to%20use%20this%20feature.%20However%2C%20customers%20using%20Office%20365%20ATP%20will%20benefit%20most%20from%20it.%20Customers%20using%20third-party%20reporting%20tools%20can%20also%20use%20this%20capability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20you%20look%20to%20implement%20this%20solution%2C%20it%E2%80%99s%20important%20to%20know%20it%20provides%20valuable%20data%20for%20more%20than%20Office%20365%20ATP.%20Microsoft%20Threat%20Protection%20services%20in%20general%20can%20leverage%20it%20to%20fine%20tune%20the%20machine%20learning%20algorithms%20and%20better%20protect%2C%20detect%2C%20and%20respond%20to%20threats%20across%20different%20threat%20vectors.%20Get%20started%20with%20an%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FMTPTrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMTP%20trial%3C%2FA%3Eif%20you%20want%20to%20experience%20the%20comprehensive%20and%20integrated%20protection%20Microsoft%20Threat%20Protection%20provides.%20Learn%20more%20about%20Microsoft%20Threat%20Protection%20by%20following%20our%20monthly%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252Fthe-evolution-of-microsoft-threat-protection%252F%26amp%3Bdata%3D04%257C01%257Cpragyap%2540microsoft.com%257C09322838c7ad467b319008d6f5a6a8d6%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636966493883642152%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DjQMlzd2qPUp4XShdFfaDr5djP6evSbra2Umi3Yh5WC0%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eblog%20series%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-752622%22%20slang%3D%22en-US%22%3E%3CP%3EOne%20of%20the%20frequent%20requests%20we%20hear%20from%20Office%20365%20customers%20is%20the%20ability%20for%20security%20teams%20to%20easily%20report%20suspicious%20email%20messages%20or%20content%20to%20Microsoft%20and%20get%20feedback.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-752622%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-764732%22%20slang%3D%22en-US%22%3ERe%3A%20Empower%20security%20teams%20to%20easily%20report%20suspicious%20emails%20%26amp%3B%20content%20and%20receive%20instant%20feed%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-764732%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20can%20we%20disable%20the%20automatic%20reporting%20to%20Microsoft%20when%20end-user%20report%20message%3F%20We%20should%20be%20able%20to%20review%20it%20before%20the%20end-user%20reported%20messages%20reaches%20Microsoft.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

One of the frequent requests we hear from Office 365 customers is the ability for security teams to easily report suspicious email messages or content to Microsoft and get feedback. Today I’m super excited to announce that we’re rolling out this capability to customers world-wide. This builds on a powerful capability Office 365 already supports - the ability for end users to report suspicious emails to their security teams and Microsoft. With the feature set we’re announcing today, security teams that want to defer reporting issues to Microsoft until after they have reviewed the messages themselves can now do so. What’s more - security teams can get immediate feedback on these submissions within the Office 365 Security and Compliance Center, dramatically reducing the time to investigate and response to issues and take corrective actions.

 

One of Microsoft Threat Protection's most important elements is the ability to secure emails and collaboration services with Office 365 Advanced Threat Protection (ATP). Office 365 ATP's strength of signal offers comprehensive and best-in-class protection against sophisticated, targeted and zero-day phishing and malware attacks. To give you a sense of the scale that we deal with, in the course of 1 year in 2018, Office 365 ATP blocked 5 billion phish emails and analyzed 300k phish campaigns, protecting 4 million unique users from advanced threats. Analyzing such a huge amount of data helps continuously improve the machine learning algorithms, leading to the highest accuracy and effectiveness in the industry.

 

Impact.pngPhish email statistics from Office 365 from January 2018 to September 2018.

Phish.pngThe impact to end users in 2018 from the enhanced anti-phish capabilities in Office 365

 

As proud as we are about the effectiveness offered by Office 365 ATP, we also know that no solution is 100% effective. For this reason, we also offer powerful feedback loops through which suspicious emails can be reported by end users to Microsoft to feed into the overall intelligence and continually improve the service to better protect customers.

