<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/ct-p/microsoft-defender-for-office-365</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Sun, 10 May 2026 16:54:19 GMT</pubDate>
    <dc:creator>microsoft-defender-for-office-365</dc:creator>
    <dc:date>2026-05-10T16:54:19Z</dc:date>
    <item>
      <title>Granular email content access with unified RBAC – now the default for new Defender tenants</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/granular-email-content-access-with-unified-rbac-now-the-default/ba-p/4505344</link>
      <description>&lt;P&gt;Email investigations are a key part of detecting and responding to phishing and malware. As security workflows continue to evolve, there is an increasing need to align email content visibility more closely with specific roles and scenarios, such as Tier‑1 analysis or specialized workflows like user‑reported phishing triage.&lt;/P&gt;
&lt;P&gt;Today we’re announcing additional “read-only” controls for more granular email access in Microsoft Defender and that starting on May 30&lt;SUP&gt;th&lt;/SUP&gt;, 2026, unified RBAC will become the new default for permission modeling for new tenants.&lt;/P&gt;
&lt;H4&gt;Unified RBAC in Microsoft Defender: a single, consistent permissions model&lt;/H4&gt;
&lt;P&gt;Microsoft Defender &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/manage-rbac" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;unified role&lt;/STRONG&gt;‑&lt;STRONG&gt;based access control&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; (RBAC)&lt;/STRONG&gt; provides a centralized way to manage permissions across the Defender security portfolio, replacing the need to configure and audit access separately for each solution, including endpoint, identity, SaaS, Cloud, and more. Instead of stitching together service‑specific role models, unified RBAC gives security teams one consistent authorization framework to control what users can see and do across the Microsoft Defender portal.&lt;/P&gt;
&lt;P&gt;Unified RBAC is designed to support modern security operations by aligning access with real‑world roles, such as analysts, investigators, and administrators, while reducing the risk that comes from over‑permissioned accounts including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Enforcing least‑privilege access consistently&lt;/LI&gt;
&lt;LI&gt;Understanding who has access to sensitive data across services&lt;/LI&gt;
&lt;LI&gt;Performing clean access reviews and audits&lt;/LI&gt;
&lt;LI&gt;Scaling permissions safely in tiered SOC or partner‑managed environments&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Unified RBAC addresses these challenges by converging permissions into a single model and separates read-only (data access) and manage (action‑taking) permissions by design, making access intent explicit and reducing accidental overexposure of sensitive security data.&lt;/P&gt;
&lt;H4&gt;More granular email permissions within unified RBAC&lt;/H4&gt;
&lt;P&gt;Unified RBAC now supports additional read‑only permissions for specific email content scenarios—so access can be matched precisely to investigation and review workflows.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: rgb(30, 30, 30); font-size: 20px;"&gt;1. New permission-Email &amp;amp; collaboration content: Emails associated with alerts&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The new &lt;STRONG&gt;Emails associated with alerts &lt;/STRONG&gt;permission allows analysts to preview or download emails only when they are directly associated with a security alert, without granting access to all email content. Initially, this permission applies to alerts of type &lt;STRONG&gt;&lt;EM&gt;Email reported by user as malware or phish and Email reported by user as junk&lt;/EM&gt;&lt;/STRONG&gt;, which is one of the most common investigation entry points for security teams. Only emails tied to that alert type can be previewed or downloaded. Support for additional alert types will expand in future updates.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why this matters:&lt;/STRONG&gt; Tier‑1 analysts and triage teams can investigate user‑reported threats quickly and effectively, without being granted visibility into unrelated emails.&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;2. New permission- Email and Collaboration content: Quarantine Emails&lt;/H5&gt;
&lt;P&gt;This new permission allows previewing and downloading &lt;STRONG&gt;only emails that are in admin quarantine&lt;/STRONG&gt;, supporting roles responsible for reviewing or validating quarantined messages – without broader email access.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt; After this update, &lt;STRONG&gt;Email &amp;amp; collaboration quarantine&lt;/STRONG&gt; and &lt;STRONG&gt;Security data basics&lt;/STRONG&gt; will no longer provide email content preview or download by themselves. To allow content visibility for quarantined messages, you must explicitly assign &lt;STRONG&gt;Emails in Quarantine&lt;/STRONG&gt;. This change clarifies role boundaries and simplifies audits by making content access intentional and explicit. Read more &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/quarantine-admin-manage-messages-files#what-do-you-need-to-know-before-you-begin" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Why this matters:&lt;/STRONG&gt; Quarantine review teams can access exactly what they need—no more, no less—supporting least-privilege access by design.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;These permissions extend the Unified RBAC model for email &amp;amp; collaboration by separating visibility from action. They allow security teams to grant targeted access to email content only where it’s required, while preserving full content access for senior investigators and incident response teams.&lt;/P&gt;
&lt;P&gt;Full email content access remains available through existing permissions—such &lt;STRONG&gt;as Email &amp;amp; collaboration content: All emails&lt;/STRONG&gt;—for senior investigators and incident response teams who require unrestricted visibility.&lt;/P&gt;
&lt;H5&gt;Unified RBAC becomes the default for new Microsoft Defender tenants&lt;/H5&gt;
&lt;P&gt;Starting &lt;STRONG&gt;May 30&lt;SUP&gt;th&lt;/SUP&gt;, 2026, Unified RBAC&lt;/STRONG&gt; &lt;STRONG&gt;will be enabled by default&lt;/STRONG&gt; for new Microsoft Defender for Office 365 Plan 2 tenants, making it the primary permissions model that enables a single, unified authorization model across the Defender suite. Permissions are managed through Defender unified RBAC roles, alongside Microsoft Entra roles where applicable (e.g. for Attack Simulation Training). Making Unified RBAC the default for new tenants is a key step toward simplifying permissions management and embeds &lt;STRONG&gt;least-privilege access by design&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;Learn more&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/manage-rbac" target="_blank" rel="noopener"&gt;Microsoft Defender Unified role-based access control (RBAC) &lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/create-custom-rbac-roles" target="_blank" rel="noopener"&gt;Create custom roles with Microsoft Defender Unified role-based access control (RBAC)&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/quarantine-admin-manage-messages-files" target="_blank" rel="noopener"&gt;Manage quarantined messages and files as an admin&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-email-entity-page" target="_blank" rel="noopener"&gt;The Email entity page in Defender for Office 365&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 29 Apr 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/granular-email-content-access-with-unified-rbac-now-the-default/ba-p/4505344</guid>
      <dc:creator>VipulPandey</dc:creator>
      <dc:date>2026-04-29T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Declutter and Defend: Reducing promotional mail noise with Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</link>
      <description>&lt;P&gt;Enterprise inboxes are overwhelmed with &lt;STRONG&gt;graymail&lt;/STRONG&gt; — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high volumes of these mails land in the inbox, it crowds out priority communications and can dull security vigilance. Employees conditioned to ignore repetitive emails may miss signs of a real threat. It also creates recurring work for admins and security teams who must continuously tune filters, manage exception requests, and chase noise from user reports for email that isn’t malicious. Because graymail passes every spam filter check, traditional defenses don't separate it — leaving this signal-to-noise gap unaddressed.&lt;/P&gt;
&lt;P&gt;Today we’re excited to announce that &lt;STRONG&gt;Microsoft Defender now includes built-in graymail filtering. &lt;/STRONG&gt;It is delivered natively through a new &lt;STRONG&gt;Promotions experience in Outlook&lt;/STRONG&gt; that automatically classifies and separates bulk email, so it no longer competes with business-critical communication in the inbox. Now in&amp;nbsp;&lt;STRONG&gt;Public Preview&lt;/STRONG&gt;, this capability learns from how users interact with graymail to become more accurate over time. Coupled with the existing &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener"&gt;Bulk Senders Insight report&lt;/A&gt;, Defender brings data-driven bulk classification and control into the security workflows you already use.&lt;/P&gt;
&lt;H5&gt;What Is Graymail?&lt;/H5&gt;
&lt;P&gt;Graymail is legitimate bulk email that isn't malicious—product newsletters, event announcements, marketing promotions, and software update notifications from reputable, authenticated senders. It is distinct from spam and from phishing - graymail comes from real organizations with proper authentication and traditional spam filters aren't designed to handle it.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Graymail handling in Microsoft Defender&lt;/H4&gt;
&lt;P&gt;Microsoft Defender's approach is built on three principles: &lt;STRONG&gt;classify intelligently, deliver natively, and learn continuously&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;Promotions Folder — Intelligent Inbox Organization&lt;/H5&gt;
&lt;P&gt;A dedicated &lt;STRONG&gt;Promotions folder,&lt;/STRONG&gt; natively provisioned in Outlook, now keeps legitimate bulk mail out of the primary inbox. Promotional content is separated from priority emails without being sent to &lt;STRONG&gt;Junk&lt;/STRONG&gt;, which means users can still access and browse newsletters and updates at their own pace. The folder appears at the top level of the mailbox for easy discovery and is visible across all Outlook experiences.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Non-spam bulk mail&lt;/STRONG&gt; below the organization's configured &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk Complaint Level&lt;/A&gt; threshold is automatically routed to the Promotions folder.&lt;/LI&gt;
&lt;LI&gt;Messages from senders the user has explicitly&amp;nbsp;&lt;STRONG&gt;allowed&lt;/STRONG&gt; continue to land in the Inbox.&lt;/LI&gt;
&lt;LI&gt;Messages identified as&amp;nbsp;&lt;STRONG&gt;spam&lt;/STRONG&gt; continue to go to Junk.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To enable the Promotions folder administrators need to enable the &lt;STRONG&gt;"Bulk Moves Enabled"&lt;/STRONG&gt; setting in their anti-spam policy. The Promotions folder is then created for all users and used for routing only when this setting is ON.&lt;/P&gt;
&lt;P&gt;Existing mail flow is unaffected.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: system tagging of “Promotions” in outlook client and promotions folder (previously tagged as “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Promotional mail tagging and Mailbox Rule Support&lt;/H5&gt;
&lt;P&gt;Messages classified as graymail will automatically be labeled with a &lt;STRONG&gt;"Promotions" system tag&lt;/STRONG&gt; in Outlook. The tag provides instant visual context without requiring users to open each message and is visible in Outlook on the Web and the native Outlook desktop apps for Windows and Mac. During Public Preview, the tagging component is opt-in, requiring administrators to &lt;STRONG&gt;enable it by configuring an Exchange Transport Rule&lt;/STRONG&gt;. Once generally available, it will be enabled by default.&lt;/P&gt;
&lt;P&gt;Because this classification is integrated at the client level, the Promotions tag can also be used as a condition in Outlook mailbox rules. This enables custom routing logic for advanced scenarios like moving all promotions-tagged messages from a specific sender to a custom folder, flagging certain promotional emails for follow-up, or auto-forwarding or deleting promotions that meet specific criteria. This transforms the Promotions classification from a one-way filter into a flexible building block for personal and organizational workflows—particularly valuable for power users and teams with compliance or archival requirements.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: User inbox rules using “Promotion” tag (previously “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Adaptive Learning&lt;/H5&gt;
&lt;P&gt;Microsoft Defender's graymail filtering gets smarter with every interaction. The system learns directly from how users handle their mail. When a user moves a message out of the Promotions folder and back to the Inbox, future emails from that sender will no longer be placed in the Promotions folder. When a user moves a message from the Inbox into the Promotions folder, future emails from that sender will be routed to the Promotions folder automatically.&lt;/P&gt;
&lt;P&gt;This creates a personalized, self-improving experience that becomes more accurate over time - no manual rule configuration required, no safe-sender lists to maintain, and no filtering rules for IT teams to manage on behalf of individual employees.&lt;/P&gt;
&lt;H5&gt;Built into existing Security Workflows&lt;/H5&gt;
&lt;P&gt;Administrators also gain visibility through the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;&lt;STRONG&gt;Bulk Senders Insight report&lt;/STRONG&gt;&lt;/A&gt;, which provides data-driven guidance on what your organization actually receives and can help tune your bulk mail filtering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Graymail has long been the unsolved middle ground of email security—too legitimate to block, too noisy to ignore. Microsoft Defender now handles it where it should be handled: inside the platform, inside the mailbox, and inside the security workflows your organization already relies on. No new portals, no new vendors, no compromise between security and user experience.&lt;/P&gt;
&lt;H4&gt;Get Started&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Configure promotions tagging and the promotions folder today - &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk email detection documentation on Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Monitor the experience using the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;Bulk Senders Insight report&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 23 Apr 2026 03:59:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</guid>
      <dc:creator>FaithEbenezerOquong</dc:creator>
      <dc:date>2026-04-23T03:59:21Z</dc:date>
    </item>
    <item>
      <title>Enable per‑user language selection for phishing simulation emails and landing pages</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/enable-per-user-language-selection-for-phishing-simulation/m-p/4513454#M1146</link>
      <description>&lt;P&gt;We use&amp;nbsp;&lt;STRONG&gt;Attack Simulation Training&lt;/STRONG&gt; to deliver phishing simulations to a global, multilingual user base. While Microsoft Defender supports multi‑language content, phishing simulation &lt;STRONG&gt;emails and landing pages are currently delivered in a single selected language per campaign&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We are requesting a feature that allows &lt;STRONG&gt;phishing simulation emails and associated landing pages (including credential‑harvest pages)&lt;/STRONG&gt; to automatically render in each user’s preferred language, based on:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Outlook mailbox language settings, and/or&lt;/LI&gt;&lt;LI&gt;Microsoft Entra ID user language preferences&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This capability would:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Improve realism and accuracy of phishing simulations&lt;/LI&gt;&lt;LI&gt;Ensure users experience simulations in the same language they normally work in&lt;/LI&gt;&lt;LI&gt;Improve behavioral measurement in global organizations&lt;/LI&gt;&lt;LI&gt;Reduce the need to create and manage multiple parallel simulations by language&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Providing consistent, per‑user language alignment across &lt;STRONG&gt;simulation emails, landing pages, and follow‑up training&lt;/STRONG&gt; would significantly enhance the effectiveness of Attack Simulation Training for large, multilingual enterprises.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 17:17:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/enable-per-user-language-selection-for-phishing-simulation/m-p/4513454#M1146</guid>