 

End users can report suspicious messages they see in their inbox to Microsoft using the  Report Message plug-in in Outlook and Outlook Web Access. Organizations’ security teams can also review these user-reported messages in the Office 365 Security and Compliance Center to better understand the attacks users are seeing and update their security policies.

 

Read-time.pngReal-time report showing all user-submitted emails

From the SecOps perspective, these submissions form an important source of intelligence and can trigger investigation and remediation workflows to significantly reduce the time to detect and respond to an attack and therefore limit the scope of impact of an attack within the organization.

 

The Report Message plug-in is therefore an invaluable tool for users to flag suspicious content to not only their security teams, but directly to Microsoft as well. But some organizations don’t want their users to submit emails directly to Microsoft, as they may contain sensitive information. They want these submissions to first be reviewed by their security teams before being submitted to Microsoft.

 

Today we’re excited to announce that the email submission experience will now be available to security teams and admins from the same place where they review user-reported messages within the Office 365 Security and Compliance Center.

 

With this new capability, admins can easily submit emails and content, provide more details, and receive immediate feedback. The feedback provided by Microsoft will also offers valuable insights into configurations that may have caused a false positive or a false negative, reducing the time to investigate issues and improving the overall effectiveness.

 

With this new submission process, admins can: 

  • Submit suspicious emails, files, and URLs to Microsoft for analysis
  • Receive immediate feedback on their submissions
  • Find and remove rules allowing malicious content into the tenant 
  • Find and remove rules blocking good content into the tenant 

Here’s a quick run through of the experience. You can also learn more about it in our technical docs.

 

Step 1 – Log in to the Security and Compliance Center or the M365 Admin Center as Global Admin, Security Admin, or Security Reader. Click on the ‘Submissions’ node under ‘Threat Management’. You will see all the end user reported messages here. Under the ‘User Reported’ tab. To create a new admin submission from the portal, click the ‘New Admin Submission’ on the top left.

 

details.png

 

Step 2 – Enter all the details related to the submission such as submission type, recipients, reason for submission and submit.

 

review.png

 

Step 3 – Review the status of your submission. You can see the progress of the submission after it is submitted. You can also drill down into specific submissions and see what was submitted, what it was submitted as, and reason for submission, as well as what verdict was issued.

 

sender.PNG

take action.jpg

 

Step 4 – Take actions to fix the suggested configuration.

 

This can be a great tool to manage false positives and help fix configurations issues that may result in EOP/Office 365 ATP not performing optimally. In the future we’ll not only present the config-related issues but also automatically fix them.

 

To whom is it available?

 

All Office 365 customers will be able to use this feature. However, customers using Office 365 ATP will benefit most from it. Customers using third-party reporting tools can also use this capability.

 

As you look to implement this solution, it’s important to know it provides valuable data for more than Office 365 ATP. Microsoft Threat Protection services in general can leverage it to fine tune the machine learning algorithms and better protect, detect, and respond to threats across different threat vectors. Get started with an MTP trial if you want to experience the comprehensive and integrated protection Microsoft Threat Protection provides. Learn more about Microsoft Threat Protection by following our monthly blog series.

6 Comments

It's great to finally be able to report messages via an UI tool! Any chance to make it accept anything other than .eml files for direct upload though? 

@Vasil Michev , I believe you can also submit attachments and URLs for direct uploads, what other options were you thinking of?

 

@Pragya Pandey Could we share some information/guidance on the "rescan result" tab, and expectations/result?


Occasional Contributor

Thanks @Pragya Pandey. There's no mention above of how a security team opts out of automatic submission of end user reporting to Microsoft, and thus only has the ability to do admin submissions. Is the change above to be implemented for everyone by default? 

Visitor
Hello. Is it possible to query for submissions through an API? Something like MessageID, From, To, Subject, Date. That would enable the security team to build integrations to monitor user submitted mails.
Established Member

How can we disable the automatic reporting to Microsoft when end-user report message? We should be able to review it before the end-user reported messages reaches Microsoft.