      <dc:creator>POlsen</dc:creator>
      <dc:date>2026-04-21T17:17:40Z</dc:date>
    </item>
    <item>
      <title>Enable automatic per‑user language selection for Defender training modules</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/enable-automatic-per-user-language-selection-for-defender/m-p/4513453#M1145</link>
      <description>&lt;P&gt;We use&amp;nbsp;&lt;STRONG&gt;Attack Simulation Training and Microsoft Defender training modules&lt;/STRONG&gt; as part of our security awareness program for a global audience.&lt;/P&gt;&lt;P&gt;Currently, training content is assigned in a single language per campaign, even though users already have &lt;STRONG&gt;preferred language settings defined in Outlook and Microsoft Entra ID (Azure AD)&lt;/STRONG&gt;. This creates challenges for multinational organizations and often requires duplicating campaigns or accepting that some users receive training in a non‑preferred language.&lt;/P&gt;&lt;P&gt;We are requesting a capability that allows &lt;STRONG&gt;Defender training modules to automatically display in each user’s preferred language&lt;/STRONG&gt;, based on:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Outlook mailbox language settings, and/or&lt;/LI&gt;&lt;LI&gt;Microsoft Entra ID user language preferences&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Enabling per‑user language selection would:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Improve comprehension and learning outcomes&lt;/LI&gt;&lt;LI&gt;Increase training effectiveness for non‑native speakers&lt;/LI&gt;&lt;LI&gt;Reduce administrative overhead and duplicated campaigns&lt;/LI&gt;&lt;LI&gt;Align Defender training with existing Microsoft 365 localization behavior&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Defender already supports training content in multiple languages. Allowing &lt;STRONG&gt;dynamic language delivery per user&lt;/STRONG&gt; would significantly improve scalability and usability for enterprise security awareness programs.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 17:15:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/enable-automatic-per-user-language-selection-for-defender/m-p/4513453#M1145</guid>
      <dc:creator>POlsen</dc:creator>
      <dc:date>2026-04-21T17:15:09Z</dc:date>
    </item>
    <item>
      <title>Announcing Public Preview: Security Copilot’s Email Summary in Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-public-preview-security-copilot-s-email-summary-in/ba-p/4510357</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Co-Authors: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/cristinadagamah/2944483" target="_blank" rel="noopener" data-lia-auto-title="Christina Da Gama Henriquez" data-lia-auto-title-active="0"&gt;Cristina Da Gama Henriquez&lt;/A&gt; and &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/ajaj_shaikh/1489303" target="_blank" rel="noopener" data-lia-auto-title="Ajaj Shaikh" data-lia-auto-title-active="0"&gt;Ajaj Shaikh&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;AI is rapidly reshaping both sides of the security landscape, and email remains one of the most common and complex entry points for attacks. As adversaries use AI to scale more sophisticated phishing and email-based threats, defenders are under pressure not just to detect them, but to quickly understand what actually happened. Microsoft continues to apply generative and agentic AI across the email protection stack to help stop threats before they reach the inbox and catch what inevitably gets through in the SOC. Still, for security analysts, understanding an email threat requires piecing together context across the incident and its related artifacts. Much of that context exists within the Email entity experience, but it is spread across metadata, timelines, URLs, and attachments, making it time-consuming to connect the dots and act with confidence.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce the public preview of Security Copilot’s Email summary capability, designed to bring those insights together and make email threat investigations faster, clearer, and more actionable. With Security Copilot included in Microsoft 365 E5, organizations will be able to bring AI directly into their flow of work—extending these benefits across the SOC at no additional cost.*&lt;/P&gt;
&lt;H4&gt;Bringing clarity into the investigation workflow&lt;/H4&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;Email summary brings AI-generated context directly into the Email entity page, transforming fragmented detection data into a clear, natural-language explanation of what happened and why. Analysts can access it from the Security Copilot right-side pane, the same place where Copilot activity across Microsoft Defender is surfaced. Instead of navigating across multiple views to reconstruct the story, analysts can generate a summary that connects the signals and highlights what matters most. And it all happens in seconds.&lt;/P&gt;
&lt;P&gt;Built on Security Copilot’s summarization capabilities, Email summary uses the same data analysts already rely on, like email metadata, timeline events, URLs, and attachments, and turns it into a cohesive narrative. It explains how a message was evaluated, what actions were taken, and where risk exists, without requiring manual correlation.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;A summary that follows how analysts think&lt;/H4&gt;
&lt;P&gt;The experience is intentionally embedded in the Email entity page, where investigations already happen, so analysts don’t have to change how they work to benefit from it. The output is structured to match how analysts approach an investigation. It starts with a concise overview of the email, including what was detected, what actions were taken, and any key indicators. From there, it walks through the timeline of events, helping reconstruct how the email was delivered, interacted with, and remediated. It also breaks down URLs and attachments, calling out malicious signals and explaining associated risks in plain language.&lt;/P&gt;
&lt;P&gt;Importantly, this is a user-triggered experience. Analysts generate a summary when they need it, ensuring the capability is both intentional and efficient.&lt;/P&gt;
&lt;H4&gt;From fragmented data to confident decisions&lt;/H4&gt;
&lt;P&gt;Email summary is a foundational step toward making email threat investigations more explainable and efficient. Today, it brings together existing signals into a clear, actionable narrative. Over time, it will evolve to incorporate additional signal depth: detonation (sandboxing) results, submission responses, and more granular insights from the filtering stack, further strengthening the completeness and fidelity of each investigation.&lt;/P&gt;
&lt;P&gt;As threats continue to grow in speed and sophistication, the ability to quickly understand and act is just as critical as detection itself. Email summary helps close that gap, giving analysts the clarity they need to respond with confidence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;*&lt;EM&gt;Eligible Microsoft 365 E5 customers will have 400 Security Compute Units (SCUs) per month for every 1,000 user licenses, up to 10,000 SCUs per month. This included capacity is expected to support typical scenarios. Customers will have an option to pay for scaling beyond the allocated amount at a future date with $6 per SCU on a pay-as-you-go basis, and will get a 30-day advanced notification when this option is available. &lt;/EM&gt;&lt;A class="lia-external-url" href="https://aka.ms/scpinclusioninfo" target="_blank"&gt;Learn more.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:19:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-public-preview-security-copilot-s-email-summary-in/ba-p/4510357</guid>
      <dc:creator>cristinadagamah</dc:creator>
      <dc:date>2026-04-14T20:19:58Z</dc:date>
    </item>
    <item>
      <title>Do XDR Alerts cover the same alerts available in Alert Policies?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/do-xdr-alerts-cover-the-same-alerts-available-in-alert-policies/m-p/4508139#M1144</link>
      <description>&lt;P&gt;The alerts in question are the 'User requested to release a quarantined message', 'User clicked a malicious link', etc. About 8 of these we send to 'email address removed for privacy reasons'. That administrator account has an EOM license, so Outlook rules can be set. We set rules to forward those 8 alerts to our 'email address removed for privacy reasons' address. This is, very specifically, so the alert passes through the @tenant.com address, and our ticketing endpoint knows what tenant sent it. But this ISN'T ideal because it requires an EOP license (or similar - this actually hasn't been an issue until now just because of our customer environments). I've looked at the following alternatives: -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Setting email address removed for privacy reasons as the recipient directly on the Alert Policies in question. This results in the mail going directly from &lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2865264" data-lia-user-login="microsoft" class="lia-mention lia-mention-user"&gt;microsoft&lt;/a&gt; to our Ticketing Portal - so it ends up sorted into Microsoft tickets. and the right team doesn't get it.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;SMTP Forwarding via either Exchange AC User controls or Mail Flow Rules. But these aren't traditional forwarding, and they have the same issue as above.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Making administrator @tenant.com a SHARED mailbox that we can also login to (for administration purposes). But this doesn't allow you to set Outlook rules (or even login to Outlook).&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I've checked out the newer alerts under Defender's Settings panel - XDR alerts, I think they're called. Wondering if these can be leveraged at all for this? Essentially, trying to get these Alerts to come to our external ticketing address, from the tenants domain (instead of Microsoft). I could probably update Autotask's rules to check for a header, and set that header via Mail Flow rules, but.. just hoping I don't have to do that for everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 18:43:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/do-xdr-alerts-cover-the-same-alerts-available-in-alert-policies/m-p/4508139#M1144</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-02T18:43:55Z</dc:date>
    </item>
    <item>
      <title>Impersonation Protection: Users to Protect should also be Trusted Senders</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/impersonation-protection-users-to-protect-should-also-be-trusted/m-p/4508138#M1143</link>
      <description>&lt;P&gt;Hey all, sort of a weird question here. Teaching my staff about Impersonation Protection, and it's kind of occurred to me that any external sender added to 'Senders to Protect' sort of implicitly should also be a 'Trusted Sender'. Example - we're an MSP, and we want our Help Desk (email address removed for privacy reasons) to be protected from impersonation. Specifically, we want to protect the 'Help Desk' name.&amp;nbsp; So we add email address removed for privacy reasons to Senders to protect. However, we ALSO want to make sure our emails come thru. So we've ALSO had to add email address removed for privacy reasons to Trusted Senders on other tenants.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Chats with Copilot have sort of given me an understanding that this is essentially a 'which is more usefuI' scenario. But CoPilot makes things up, and I want some human input.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In theory, ANYONE we add to 'trusted senders' we ALSO want protected from Impersonation. Anyone we protect from Impersonation we ALSO want to trust. Copilot says you SHOULDN'T do both.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Which is better / more practical?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 18:30:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/impersonation-protection-users-to-protect-should-also-be-trusted/m-p/4508138#M1143</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-02T18:30:38Z</dc:date>
    </item>
    <item>
      <title>I would like to know the complete list of alerts whose serviceSource is MDO</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-would-like-to-know-the-complete-list-of-alerts-whose/m-p/4507270#M1142</link>
      <description>&lt;P&gt;Hi all&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In order to determine the alerts that should be monitored by the SOC, I would like to identify, from the alerts listed at the link below, those whose serviceSource is Microsoft Defender for Office 365 (MDO).&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/alert-policies" target="_blank"&gt;Alert policies in the Microsoft Defender portal - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I couldn’t find where this is documented, no matter how thoroughly I searched, so I would appreciate it if you could point me to the relevant documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 12:14:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-would-like-to-know-the-complete-list-of-alerts-whose/m-p/4507270#M1142</guid>
      <dc:creator>Kota2</dc:creator>
      <dc:date>2026-03-31T12:14:37Z</dc:date>
    </item>
    <item>
      <title>From Impersonation Calls to Transparent Reporting: Defending the New Front Door of Attacks</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/from-impersonation-calls-to-transparent-reporting-defending-the/ba-p/4503050</link>
      <description>&lt;P&gt;Email is still a major entry point—but it’s no longer the only one that matters. Today’s attackers are increasingly shifting to &lt;STRONG&gt;collaboration channels like Microsoft Teams&lt;/STRONG&gt;, where trust is implicit and interaction is real time. Decisions happen fast, and that changes the economics of attacks. Adversaries can pressure users, adapt on the fly, and accelerate their objectives before traditional controls have time to respond. They can then pivot laterally across identities, endpoints, and cloud apps.&lt;/P&gt;
&lt;P&gt;And it’s not just chats and shared links anymore. &lt;STRONG&gt;Teams calling has emerged as a high-impact social-engineering path&lt;/STRONG&gt;—a “front door” attackers can use to bypass inbox defenses. They can impersonate familiar brands or internal functions. They can also try to extract credentials or persuade a user to take immediate action. In a typical flow, an attacker leverages urgency and context. For example, they may reference an “account issue” following suspicious email activity. They then use the real-time pressure of a call to drive a user toward compromise. That’s why protection must happen directly in the collaboration experience.&lt;/P&gt;
&lt;P&gt;At &lt;STRONG&gt;RSA 2026&lt;/STRONG&gt;, we’re announcing new Microsoft Defender capabilities designed for exactly this reality. They give SOC teams visibility that matches how attacks unfold across Microsoft Teams. They also help end users easily identify impersonation attempts, so they can stop them before compromise. And we’re introducing the new Protection and Posture Insights report, which provides tenant-specific insights about your collaboration security with Microsoft Defender.&lt;/P&gt;
&lt;H4&gt;Protect your organization from voice-based attacks in Microsoft Teams&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Voice phishing (vishing) is a fast-growing vector&lt;/STRONG&gt; because it lets attackers bypass message-based filters and manipulate targets in real time. But security teams haven’t had the same level of coverage for Teams calls that they’ve come to expect for email and messages. That’s why we’re excited to announce inline protection and SOC- investigation capabilities for Microsoft Teams calls. Microsoft Defender can now stop the interaction&amp;nbsp;&lt;EM&gt;while it’s happening&lt;/EM&gt; and SOC teams can then investigate the full path &lt;EM&gt;after the fact&lt;/EM&gt;.&lt;/P&gt;
&lt;H4&gt;Hunt and remediate suspicious calls&lt;/H4&gt;
&lt;P&gt;When attackers use Teams calls to impersonate a brand, internal IT, or a trusted organization, security teams need more than anecdotal user reports—they need forensic visibility and the ability to act. Microsoft Defender has turned Teams calling from a blind spot into a &lt;STRONG&gt;first-class SOC signal&lt;/STRONG&gt;, so you can now:&lt;/P&gt;
&lt;P&gt;Investigate Teams calling activity at scale through Advanced hunting. Use new call-focused data to identify suspicious patterns and validate risk across the organization. This includes unusual external callers, first-time contacts, or activity that aligns with brand impersonation patterns.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pivot directly into a call’s details using a call entity experience. Analysts can quickly understand what happened and who was involved, without stitching together context across multiple tools.&lt;/LI&gt;
&lt;LI&gt;Take mitigation actions inline by blocking malicious domains or addresses in Teams via the Tenant Allow/Block List. This turns investigation into immediate containment and helps prevent repeat attempts.&lt;/LI&gt;
&lt;LI&gt;Close the loop with end-user reporting. Pair what users flag as a security risk with what analysts can hunt and confirm. The SOC can move faster and reduce ambiguity when seconds matter.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Figure 1: Teams call activity events in advanced hunting&lt;/img&gt;&lt;img&gt;Figure 2: Call entity panel for deeper investigation in advanced hunting&lt;/img&gt;
&lt;H4&gt;Stop impersonation in real time&lt;/H4&gt;
&lt;P&gt;While insights are critical, the most effective way to reduce vishing impact is to interrupt social engineering while the user is still deciding what to do.&lt;/P&gt;
&lt;P&gt;Now, when a Teams call appears to be impersonating a known organization or trusted entity, users will see a persistent in-call warning banner. It shows during the incoming-call experience and while on the call. That gives users clear, contextual guidance &lt;EM&gt;before&lt;/EM&gt; they comply with attacker instructions. It also extends the same protection approach used for chat impersonation into the calling surface.&lt;/P&gt;
&lt;img&gt;Figure 3: Teams call real-time notification informing the user that the call is suspicious.&lt;/img&gt;
&lt;P&gt;And because improving protection depends on learning from real interactions, users can also provide feedback by reporting a call as not a security risk to help improve the accuracy of warnings over time.&lt;/P&gt;
&lt;P&gt;That makes Defender the only collaboration security tool that provides inline user feedback – in real-time.&lt;/P&gt;
&lt;H4&gt;Turn Defender telemetry into executive-ready security understanding with the Protection &amp;amp; Posture Insights report&lt;/H4&gt;
&lt;P&gt;To help organizations clearly understand the threats targeting their environment and how Defender is helping protect against them, we are introducing the&lt;STRONG&gt; Protection &amp;amp; Posture Insights report.&lt;/STRONG&gt; It is available directly in the Defender portal and built on tenant-specific telemetry. The report provides a customized view of the spam, phishing, and malware campaigns observed against users—showing how attackers are attempting to gain access, what techniques are being used, who is being targeted, and where risk is concentrated across the environment.&lt;/P&gt;
&lt;P&gt;The Protection &amp;amp; Posture Insights report goes beyond surface-level threat counts to highlight patterns and exposure unique to each tenant, including emerging phishing techniques, malware delivery methods, and zero-day threats identified through detonation analysis. It also shows how these threats are handled across delivery locations—such as inbox, junk, and quarantine—and which detection technologies and policies are engaged, giving teams a clearer understanding of how attackers are interacting with their environment.&lt;/P&gt;
&lt;P&gt;In addition to threat visibility, the report delivers &lt;STRONG&gt;personalized insights and targeted security policy recommendations&lt;/STRONG&gt; based on each customer’s configuration and observed threat activity. By surfacing coverage gaps, priority account targeting, and opportunities to strengthen policy enforcement, teams can take focused action to reduce exposure and improve security posture. With consistent, tenant-specific reporting over time, organizations can validate results, track progress, and share credible, executive-ready security outcomes—without manual data assembly.&lt;/P&gt;
&lt;img&gt;Figure 4: Executive summary of the new Protection &amp;amp; Posture Insights report&lt;/img&gt;
&lt;P&gt;This kind of personalized visibility answers the most important question for any security team: what was stopped in &lt;EM&gt;my&lt;/EM&gt; environment, and why. It’s also helpful to pair those tenant-specific insights with an objective, industry-wide view. That’s why we publish official email security performance benchmarking. We use consistent, real-world measurements of detection and efficacy across phishing, malware, and spam. That way, you can compare Microsoft Defender against other secure email gateway (SEG) and integrated cloud email security (ICES) solutions. For a deeper look at what the latest results reveal, check out &lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/12/from-transparency-to-action-what-the-latest-microsoft-email-security-benchmark-reveals/" target="_blank" rel="noopener"&gt;From transparency to action: What the latest Microsoft email security benchmark reveals.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;These new Microsoft Defender capabilities close a critical gap in collaboration security. They help customers interrupt Teams call–based social engineering. They also give the SOC actionable call visibility and faster containment to prevent repeat attempts. Combined with the Protection &amp;amp; Posture Insights report, security teams can more easily report what was stopped in their tenant. They can also prioritize the next control improvements and strengthen end‑to‑end SOC outcomes across email and Teams.&lt;/P&gt;
&lt;H4&gt;Visit Us at RSA 2026&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;Join us at the Microsoft booth at the Moscone Center to see these innovations in action!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More information:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Learn more about &lt;/STRONG&gt;&lt;A href="https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-office-365" target="_blank" rel="noopener"&gt;Defender for Office 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Find out how to &lt;A href="https://aka.ms/protect-against-multi-modal-attacks" target="_blank" rel="noopener"&gt;protect your organization&lt;/A&gt; against multi-modal attacks&lt;/LI&gt;
&lt;LI&gt;Check out our recent blog: &lt;A href="https://aka.ms/disrupting-threat-targeting-teams" target="_blank" rel="noopener"&gt;Disrupting threats targeting Microsoft Teams&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 27 Mar 2026 23:13:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/from-impersonation-calls-to-transparent-reporting-defending-the/ba-p/4503050</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2026-03-27T23:13:51Z</dc:date>
    </item>
    <item>
      <title>Defender for iOS: “This account has reached its devices limit” even though no devices are listed</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/defender-for-ios-this-account-has-reached-its-devices-limit-even/m-p/4499180#M1136</link>
      <description>&lt;UL&gt;&lt;LI&gt;I am using all 5 devices available (2 PC's, 1 Mac, 2 IOS devices)&lt;/LI&gt;&lt;LI&gt;I was trying to install Microsoft Defender for IOS on a new iPhone created by copying from the old phone (iPhone 11) to the new phone (iPhone 17).&lt;/LI&gt;&lt;LI&gt;I erased my old iPhone 11 while Defender was still installed&lt;/LI&gt;&lt;LI&gt;My Microsoft account shows&amp;nbsp;&lt;STRONG&gt;zero&lt;/STRONG&gt; mobile devices (none were linked to my MS account)&lt;/LI&gt;&lt;LI&gt;Defender on the new iPhone never completed sign‑in with my MS account&lt;/LI&gt;&lt;LI&gt;“Sign out everywhere” and app removal didn’t help (also app removal, restart IOS device, reinstall Defender for IOS)&lt;/LI&gt;&lt;LI&gt;You suspect a &lt;STRONG&gt;stuck Defender mobile enrollment token&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;You need Microsoft to reset the backend mobile device slot&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;From Office Copilot:&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;H2&gt;What to tell the agent (so you don’t get bounced)&lt;/H2&gt;&lt;P&gt;Use this exact wording:&lt;/P&gt;&lt;P&gt;“Microsoft Defender for iOS says ‘This account has reached its devices limit’ even though no devices appear in my Microsoft account. My old iPhone was erased while Defender was still signed in. I need my Defender mobile device enrollment reset.”&lt;/P&gt;&lt;P&gt;This sends them straight to the backend reset tool.&lt;/P&gt;&lt;H2&gt;Why this works when everything else doesn’t&lt;/H2&gt;&lt;P&gt;The issue isn’t on your devices or in your account UI — it’s a &lt;STRONG&gt;server-side Defender mobile quota flag&lt;/STRONG&gt; that only Microsoft support can clear. The consumer Defender team (under Microsoft 365 support) is the only group with access to that system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 23:35:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/defender-for-ios-this-account-has-reached-its-devices-limit-even/m-p/4499180#M1136</guid>
      <dc:creator>Herzlich</dc:creator>
      <dc:date>2026-03-03T23:35:06Z</dc:date>
    </item>
    <item>
      <title>Part 3: Build custom email security reports with Power BI and workbooks in Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-3-build-custom-email-security-reports-with-power-bi-and/ba-p/4490127</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;TL;DR&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;: We're releasing a brand-new Power BI template for email security reporting and a major update (v3) to the Microsoft Sentinel workbook. Both solutions share the same rich visuals and insights. Choose Power BI for quick deployment without Sentinel, or the Sentinel workbook for extended data retention and multi-tenant scenarios. Get started in minutes with either option.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Introduction&lt;/H2&gt;
&lt;P&gt;Security teams in both small and large organizations track key metrics to make critical security decisions and identify meaningful trends in their organizations. &amp;nbsp;While Microsoft Defender for Office 365 provides rich, built-in reporting capabilities, many security teams need custom reporting solutions to create dedicated views, combine multiple data sources, and derive deeper insights tailored to their unique requirements.&lt;/P&gt;
&lt;P&gt;Earlier last year (&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/build-custom-email-security-reports-and-dashboards-with-workbooks-in-microsoft-s/4352242" target="_blank" rel="noopener"&gt;Part 1&lt;/A&gt; and &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/part-2-build-custom-email-security-reports-and-dashboards-with-workbooks-in-micr/4411303" target="_blank" rel="noopener"&gt;Part 2&lt;/A&gt;) we shared examples of how you can use &lt;A href="https://learn.microsoft.com/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks in Microsoft Sentinel&lt;/A&gt; to build a custom email security insights dashboard for Microsoft Defender for Office 365.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce the release of a &lt;STRONG&gt;new Power BI template file&lt;/STRONG&gt; for Microsoft Defender for Office 365 customers, along with an &lt;STRONG&gt;updated version&lt;/STRONG&gt; of the &lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel.&lt;/STRONG&gt; Both &amp;nbsp;solutions share the same visual design and structure, giving you a consistent experience regardless of which platform you choose.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Power BI template file - &lt;/STRONG&gt;Microsoft Defender for Office 365 Detections and Insights:&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Sentinel workbook&lt;/STRONG&gt;&amp;nbsp;- Microsoft Defender for Office 365 Detections and Insights:&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;NEW: Power BI template file for Microsoft Defender for Office 365 Detections and Insights&lt;/H2&gt;
&lt;P&gt;This custom reporting template file utilizes Power BI and Microsoft Defender XDR Advanced Hunting through the &lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/security-api-overview?view=graph-rest-1.0" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Graph security API&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It is designed for Microsoft Defender for Office 365 customers who have access to Advanced Hunting but are not using Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;Advanced Hunting data in Microsoft Defender for Office 365 tables is available for up to 30 days. The reporting template uses these same data tables to visualize insights into an organization's email security, including protection, detection, and response metrics provided by Microsoft Defender for Office 365.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Note:&lt;/U&gt;&lt;/STRONG&gt; If data retention beyond 30 days is required, customers can use the Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;You can find the new .pbit template file and detailed instructions on how to set up and use it in the &lt;A href="https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Microsoft%20Defender%20for%20Office%20365" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;unified Microsoft Sentinel and Microsoft 365 Defender GitHub repository&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This new Power BI template uses the same visuals and structure as the Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel, providing an easy way to gain deep email security insights across a wide range of use cases.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;H2&gt;UPDATED: Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel&lt;/H2&gt;
&lt;P&gt;We are excited to announce the release of a &lt;STRONG&gt;new version (3.0.0)&lt;/STRONG&gt; of the &lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt; workbook in &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The workbook is part of the &lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; &lt;STRONG&gt;solution&lt;/STRONG&gt; in Microsoft Sentinel and can be installed and started to use with a few simple clicks.&lt;/P&gt;
&lt;P&gt;In this new release we incorporated feedback we have received from many customers in the past few months to add new visuals, updated existing visuals and add insights focusing on security operations.&lt;/P&gt;
&lt;H3&gt;What’s New&lt;/H3&gt;
&lt;P&gt;Here are some notable changes and new capabilities available in the updated workbook template.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved structure:&lt;/STRONG&gt; Headings and grouped insights have been added to tabs for easier navigation and understanding of metrics.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Contextual explanations:&lt;/STRONG&gt; Each tab, section, and visual now includes descriptions to help users interpret insights effectively.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Drill-down capability:&lt;/STRONG&gt; A single “Open query link” action allows users to view the underlying KQL query for each visual, enabling quick investigation and hunting by modifying conditions or removing summaries to access raw data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detection Dashboard tab enhancements:&lt;/STRONG&gt; Added an &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/reports-mdo-email-collaboration-dashboard#phish--malware-efficacy-card" target="_blank" rel="noopener"&gt;example Effectiveness metric&lt;/A&gt;, updated visuals to focus on overall Microsoft Defender for Office 365 protection values, and introduced new sections for &lt;A href="https://go.microsoft.com/fwlink/?linkid=2323913" target="_blank" rel="noopener"&gt;Emerging Threats&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;Microsoft 365 Secure Email Gateway Performance.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;New Security Operations Center (SOC) Insights tab:&lt;/STRONG&gt; Provides operational metrics such as Security Incident Response, Investigation, and Response Actions for SOC teams.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced threat insights:&lt;/STRONG&gt; Includes &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365s-language-ai-for-phish-enhancing-email-securit/4410446" target="_blank" rel="noopener"&gt;new LLM-based content analysis&lt;/A&gt; detections and threat classification insights on the &lt;STRONG&gt;Emails – Phish Detections&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;External forwarding insights:&lt;/STRONG&gt; Added deep visibility into &lt;STRONG&gt;Inbox rules&lt;/STRONG&gt; and &lt;STRONG&gt;SMTP forwarding in Outlook&lt;/STRONG&gt;, including destination details to assess potential data leakage risks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Geo-location improvements:&lt;/STRONG&gt; Sender IPv4 insights now include top countries for better geographic context for each Threat types (Malware, Spam, Phish).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced top attacked users and top senders:&lt;/STRONG&gt; Added &lt;STRONG&gt;TotalEmailCount&lt;/STRONG&gt; and &lt;STRONG&gt;Bad_Traffic_Percentage&lt;/STRONG&gt; for richer context in top attacked users and senders charts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanded URL click insights:&lt;/STRONG&gt; URL click-based threat detection visuals now include &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safelinks-protection-for-links-generated-by-m365-copilot-chat-and-office-apps/4396828" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft 365 Copilot&lt;/STRONG&gt;&lt;/A&gt; as a workload.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;How to use the workbook across multiple tenants&lt;/H3&gt;
&lt;P&gt;If you manage multiple environments with Microsoft Sentinel — or you are an &lt;STRONG&gt;MSSP (Managed Security Service Provider)&lt;/STRONG&gt; working across multiple customer tenants — you can also use the workbook in multi‑tenant scenarios.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants#use-cross-workspace-workbooks" target="_blank" rel="noopener"&gt;Once the required configuration is in place,&lt;/A&gt; you can change the Subscription and Workspace parameters in the workbook to be multi select and load data from one or multiple tenants.&lt;/P&gt;
&lt;P&gt;This enables to see deep email security insights in multi‑tenant environments, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Aggregated multi‑tenant view:&lt;/STRONG&gt;&lt;BR /&gt;You can view aggregated insights across tenants in a &lt;STRONG&gt;single workbook view&lt;/STRONG&gt;. By multi‑selecting tenants in the &lt;STRONG&gt;Subscription&lt;/STRONG&gt; and &lt;STRONG&gt;Workspace&lt;/STRONG&gt; parameters, the workbook automatically loads and combines data from all selected environments for all visuals on all tabs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Side‑by-side‑ comparison:&lt;/STRONG&gt;&lt;BR /&gt;For example, you can compare phishing detection trends or top attacked users across two or more tenants simply by opening the workbook in two browser windows placed side by side.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; For the multiselect option‑ to work in the current workbook version, you need to manually adjust the &lt;STRONG&gt;Subscription&lt;/STRONG&gt; and &lt;STRONG&gt;Workspace&lt;/STRONG&gt; parameters. This configuration is planned to become the default in the next release of the workbook. Until then, you &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants#use-cross-workspace-workbooks" target="_blank" rel="noopener"&gt;can simply apply this change using the workbook’s &lt;STRONG&gt;Edit&lt;/STRONG&gt; mode.&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;How to get the updated workbook version&lt;/H3&gt;
&lt;P&gt;The latest&amp;nbsp;version of the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt;&amp;nbsp;workbook is available&amp;nbsp;as part of&amp;nbsp;the&amp;nbsp;&lt;STRONG&gt;Microsoft&amp;nbsp;Defender XDR&lt;/STRONG&gt;&amp;nbsp;solution in the &lt;STRONG&gt;Microsoft Sentinel - Content hub&lt;/STRONG&gt;. Version&amp;nbsp;&lt;STRONG&gt;3.0.13&lt;/STRONG&gt;&amp;nbsp;of the solution has the updated workbook template.&lt;/P&gt;
&lt;P&gt;If you already have the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt;&amp;nbsp;solution deployed, &lt;STRONG&gt;version 3.0.13&lt;/STRONG&gt; is available now as an update. After you install the update, you will have the new workbook template available to use.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: If you had the workbook saved from a previous template version, make sure you delete the old workbook and use the save button on the new template to recreate a new local version with the latest updates.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;If you install the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; solution for the first time, you are deploying the latest version and will have the updated template ready to use.&lt;/P&gt;
&lt;H3&gt;How to edit and share the workbook with others&lt;/H3&gt;
&lt;P&gt;You can customize each visual easily. Simply edit the workbook after saving,&amp;nbsp;then&amp;nbsp;adjust the underlying KQL query,&amp;nbsp;change the type of&amp;nbsp;the&amp;nbsp;visual,&amp;nbsp;or&amp;nbsp;create new insights.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;Visualize your data using workbooks in Microsoft Sentinel | Microsoft Learn&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Granting other users access to the workbook also possible, see the &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/manage-access-to-microsoft-sentinel-workbooks-with-lower-scoped-rbac/3906280" target="_blank" rel="noopener"&gt;Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC&lt;/A&gt; on the Microsoft Sentinel Blog.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Do you have feedback related to reporting in Microsoft Defender for Office 365?&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;You can provide direct feedback via filling the form:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-teams="true"&gt;&lt;A href="https://aka.ms/mdoreportingfeedback" target="_blank" rel="noopener" aria-label="Link aka.ms/mdoreportingfeedback"&gt;aka.ms/mdoreportingfeedback&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have questions or feedback about Microsoft Defender for Office 365?&lt;/P&gt;
&lt;P&gt;Engage with the community and Microsoft experts in the &lt;A href="https://aka.ms/MDOForum" target="_blank" rel="noopener"&gt;Defender for Office 365 forum&lt;/A&gt;. &amp;nbsp;&lt;/P&gt;
&lt;H2&gt;More information&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/microsoft-365-defender-sentinel-integration?tabs=azure-portal" target="_blank" rel="noopener"&gt;Integrate Microsoft Defender XDR with Microsoft Sentinel&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about Microsoft Sentinel&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Defender XDR&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 10 Feb 2026 22:50:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-3-build-custom-email-security-reports-with-power-bi-and/ba-p/4490127</guid>
      <dc:creator>dmozes</dc:creator>
      <dc:date>2026-02-10T22:50:16Z</dc:date>
    </item>
    <item>
      <title>Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-collaboration-in-microsoft-teams-with-efficient-and/ba-p/4484479</link>
      <description>&lt;H3&gt;New Layers of Protection for Teams Messages&lt;/H3&gt;
&lt;P&gt;With more than 300 million monthly active users on Microsoft Teams, ensuring secure collaboration has become increasingly critical. As the threat landscape continues to change, our security measures must adapt accordingly. To address these challenges, we are pleased to announce enhanced protection and Security Operations response capabilities for enterprise messages containing URLs in Teams, utilizing Microsoft Defender.&lt;/P&gt;
&lt;H3&gt;Threat Profile – Tech Support Impersonation with Phishing URLs&lt;/H3&gt;
&lt;P&gt;In previous &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/protection-against-multi-modal-attacks-with-microsoft-defender/4438786" target="_blank" rel="noopener"&gt;blogs&lt;/A&gt;, we’ve discussed how threat actors are employing multimodal attacks and targeting users in an organization over Teams by impersonating tech support.&amp;nbsp; Lately some of these attackers have been observed steering their victims towards malicious websites that appear purpose-built to complete their harmful objectives while allaying the victim’s suspicions.&lt;/P&gt;
&lt;P&gt;The typical attack chain proceeds as follows:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Hybrid attacks often begin with mail bombing (spam) directed at the targeted individual, followed by Teams messages or calls in which the attacker impersonates IT support personnel offering to resolve the spam issue.&lt;/LI&gt;
&lt;LI&gt;Victims may then be deceived into granting system access to the attacker via remote management and monitoring tools such as Quick Assist or AnyDesk.&lt;/LI&gt;
&lt;LI&gt;In recent incidents, attackers have directed victims to malicious URLs that closely resemble legitimate internal IT security update or patching tools, featuring falsified logos and branding.&lt;/LI&gt;
&lt;LI&gt;These sites are actually conventional phishing platforms intended to capture user credentials and enable malware deployment, while victims believe their spam problem is being resolved.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Below: &lt;/STRONG&gt;Rendering of a malicious URL shared over Teams by an attacker to an intended victim&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Microsoft Defender uses robust detection engines and threat intelligence to support URL warnings, post-delivery protection, and advanced hunting for Teams, enabling comprehensive protection against evolving attack vectors.&lt;/P&gt;
&lt;H3&gt;Near real-time defense&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For Worldwide customers with Teams enterprise licenses and above &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Our new advanced near-real-time protection ensures that any message containing URLs is thoroughly scanned and appropriately flagged before delivery. End users are notified with a warning tip upon messages delivery when malicious URLs are detected, helping them recognize and avoid potential risk. Threats don’t always appear right away, to stay ahead of evolving attacks, protection continues for up to 48 hours after a message is delivered. If a previously safe URL later becomes weaponized, the message is automatically updated with a warning tip, ensuring users remain protected even after the message reaches them.&lt;/P&gt;
&lt;P&gt;This dual-layered approach means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Immediate warnings&lt;/STRONG&gt; for messages with known malicious URLs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Post-delivery detection&lt;/STRONG&gt; that adapts to evolving threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Protection across internal and external communications&lt;/STRONG&gt;, including chats and channels, regardless of tenant origin.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These capabilities powered by Microsoft Defender will provide out-of-the-box protection as it will be enabled by default and will be available for all Teams enterprise users, with no additional configuration required. This ensures that every user benefits from advanced protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: Recipient view of message warnings&lt;/img&gt;&lt;img&gt;Figure 2: Sender view of message warnings&lt;/img&gt;
&lt;H3&gt;Empowering Users and SOC Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Security is a shared responsibility. We’re enabling &lt;A href="https://learn.microsoft.com/defender-office-365/submissions-teams" target="_blank" rel="noopener"&gt;users to report&lt;/A&gt; false negatives (FN) and false positives (FP) directly from Teams messages. These reports feed into Microsoft Defender investigation workflows, helping improve detection accuracy and reduce support overhead.&lt;/P&gt;
&lt;P&gt;Users can now report potentially malicious messages or messages incorrectly detected as malicious directly from the message context menu in Microsoft Teams:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Report as security risk&lt;/STRONG&gt;: For messages that seem suspicious but weren’t flagged.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Report as not security risk&lt;/STRONG&gt;: For messages that were flagged but are actually safe.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This enables users to actively contribute to their organization's security management and protection efforts, while simultaneously enhancing the accuracy of Microsoft Defender detection controls. Reports may be submitted for both internal and external communications including chats, meetings, and channels ensuring comprehensive coverage across all collaboration platforms such as Teams web, desktop, and mobile clients. Upon submission, these reports are accessible to administrators and security operations personnel in the Microsoft Defender portal as incidents, where they can efficiently triage, investigate, and respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 3: Report a concern&lt;/img&gt;&lt;img&gt;Figure 4: Report a wrong detection&lt;/img&gt;
&lt;H3&gt;Holistic Visibility for Security Operation Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Security Operation teams need context, coverage, and control. That’s why we’ve introduced three new Advanced Hunting tables in Microsoft Defender designed specifically to surface Microsoft Teams message metadata and enable deep investigations across both internal and external communications.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MessageEvents&lt;/STRONG&gt;: Captures metadata for all Teams messages containing URLs at the time of delivery.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MessagePostDeliveryEvents&lt;/STRONG&gt;: Surfaces messages that were flagged as malicious after delivery, including Zero-hour auto purge (ZAP) actions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MessageURLInfo&lt;/STRONG&gt;: Provides granular details on URLs extracted from Teams messages.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These tables are now generally available in the &lt;A href="https://security.microsoft.com/v2/advanced-hunting" target="_blank" rel="noopener"&gt;Microsoft Defeder portal&lt;/A&gt; providing direct insight into Teams message flows.&lt;/P&gt;
&lt;P&gt;SOC teams can now hunt across all external (federated) messages, not just messages that contain URLs. This is a major step forward in enabling cross-tenant threat detection and response, especially in today’s hybrid collaboration environments. All three tables are accessible via &lt;A href="https://learn.microsoft.com/en-us/graph/api/security-security-runhuntingquery?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank" rel="noopener"&gt;Advanced Hunting APIs&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/streaming-api" target="_blank" rel="noopener"&gt;Streaming APIs&lt;/A&gt;, allowing SOC teams to integrate hunting workflows into their existing automation pipelines.&lt;/P&gt;
&lt;P&gt;To further enhance visibility, we’ve added a new column called &lt;STRONG&gt;SafetyTip&lt;/STRONG&gt; to both the MessageEvents and MessagePostDeliveryEvents tables. This column flags whether a &lt;STRONG&gt;URL warning tip&lt;/STRONG&gt; was shown to the user in the Teams client, helping SOC teams distinguish between warning and block detections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 5: Hunt on message warnings&lt;/img&gt;
&lt;P&gt;Third-party security information and event management (SIEM) solutions can also integrate with and utilize these hunting tables via the Microsoft Defender Streaming API. For instance, in Splunk, the new tables may be configured to automatically flow into your Splunk instance, supporting extended data retention by leveraging the latest version of the Microsoft Defender Splunk connector. It is important to ensure that the new Teams protection tables are selected during connector configuration to enable the continuous transfer of relevant data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 6: Connector config and version needed to connect to 3rd party SIEMs&lt;/img&gt;
&lt;H3&gt;Empower Security Teams to Act Against Threats&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We’ve introduced a powerful new capability that gives security teams greater control and confidence when managing potential risks in Teams. With this feature, security admins can investigate suspicious conversations in Advanced Hunting and instantly &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/teams-message-entity-panel" target="_blank" rel="noopener"&gt;remove internal users&lt;/A&gt; from unsafe chats, revoking their access and clearing all prior chat history to prevent further exposure. This proactive step ensures employees stay protected from threat actors and sensitive information remains secure.&lt;/P&gt;
&lt;P&gt;The experience is streamlined through the &lt;STRONG&gt;Action Wizard&lt;/STRONG&gt;, accessible directly from the Teams entity flyout, making remediation fast and intuitive. Every action is fully traceable in &lt;STRONG&gt;Action Center&lt;/STRONG&gt;, providing a centralized view for monitoring and validating security interventions, while &lt;STRONG&gt;audit logs&lt;/STRONG&gt; deliver records for reporting. These capabilities empower organizations to contain risks in real time, strengthen collaboration security, and maintain trust across their digital workplace.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 7: remove a user from a conversation directly from the defender portal&lt;/img&gt;
&lt;H3&gt;Response capabilities for Security Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In addition to these enhanced detection, investigation and hunting capabilities, security team members are now able to perform advanced response actions for Microsoft Teams directly in the Microsoft Defender portal. Security Operations Center (SOC) analysts and admins can directly block malicious domains from within the &lt;A href="https://security.microsoft.com/tenantAllowBlockList" target="_blank" rel="noopener"&gt;Microsoft Defender portal&lt;/A&gt;, seamlessly adding targeted entries to the Teams Admin Center (TAC) blocked domains list without leaving their security workflows and switching portals. This capability enables near real-time protection when suspicious or abusive external organizations are identified. SOC teams can immediately block suspicious organizations, effectively halting new external chat messages, invites, and channel communications from those domains while deleting existing ones. These controls empower organizations to react to emerging risks in minutes, all while maintaining compliance and reducing operational overhead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 8: Block domains in Teams via TABL&lt;/img&gt;
&lt;H3&gt;Expanding Admin Quarantine and Zero-Hour Auto-Purge (ZAP) to MDO P1&lt;/H3&gt;
&lt;P&gt;We are also extending the power of Zero-hour auto-purge (ZAP) and Teams admin quarantine to even more customers, bringing this post-delivery protection layer to Microsoft Defender for Office 365 Plan 1. This reinforces our commitment to secure-by-default protection across all Microsoft Teams environments.&lt;/P&gt;
&lt;P&gt;ZAP automatically moves malicious messages containing phishing or malware URLs from internal Teams chats and channels to admin quarantine in the Microsoft Defender portal. This post-delivery protection ensures that even if a threat evades initial detection, it can be neutralized before causing harm.&lt;/P&gt;
&lt;P&gt;This capability will be enabled by default for all Microsoft Teams customers with Microsoft Defender for Office Plan 1, providing immediate protection without requiring additional configuration. Security admins maintain full control through the Microsoft Defender portal, where quarantined Teams messages can be reviewed, managed, and released if needed. This expansion ensures more customers benefit from continuous, automated threat removal, strengthening protection across Teams with no extra effort required&lt;/P&gt;
&lt;P&gt;These new protections reflect our commitment to delivering security that scales effortlessly with the way people work today. By combining real-time detection, post-delivery protection, and user-driven feedback loops, we’re giving organizations the tools to stay ahead of emerging threats without slowing down collaboration.&lt;/P&gt;
&lt;P&gt;These capabilities are engineered to operate efficiently in the background, providing assurance and proactive security measures. This enables frontline workers, IT administrators, and SOC analysts to concentrate on their core responsibilities while maintaining a secure working environment.&lt;/P&gt;
&lt;H3&gt;To learn more&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-about" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-about&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-quick-configure" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-quick-configure&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-sec-ops-guide" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-sec-ops-guide&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 14 Jan 2026 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-collaboration-in-microsoft-teams-with-efficient-and/ba-p/4484479</guid>
      <dc:creator>MalvikaBalaraj</dc:creator>
      <dc:date>2026-01-14T17:00:00Z</dc:date>
    </item>
    <item>
      <title>I have absolutely no idea what Microsoft Defender 365 wants me to do here</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-have-absolutely-no-idea-what-microsoft-defender-365-wants-me/m-p/4481993#M1132</link>
      <description>&lt;P&gt;The process starts with an emal:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;There's more below on the email - an offer for credit monitoring, an option to add another device, an option to download the mobile app - but I don't want to do any of the, so I click on the "Open Defender" button, which results in this:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;OK, so my laptop is the bad boy here, there's that Status not of "Action recommended", with no "recommendations" and the only live link here is "Add device", something I don't need to do.&amp;nbsp; The only potential "problem" I can even guess at here is that Microsoft is telling me that the laptop needs updating.&amp;nbsp; Since I seldom use the laptop, only when traveling, I'd guess the next time I'd fire it up the update will occur, but of course I really don't know that's the recommended action it's warning me about, do I?&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'd expect that if something is warning you "ACTION NEEDED!!!" they'd be a little more explicit, wouldn't you?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 15:30:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-have-absolutely-no-idea-what-microsoft-defender-365-wants-me/m-p/4481993#M1132</guid>
      <dc:creator>JustTom</dc:creator>
      <dc:date>2025-12-30T15:30:01Z</dc:date>
    </item>
    <item>
      <title>Tenant Forwarding - Trusted ARC Sealer</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/tenant-forwarding-trusted-arc-sealer/m-p/4478434#M1131</link>
      <description>&lt;P&gt;As part of a tenant to tenant migration we often need to forward mail from one tenant to another. This can cause some issues with email authentication verdicts on the destination tenant. Is it possible or best practice to configure another tenant as a Trusted ARC sealer to help with forwarded email deliverability?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 16:57:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/tenant-forwarding-trusted-arc-sealer/m-p/4478434#M1131</guid>
      <dc:creator>weebles</dc:creator>
      <dc:date>2025-12-16T16:57:00Z</dc:date>
    </item>
    <item>
      <title>Strengthening calendar security through enhanced remediation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/strengthening-calendar-security-through-enhanced-remediation/ba-p/4456876</link>
      <description>&lt;P&gt;In today’s evolving threat landscape, phishing attacks are becoming increasingly sophisticated, often leveraging meeting invites to bypass traditional defenses. While Security Operations (SOC) teams rely on Microsoft Defender’s remediation actions to remove malicious emails, a hidden risk persists: calendar entries created by Outlook during email delivery. These entries can remain active even after the email is deleted, leaving users exposed to harmful content. This update addresses that gap.&lt;/P&gt;
&lt;H4&gt;Remediation supports cleaning up calendar entries&lt;/H4&gt;
&lt;P&gt;SOC teams currently use remediation actions such as &lt;STRONG&gt;Move to Junk&lt;/STRONG&gt;, &lt;STRONG&gt;Delete&lt;/STRONG&gt;, &lt;STRONG&gt;Soft Delete&lt;/STRONG&gt;, and &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; to quickly eliminate email threats from user inboxes. However, meeting invite emails introduce an additional challenge. Even after the email is removed, Outlook automatically creates a calendar entry during delivery, which remains accessible to users.&lt;/P&gt;
&lt;P&gt;For example, consider a phishing email sent as a meeting invite. Despite the admin removing the email from the user’s inbox, the user can still interact with the same malicious content via the calendar entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;This residual entry may contain harmful links or phishing content, creating a security gap. With this update, we’re taking the first step toward closing that gap. &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; will now also remove the associated calendar entry for any meeting invite email. This ensures threats are fully eradicated—not just from the inbox but also from the calendar—reducing the risk of user interaction with malicious content.&lt;/P&gt;
&lt;P&gt;This change applies to &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; actions taken from any surface, including Explorer, Advanced Hunting, and API.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Deleted calendar entries can be restored by resending the meeting invite.&lt;/P&gt;
&lt;P&gt;2) This action does not remove calendar entries manually added by users via .ics files.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;Ability to Block URL domains via submission/TABL actions from Explorer&lt;/H4&gt;
&lt;P&gt;SOC teams can currently add senders and URLs to the TABL block list when submitting false negatives to Microsoft. However, phishing campaigns often use variations of URLs under the same parent domain, making full URL blocking less effective.&lt;/P&gt;
&lt;P&gt;With this update, TABL options for URL domains are now dynamically surfaced, enabling SOC teams to block entire domains without leaving their workflow. This enhancement simplifies remediation and strengthens defenses against domain-based phishing attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;These updates strengthen SOC remediation workflows by closing critical security gaps and ensuring threats are fully neutralized across all user touchpoints. By extending remediation to calendar entries and enabling domain-level URL blocking, we deliver comprehensive protection that reduces risk, streamlines operations, and safeguards user experiences. At Microsoft, our priority is your security, and we remain committed to empowering SOC teams with tools that make defense smarter and more effective.&lt;/P&gt;
&lt;H4&gt;Learn more:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/remediate-malicious-email-delivered-office-365" target="_blank"&gt;Remediate malicious email that was delivered in Office 365 - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/strengthening-calendar-security-through-enhanced-remediation/ba-p/4456876</guid>
      <dc:creator>nithinnara</dc:creator>
      <dc:date>2025-11-24T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Email - Override/Bypass Events</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-override-bypass-events/m-p/4472544#M1129</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;how can i extract the override/bypass informations by using EXO Powershell Module, Advanced Hunting or Graph API? I have searched in cmdlets but no luck.&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 10:39:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-override-bypass-events/m-p/4472544#M1129</guid>
      <dc:creator>mhmmdrn</dc:creator>
      <dc:date>2025-11-24T10:39:23Z</dc:date>
    </item>
    <item>
      <title>Microsoft Ignite 2025: Transforming Phishing Response with Agentic Innovation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</link>
      <description>&lt;P&gt;Phishing attacks remain one of the most persistent and damaging threats to organizations worldwide. Security teams are under constant pressure to investigate a growing number of user reported phishing emails daily, ensuring accurate verdicts and timely responses. As threats grow in volume and sophistication, SOC teams are forced to spend valuable time triaging and investigating, often at the expense of strategic defense and proactive threat hunting.&lt;/P&gt;
&lt;P&gt;At Microsoft Ignite 2025 we are delivering innovation that showcases our continued commitment to infuse AI agents, and agentic workflows into the core of our email security solution and SOC operations to automate repetitive tasks, accelerate investigations, and provide transparent, actionable insights for every reported phishing email. In addition, we continue to invest in our ecosystem partnerships to empower customers with seamless integrations, as they adopt layered security solutions to&amp;nbsp;comply with&amp;nbsp;regulatory requirements, enhance detection, and ensure robust protection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today I’m excited to announce:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;General Availability of the Security Alert Triage Agent&amp;nbsp;&lt;EM&gt;(previously named Phishing Triage Agent)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agentic Email Grading System in Microsoft Defender&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cisco and VIPRE Security Group join the Microsoft Defender ICES ecosystem&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&amp;nbsp;The Phishing Triage Agent has since been expanded and is now called the Security Alert Triage Agent. Learn more at&amp;nbsp;&lt;A href="http://aka.ms/SATA" target="_blank"&gt;aka.ms/SATA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;&lt;STRONG&gt;The Security Alert Triage Agent is now generally available&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In March 2025, we introduced the &lt;A class="lia-external-url" href="https://www.youtube.com/watch?v=lHjkt5V6AZw\" target="_blank"&gt;Security Alert Triage Agent&lt;/A&gt;, designed to autonomously handle user-submitted phishing reports at scale. The agent classifies incoming alerts, resolves false positives, and escalates only the malicious cases that require human expertise. Today, we’re announcing its general availability. We will also be extending the agent to triage alerts for identity and cloud alerts.&lt;/P&gt;
&lt;P&gt;The Security Alert Triage Agent automates repetitive tasks, accelerates investigations, and every decision is transparent, allowing security teams to focus on what matters most—investigating real threats and strengthening the overall security posture. Early results prove how it is transforming analyst work:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identified 6.5X more malicious alerts&lt;/LI&gt;
&lt;LI&gt;Improved verdict accuracy by 77%&lt;/LI&gt;
&lt;LI&gt;Agent supported analysts spent 53% more time investigating real threats&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=Y_hfh1PGvEM/1763429041212" data-video-remote-vid="https://www.youtube.com/watch?v=Y_hfh1PGvEM/1763429041212" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FY_hfh1PGvEM%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DY_hfh1PGvEM&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FY_hfh1PGvEM%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Agentic email grading: Advanced analysis of phishing email submissions&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When customers report suspicious messages to Microsoft, they expect clarity, speed, and actionable insights to protect their environment. They expect a response they can trust, understand easily, and take additional investigation and response action for the organization.&lt;/P&gt;
&lt;P&gt;Previously, when customers reported messages to Microsoft, our response depended largely on manual human grader reviews, creating delays and inconsistent verdicts. Customers often waited several hours for a response, and sometimes it lacked clarity on how a verdict was reached.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce that we integrated an &lt;STRONG&gt;agentic grading system&lt;/STRONG&gt; into the Microsoft Defender submission analysis and response workflow when customers report phishing messages to Microsoft.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Image 2: Agentic Email Grading: Advanced analysis of phishing email submissions&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The agentic grading system brings a new level of speed and transparency to phishing analysis. It uses large language models (LLMs) orchestrated within an agentic workflow to analyze phishing emails, assess the full content of a submitted email, and communicate context and related metadata. This system combines advanced AI with existing machine learning models and human review for additional levels of accuracy and transparency for decision making. Every verdict comes with higher quality, clear verdicts, and context-rich explanations tailored to each phishing email submission. Additionally, it establishes a feedback mechanism that enhances continuous learning and self-healing, thereby strengthening and optimizing protection over time.&lt;/P&gt;
&lt;P&gt;By reducing reliance on manual reviews, users will experience lower wait times, faster responses and higher-quality results. It will enable security teams to respond promptly and act confidently against phishing threats.&lt;/P&gt;
&lt;P&gt;Over time we plan to expand beyond phishing verdicts to include &lt;STRONG&gt;spam, scam, bulk, and clean classifications&lt;/STRONG&gt;, making the process more comprehensive. The system will continue to evolve through feedback and adapt to emerging attack patterns.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;How to view agentic submission responses in Microsoft Defender&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When you report a suspicious email—whether as an admin or an end user—you can now see how Microsoft Defender’s new &lt;STRONG&gt;agentic grading system&lt;/STRONG&gt; evaluates your submission. To view agentic grading system responses, follow the steps below:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Report the suspicious email&lt;/STRONG&gt;&lt;BR /&gt;Submit the email through the admin submission or user-reported submission process.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sign in to Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Go to https://security.microsoft.com.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Navigate to Submissions&lt;/STRONG&gt;&lt;BR /&gt;From the left menu, select:&lt;BR /&gt;Investigation &amp;amp; response &amp;gt; Actions &amp;amp; submissions &amp;gt; Submissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Choose the correct tab&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Emails for admin submissions&lt;/LI&gt;
&lt;LI&gt;User reported for user submissions&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Open the submission details&lt;/STRONG&gt;&lt;BR /&gt;Click the email submission you want to review. A flyout panel will display Result details.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Look for the Agentic AI note&lt;/STRONG&gt;&lt;BR /&gt;If the verdict was generated by Agentic AI, you’ll see:&lt;BR /&gt;&lt;EM&gt;“AI-generated content may be incorrect. Check it for accuracy.”&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Image 3: AI generated explainable verdicts&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Expanding the Integrated Cloud Email Security (ICES) ecosystem&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In June, we introduced the Microsoft Defender &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-the-microsoft-defender-for-office-365-ices-vendor-ecosystem/4424817" target="_blank" rel="noopener"&gt;ICES vendor ecosystem&lt;/A&gt;, a&amp;nbsp;unified framework that enables seamless integration of Microsoft’s Defender’s email security solution with trusted third-party vendors. Today we are excited to announce two new partners: &lt;STRONG&gt;Cisco&lt;/STRONG&gt; and &lt;STRONG&gt;VIPRE Security Group&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The addition of these partners to our ecosystem reinforces our ongoing commitment to support customers in their choice to strategically layer their email security solutions. Organizations benefit from a unified quarantine experience, and a deep integration across the various SOC experiences including threat explorer, advanced hunting, and the email entity page, while providing clear insight into detection efficacy of each solution.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As we continue to innovate, our commitment remains steadfast: empowering defenders with intelligent, transparent, and integrated security solutions that adapt to the evolving threat landscape. By infusing agentic AI into every layer of Microsoft Defender, expanding our ecosystem of trusted partners, and delivering faster, more actionable insights, we’re helping organizations build resilience and stay ahead of attackers. Our strategy is rooted in delivering real value making security simpler, more effective, and adapted to the needs of every customer.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn More:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Want to know what else is new in Microsoft Defender at Ignite 2025 check out the blog &lt;A href="https://aka.ms/DefenderAIIgnite25" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;For info on how to complete &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-admin?view=o365-worldwide" target="_blank" rel="noopener"&gt;admin phish submissions&lt;/A&gt;, please see&lt;/LI&gt;
&lt;LI&gt;For end user reported phish submissions, you need to have it configured for reporting messages to Microsoft. &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-user-reported-messages-custom-mailbox?view=o365-worldwide" target="_blank" rel="noopener"&gt;Set it up today&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join us at Microsoft Ignite&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Join us at Microsoft Ignite to see these advancements in action and discover how intelligent, agentic defense is becoming accessible to every organization. Don’t miss our featured sessions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK239?source=sessions" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;AI vs AI: Protect email and collaboration tools with Microsoft Defender&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;on Thursday, November 20&lt;SUP&gt;th&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/86f5e0a7-8748-4914-a097-cd84ee1a4395" target="_blank" rel="noopener"&gt;Learn More&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender: Building the agentic SOC with guest Allie Mellen&lt;/STRONG&gt; on Wednesday, November 19&lt;SUP&gt;th&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK241?source=sessions" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Empowering the SOC: Security Copilot and the rise of Agentic Defense&lt;/STRONG&gt; on Friday, November 21&lt;SUP&gt;st&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK1731?source=sessions" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2026 23:31:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2026-04-28T23:31:24Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Office 365: Fine-Tuning</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-fine-tuning/ba-p/4469416</link>
      <description>&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;In incident response, most business email compromise&amp;nbsp;doesn’t&amp;nbsp;start with “sophisticated zero-day malware.” It starts with configuration gaps:&amp;nbsp;forwarding&amp;nbsp;mail outside the tenant, users clicking through Safe Links warnings, impersonation policies left at day-one defaults, or post-delivery cleanup still relying on a human analyst at 2:00 AM. Those gaps are what attackers&amp;nbsp;actually exploit.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog covers our top recommendations for fine-tuning Microsoft Defender for Office 365 configuration from hundreds of deployments and recovery engagements:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Core fine-tuning actions every&amp;nbsp;email or security&amp;nbsp;admin should land right now&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Data-driven bulk mail tuning (BCL and Bulk Mail Insights)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Impersonation and anti-phishing policy hygiene for executive protection&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Automate post-delivery cleanup by enabling Automated Remediation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Each section includes a short video and practical guidance you can apply&amp;nbsp;immediately&amp;nbsp;in Microsoft Defender for Office 365.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These recommendations align with Microsoft’s “secure by default” direction: applying the Standard and Strict preset security policies to users, using&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to catch configuration drift, and enforcing least-privilege release of high-risk mail.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When possible, enable&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/preset-security-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Preset security policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to give you Microsoft’s recommended settings for Safe Links, Safe Attachments, Anti-Phishing, and Anti-Spam.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you use custom policies (or if you exclude users from the Presets) then use&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;regularly to&amp;nbsp;compare&amp;nbsp;custom&amp;nbsp;policies to&amp;nbsp;the&amp;nbsp;Standard/Strict baselines,&amp;nbsp;since those get updated as Microsoft updates the Preset policies.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Core Fine-Tuning Checklist for Defender for Office 365&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This section&amp;nbsp;highlights&amp;nbsp;six controls we recommend implementing broadly. These are “day one hardening” items we repeatedly&amp;nbsp;validate&amp;nbsp;with customers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Block automatic external forwarding by default&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;Attackers often create hidden inbox rules that quietly forward mail (invoices, purchase orders, wire info) to an external account they control. Use outbound spam policies to block automatic external forwarding for the entire org and then create tightly scoped exceptions only for the handful of mailboxes that legitimately need it. &lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This prevents data leakage and payment fraud scenarios where mail auto-forwards out of your tenant without anyone noticing. Although this setting is on by default (“System Controlled” means that external forwarding is disabled),&amp;nbsp;we’ve&amp;nbsp;found many tenants where this was disabled because the admin&amp;nbsp;didn’t&amp;nbsp;know how to create a custom policy for authorized forwarders. The trick is to order custom outbound policies to run as a higher priority than the default outbound policy which should be set to block auto-forwarded emails. It is&amp;nbsp;a good idea&amp;nbsp;to regularly review the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;auto forwarded message report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(located in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://admin.exchange.microsoft.com/#/reports/autoforwardedmessages" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Exchange Admin Center&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Use Enhanced Filtering for Connectors (“skip listing”) when necessary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;If you’re routing inbound mail through a third-party Secure Email Gateway or an on-prem hop before Microsoft 365, Defender will see that intermediary as the source IP instead of the original sending IP, which degrades anti-spoofing effectiveness.&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Enhanced Filtering for Connectors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— also called skip listing — lets Microsoft 365 look past that last hop and evaluate the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;real&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; sending IP and headers, so SPF / DKIM / DMARC and anti-spam logic work correctly.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;This setting does not support&amp;nbsp;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/exchange/transport-routing#route-incoming-internet-messages-through-the-exchange-online-organization" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;centralized mail routing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;(unless the routing is linear; see the Enhanced Filtering for Connectors&amp;nbsp;learn&amp;nbsp;article), so make sure you are not using that before enabling Enhanced Filtering.&amp;nbsp;Centralized routing is sometimes used by organizations running a hybrid Exchange deployment, connecting Exchange Online with an on-premises Exchange Server organization.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Do this instead of blanket SCL -1 transport rules that “bypass spam filtering for anything coming from our gateway.” Over-bypassing means phishing that slipped through the third-party filter can sail straight to user inboxes, which Microsoft specifically warns against.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Turn on Safe Attachments protection beyond email (SharePoint, OneDrive, Teams)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;In the Safe Attachments “Global settings,” make sure Defender for Office 365 is set to protect files in SharePoint, OneDrive, and Microsoft Teams. When enabled, if a file is identified as malicious, Defender automatically locks the file in-place&amp;nbsp;so users&amp;nbsp;can’t&amp;nbsp;open it in Teams or OneDrive. This gives you malware detonation and containment in collaboration channels, not&amp;nbsp;just&amp;nbsp;email.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This step closes a gap we still see a lot: customers protect mail attachments well, but shared files and Teams chats are wide open. In the 1&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;st&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;part of this blog series, Microsoft MVP Purav Desai describes (&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) how to prevent users from downloading malicious files by running a SharePoint PowerShell cmdlet:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;Set-SPOTenant&amp;nbsp;-DisallowInfectedFileDownload&amp;nbsp;$true&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Don’t let users click through Safe Links warnings&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links rewrites and time-of-click scans URLs in mail, Office apps, and Teams. In the Safe Links policy, clear “Let users click through to the original URL.” That prevents the classic “I know it says it’s malicious, but I really need to see it…” moment. Users get blocked instead of “warned but allowed.”&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This setting is also enforced in Microsoft’s Standard AND Strict preset security policies where click-through is explicitly disabled.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Go beyond the default Common Attachment filter&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The anti-malware policy’s&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/anti-malware-protection-about#common-attachments-filter-in-anti-malware-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Common Attachment filter&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;blocks known dangerous file extensions (executable content, scriptable content, etc.). Microsoft ships a default list (historically 50+ high-risk extensions), and you can customize it to block&amp;nbsp;additional&amp;nbsp;file types common in malware delivery, like HTML droppers or password-protected archives. Messages with those file types are treated as malware and quarantined.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Do this centrally rather than relying on users to “spot a suspicious attachment.” Automation beats user judgment here.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Use custom quarantine policies that require admin approval (instead of self-release)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;If you are not using the Preset Policies, you can create a &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/quarantine-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;quarantine policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to customize the user experience with quarantined messages. For anything phishing-related, I recommend creating a custom policy that allows the user to “request release from admin.” That means users can raise a hand if they think something should not have been quarantined, and an Incident is created for administrators to review before it is released. To me, this strikes the best balance between security and productivity.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This keeps containment intact and gives the SOC final say. It also creates an auditable workflow: who asked for release, who approved it, and why.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/Kcp1GKVdSbM?si=yg9GEtLkndn3ET1e/1763049724683" data-video-remote-vid="https://youtu.be/Kcp1GKVdSbM?si=yg9GEtLkndn3ET1e/1763049724683" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FKcp1GKVdSbM%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DKcp1GKVdSbM&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKcp1GKVdSbM%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Bulk Mail Insights: Tune BCL using your tenant’s mail&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Bulk email (“graymail”) is noisy. Payroll alerts and&amp;nbsp;benefits&amp;nbsp;notifications are legitimate, but they look exactly like phishing. At the same time, true marketing email (graymail)&amp;nbsp;are&amp;nbsp;also&amp;nbsp;bulk. The traditional response (“just whitelist the sender so users stop complaining”) often opens the door for attacker-looking mail to get delivered straight to executives.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Defender for Office 365 gives you something better: Bulk Mail Insights (a.k.a.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/anti-spam-bulk-senders-insight" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Bulk senders insight&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;). This report shows, over the last&amp;nbsp;60 days, how much mail at each Bulk Complaint Level (BCL 1–9) was delivered vs. blocked, which senders are generating volume, and where users are likely to experience false positives or false negatives. You can interactively simulate raising or lowering the bulk threshold and&amp;nbsp;immediately&amp;nbsp;see, “If we tighten BCL, how many more messages get quarantined? How many of those were&amp;nbsp;probably junk? How many were&amp;nbsp;probably wanted?”&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You stop tuning bulk mail based on anecdotes and start tuning based on real telemetry from your own tenant.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can justify decisions to leadership and audit (“We set BCL at X because here is the simulation showing false positive/false negative impact”).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You avoid blanket allow rules. Instead, you adjust bulk thresholds for legitimate high-volume senders while keeping stricter actions for everyone else.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Note: You can&amp;nbsp;modify&amp;nbsp;the BCL threshold in your default or custom anti-spam policy, but you&amp;nbsp;can’t&amp;nbsp;change it inside the&amp;nbsp;Standard&amp;nbsp;(BCL:6)&amp;nbsp;or Strict&amp;nbsp;(BCL:5)&amp;nbsp;preset security policies themselves. Standard and Strict are already aligned to Microsoft’s recommended baselines.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/EU5jOce49EI?si=J6ZwTJ4lioAffDMX/1763049834960" data-video-remote-vid="https://youtu.be/EU5jOce49EI?si=J6ZwTJ4lioAffDMX/1763049834960" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FEU5jOce49EI%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DEU5jOce49EI&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FEU5jOce49EI%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Additional Links:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/senderinsights" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://security.microsoft.com/senderinsights&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-senders-insight" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-senders-insight&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-deployment-guide#step-2-configure-threat-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/mdo-deployment-guide#step-2-configure-threat-policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/recommended-settings-for-eop-and-office365" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/recommended-settings-for-eop-and-office365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Anti-Phishing / Impersonation Tuning: Protect the people attackers&amp;nbsp;actually spoof&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Business email compromise very often looks like this: “Hi, can you handle this payment today?” sent from an address that looks like your CFO or CEO. Microsoft Defender for Office 365 includes targeted impersonation protection, but it only really works if you target your most targeted executives.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here are five pitfalls we see&amp;nbsp;over and over:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Empty or stale VIP list&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Populate “users to protect / high value targets” with executives, finance approvers, legal, anyone authorized to move money or data. Review it monthly. Roles change, and you only get a finite number of protected users (for example, ~350 entries). An out-of-date list silently weakens protection for the people attackers&amp;nbsp;actually impersonate.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Phishing email threshold stuck at 1 forever&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;We find organizations that are not using the preset policies have left their phishing threshold values at the default “1” because of initial false positives. We recommend raising it to match the Standard Preset (“3”) or Strict (“4”).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Weak action&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;If suspicious “CFO” mail just goes to Junk, users can still act on it. High-confidence impersonation of executives should be quarantined with&amp;nbsp;AdminOnly&amp;nbsp;or request-release workflows, not left in end-user control. Tie this back to the custom quarantine policies&amp;nbsp;(discussed later in this article).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Common-name overload&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;If your CEO’s name is something extremely common,&amp;nbsp;you’ll&amp;nbsp;get noise. Expect it.&amp;nbsp;Don’t&amp;nbsp;“turn off” protection for that name —&amp;nbsp;add that address to the Trusted Senders otherwise it will be blocked as an impersonation attempt. Use Trusted Senders / Trusted Domains for known-good partners and vendors so you keep protection high without drowning in alerts.&amp;nbsp;Add only legitimate senders/domains to the Trusted Senders or Trusted Domains instead of lowering enforcement.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;No scheduled review&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This control&amp;nbsp;can’t&amp;nbsp;be “set and forget.” Put impersonation tuning and spoof intelligence review on a monthly checklist. That lets you catch new vendors pretending to be finance, new “urgent wire” lure patterns, and any drift from Standard / Strict baseline that&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; will also call out.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;When done right, impersonation protection is not just “spam reduction.” It’s payment fraud prevention.&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;div data-video-id="https://youtu.be/7ydzG5_CceQ?si=WaNMXfRlaxJon6x0/1763049868383" data-video-remote-vid="https://youtu.be/7ydzG5_CceQ?si=WaNMXfRlaxJon6x0/1763049868383" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F7ydzG5_CceQ&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7ydzG5_CceQ&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2F7ydzG5_CceQ%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3 aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Automated Investigation &amp;amp; Response (AIR): Let Defender&amp;nbsp;remove malicious&amp;nbsp;email before your SOC has to!&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;One of the biggest wins you can land quickly is letting Microsoft Defender for Office 365&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/air-auto-remediation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;automatically remove clusters of malicious messages&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— without waiting for analyst approval on every single item.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here’s how it works. Defender’s&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/air-about" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Automated Investigation and Response (AIR)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;groups messages into “clusters” based on shared indicators like the same malicious URL or malicious file hash. If you opt in to automatic remediation for those cluster types, AIR will go find every matching copy of that threat across the tenant and soft-delete those messages, not just the one that triggered the alert.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It turns post-delivery cleanup into something that happens immediately instead of “after Tier 1 has time to review.”&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It removes known-bad messages from user mailboxes (and related collaboration surfaces like Teams) before a target can click.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It dramatically cuts the classic “Did anyone else get this?” manual hunt-and-purge work that burns out SOC analysts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When you configure AIR automation settings in the Microsoft Defender portal (Settings &amp;gt; Email &amp;amp; collaboration &amp;gt; MDO automation settings), you’ll see checkboxes for “Similar files” and “Similar URLs.” Selecting those opts you into automatic soft delete for those clusters. Today, soft delete is the default supported action for these automatic remediations, enabling administrators to undo a deletion, if necessary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is Defender for Office 365 Plan 2 / Microsoft 365 E5 functionality, and it’s exactly the kind of “secure operations by default” Microsoft has been pushing: detect, contain, and clean up automatically, then let humans investigate with context instead of manually chasing every copy of a phish.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This automation triggers when malicious clusters are detected.&amp;nbsp;For&amp;nbsp;automating the&amp;nbsp;classification&amp;nbsp;and triage of&amp;nbsp;user-submitted phishing incidents, check out the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/phishing-triage-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot Phishing Triage Agent (&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Preview)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/CvafayjGR-I?si=a0yj1_w3fQzz6xRJ/1763049893316" data-video-remote-vid="https://youtu.be/CvafayjGR-I?si=a0yj1_w3fQzz6xRJ/1763049893316" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FCvafayjGR-I%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCvafayjGR-I&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCvafayjGR-I%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Additional Links:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;GA Announcement:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/-/auto-remediation-of-malicious-messages-in-automated/4418047" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://techcommunity.microsoft.com/blog/-/auto-remediation-of-malicious-messages-in-automated/4418047&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Docs:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/air-auto-remediation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/air-auto-remediation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Final Thoughts&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Defender for Office 365 is more than “email filtering.” It’s part of your security operations surface. The decisions you make about automated remediation (AIR), bulk mail thresholds, Safe Links/Attachment&amp;nbsp;behavior, outbound forwarding, connector hygiene, quarantine policy, and impersonation tuning directly determine how easy — or how hard — it is for an attacker to&amp;nbsp;penetrate&amp;nbsp;your organization.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s current guidance is clear:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Apply Standard or Strict preset security policies so users get&amp;nbsp;the&amp;nbsp;recommended&amp;nbsp;protections by default (for example, Safe Links with no click-through).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;If you must use a custom policy,&amp;nbsp;review the recommendations from the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;monthly&amp;nbsp;for new recommendations, or&amp;nbsp;to catch and correct drift whenever someone weakens a control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Align internal procedures with the excellent&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-sec-ops-guide?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Operations Guide for Defender for Office 365.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Lock down quarantine so only admins can release high-risk messages, with an auditable “request release” path for users.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Turn on automated remediation so Defender can remove malicious clusters of messages before anyone clicks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Organizations that land these basics are in a dramatically better position during an incident. Instead of “Who clicked the link?” you can say, “AIR already pulled it, users were blocked from clicking through, outbound forwarding is disabled, and impersonation of the CFO is quarantined for admin review.” That’s what “secure by default” actually looks like in production.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;________&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This blog was authored by &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://mvp.microsoft.com/en-US/MVP/profile/f9cb9fdd-37e8-ea11-a814-000d3a8dfe0d" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;Joe Stocker&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, Microsoft Security MVP and Founder of Patriot Consulting Technology Group, in partnership with the Microsoft Defender for Office 365 product team, including&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Paul Newell&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Senior Product Manager, Microsoft Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-image-alt=""&gt;Joe Stocker&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;Microsoft Security MVP&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn More and Meet the Author&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt;&amp;nbsp;by the esteemed Microsoft Most Valuable Professionals (MVPs). Now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real-world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit&amp;nbsp;&lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat!&amp;nbsp;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt;&amp;nbsp;for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Additional MVP Tips and Tricks Blogs and Videos in this Four-Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365: Migration &amp;amp; Onboarding" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Migration &amp;amp; Onboarding &lt;/A&gt;by Purav Desai&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" target="_blank" rel="noopener" data-lia-auto-title="Safeguarding Microsoft Teams with Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;Safeguarding Microsoft Teams with Microsoft Defender for Office 365 &lt;/A&gt;by Pierre Thoor&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365&lt;/A&gt; by Mona Ghadiri&lt;/LI&gt;
&lt;LI&gt;(&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416" target="_blank" rel="noopener" data-lia-auto-title="This" data-lia-auto-title-active="0"&gt;This&lt;/A&gt; post) "Microsoft Defender for Office 365: Fine-Tuning" by Joe Stocker&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 19 Nov 2025 20:52:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-fine-tuning/ba-p/4469416</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-19T20:52:09Z</dc:date>
    </item>
    <item>
      <title>You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/you-may-be-right-after-all-disputing-submission-responses-in/ba-p/4467151</link>
      <description>&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG class="lia-align-left"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN class="lia-text-color-15"&gt;Introduction&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG class="lia-align-left"&gt;As a&amp;nbsp;&lt;A class="lia-external-url" href="https://mvp.microsoft.com/mvp" target="_blank" rel="noopener"&gt;Microsoft MVP (Most Valuable Professional)&lt;/A&gt; specializing in SIEM, XDR, and Cloud Security,&lt;/STRONG&gt; I have witnessed the rapid evolution of cybersecurity technologies, especially those designed to protect organizations from sophisticated threats targeting email and collaboration tools. Microsoft Defender for Office 365 introduced an LLM-based engine to help better &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/submissions-response-using-ai-for-enhanced-result-explainability/4423843" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;classify&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;phishing emails that, these days, are mostly written using AI anyways about a year ago. Today,&amp;nbsp;I'm&amp;nbsp;excited to spotlight a new place AI has been inserted into a workflow to make it better…a feature that elevates the transparency and responsiveness of threat management: the ability to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-admin" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;dispute a submission response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; directly within Microsoft Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Understanding the Challenge &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;While the automated and human-driven analyses are robust in Defender for Office 365, there are occasions where the response—be it a verdict of "benign" or "malicious"— doesn’t fully align with the security team's context or threat intelligence. If you are a Microsoft 365 organization with Exchange Online mailboxes, you’re probably familiar with how admins can use the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Submissions&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;page in the Microsoft Defender portal to&amp;nbsp;submit&amp;nbsp;messages, URLs, and attachments to Microsoft for analysis. &lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;As a recent enhancement, now all the &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/submissions-response-using-ai-for-enhanced-result-explainability/4423843" target="_blank" rel="noopener"&gt;admin submissions use LLM based response&lt;/A&gt; for better explainability.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;In the past, disputing such verdicts required separate support channels, using Community support, or manual email processes, often delaying resolution and impacting the speed of cyber operations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN class="lia-text-color-15"&gt;Introducing the Dispute Submission Response Feature &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;With the new dispute submission response feature, Microsoft Defender for Office 365 bridges a critical gap in the incident response workflow. Now, when a security analyst or administrator receives a verdict on a submitted item, they have the option to dispute the response directly within the Microsoft 365 Defender portal. This feature streamlines feedback, allowing teams to quickly flag disagreements and provide additional context for review at the speed of operations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;How It Works &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Upon submission of a suspicious item, Microsoft Defender for Office 365 provides a response indicating its assessment—malicious, benign, or other categorizations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;If the security team disagrees with the verdict, they can select the "Dispute" option and submit their rationale, including supporting evidence and threat intelligence. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;The disputed case is escalated directly to Microsoft’s threat research team for further review, and the team is notified of progress and outcomes. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This direct feedback loop not only empowers security teams to advocate for their organization's unique context, but also enables Microsoft to continually refine detection algorithms and verdict accuracy based on real-world input, because security is a team sport.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Benefits for Security Operations &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Faster Resolution&lt;/STRONG&gt;: Streamlined dispute submission&amp;nbsp;eliminates&amp;nbsp;the need for external support tickets and escalations, reducing turnaround time for critical cases. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Greater Transparency&lt;/STRONG&gt;: The feature fosters a collaborative relationship between customers and Microsoft, ensuring that verdicts are not final judgments but points in an ongoing dialogue. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Continuous Improvement&lt;/STRONG&gt;: Feedback from disputes enhances Microsoft’s threat intelligence and improves detection for all Defender for Office 365 users. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Empowerment&lt;/STRONG&gt;: Security teams gain a stronger voice in the protection of their environment, reinforcing trust in automated defenses. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;div data-video-id="https://youtu.be/RebmuifVfPA?si=CFzIjqPEcSdea-j2/1762462354864" data-video-remote-vid="https://youtu.be/RebmuifVfPA?si=CFzIjqPEcSdea-j2/1762462354864" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FRebmuifVfPA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DRebmuifVfPA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FRebmuifVfPA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5 class="lia-align-left"&gt;&lt;SPAN class="lia-text-color-15"&gt;MVP Insights: Real-World Impact &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Having worked with global enterprises,&amp;nbsp;I’ve&amp;nbsp;seen how nuanced and context-specific threats can be. Sometimes, what appears benign to one organization may be a targeted attack for another, a&amp;nbsp;slight modification to a URL may catch one email, but not others, as slight changes are made as billions of emails are sent. We are only as good as the consortium. The ability to dispute submission responses creates a vital safety net, ensuring that security teams are not forced to accept verdicts that could expose them to risk.&amp;nbsp;It’s&amp;nbsp;a welcome step toward adaptive, user-driven security operations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Conclusion &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;The dispute submission response feature in Microsoft Defender for Office 365 is one of the most exciting features for me, because it focuses on enabling organizations striving for agility and accuracy in threat management. By enabling direct, contextual feedback, Microsoft empowers security teams to play an active role in shaping their defenses. As an MVP, I encourage all users to leverage this feature, provide detailed feedback, and help drive the future of secure collaboration in the cloud. You may be right after all.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;_________&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;This blog has been generously and expertly authored by Microsoft Security MVP, &lt;A href="https://mvp.microsoft.com/en-US/MVP/profile/9126849d-1cb4-ed11-b596-000d3a1ad36b" target="_blank" rel="noopener"&gt;Mona Ghadiri&lt;/A&gt;&amp;nbsp;with support of the Microsoft Defender for Office 365 product team.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-image-alt=""&gt;Mona Ghadiri&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;Microsoft Security MVP&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 class="lia-align-left"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;SPAN class="lia-text-color-20"&gt;Learn More and Meet the Author&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks &lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt; by the esteemed Microsoft Most Valuable Professionals (MVPs). Now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real-world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit &lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat! &lt;A class="lia-external-url" href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt; for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;2) Additional MVP Tips and Tricks Blogs and Videos in this Four-Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;1.&amp;nbsp; &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365: Migration &amp;amp; Onboarding" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Migration &amp;amp; Onboarding&lt;/A&gt; by Purav Desai&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2. &amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" target="_blank" rel="noopener" data-lia-auto-title="Safeguarding Microsoft Teams with Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;Safeguarding Microsoft Teams with Microsoft Defender for Office 365&lt;/A&gt; by Pierre Thoor&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;3. (&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="This" data-lia-auto-title-active="0"&gt;This&lt;/A&gt; blog post) You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365 by Mona Ghadiri&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;4. &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416?previewMessage=true" target="_blank" rel="noopener" data-lia-auto-title=" Microsoft Defender for Office 365: Fine-Tuning | Real-world Defender for Office 365 tuning that closes real attack paths " data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Fine-Tuning | Real-world Defender for Office 365 tuning that closes real attack paths &lt;/A&gt;by Joe Stocker&lt;/P&gt;
&lt;H4&gt;&lt;SPAN style="color: #34495e;"&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 19 Nov 2025 14:59:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/you-may-be-right-after-all-disputing-submission-responses-in/ba-p/4467151</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-19T14:59:01Z</dc:date>
    </item>
    <item>
      <title>Ensure your ICES solution works seamlessly alongside Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/ensure-your-ices-solution-works-seamlessly-alongside-microsoft/ba-p/4466691</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today’s evolving threat landscape, organizations increasingly rely on layered email security solutions to protect users and sensitive data. Microsoft supports and collaborates with Integrated Cloud Email Security (ICES) vendors that work in conjunction with Microsoft Defender, and customers who choose a layered approach to email security to ensure the maximum level of email protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;It is, however, key that when integrating ICES solutions with Microsoft Defender, to follow best practices to maximize security and operational efficiency. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog, we explain these best practices in more detail and outline three other routing techniques commonly used across ICES vendors. This will allow organizations to understand the impact of non-standard mail routing configurations on their security operations (SOC) effectiveness and partner with their ICES vendors on the best approach.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Best&amp;nbsp;practices&amp;nbsp;for ICES&amp;nbsp;vendor&amp;nbsp;integration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has outlined best practices for third-party solutions integrating with Microsoft 365, where recommended and supported approaches include DNS mail routing or the Graph API.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;This article&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;provides more details on&amp;nbsp;these&amp;nbsp;approaches and&amp;nbsp;also outlines&amp;nbsp;integration&amp;nbsp;techniques&amp;nbsp;that we do not recommend.&amp;nbsp;By using these best practices, any&amp;nbsp;3&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;party&amp;nbsp;email&amp;nbsp;security&amp;nbsp;vendor&amp;nbsp;can ensure that their solution works seamlessly alongside Microsoft&amp;nbsp;Defender.&amp;nbsp;In addition, we recently&amp;nbsp;launched&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-ices-vendor-ecosystem" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender ICES vendor ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. This gives partners an additional&amp;nbsp;option&amp;nbsp;for integration, where we partner directly with&amp;nbsp;the&amp;nbsp;solution provider&amp;nbsp;to build a deeper&amp;nbsp;integration between the ICES solution and Microsoft Defender.&amp;nbsp;We&amp;nbsp;harmonize telemetry, email verdicts, security policies, and more,&amp;nbsp;to&amp;nbsp;provide&amp;nbsp;joint customers with optimized&amp;nbsp;protection and SOC workflows&amp;nbsp;in the Defender portal.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Non-standard email routing&amp;nbsp;techniques&amp;nbsp;used by ICES&amp;nbsp;vendors&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We know that as the ICES space evolved, several vendors integrated with Microsoft Exchange using non-standard email routing techniques, such as journaling, connector-based routing, and post-delivery actions. These functions were originally designed for different purposes. When deployed alongside Microsoft Defender, these integration approaches can introduce unique complexities for mail flow and SOC operations. Understanding how these techniques work and their potential impact is essential for making informed decisions about your organization’s email security architecture and are outlined below.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Journaling for email security benchmarking&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/security-and-compliance/journaling/journaling" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Email journaling&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(Figure 1) is&amp;nbsp;a legacy Exchange Online feature originally designed for archiving and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;to help&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;organizations meet legal, regulatory, and organizational compliance requirements by recording inbound and outbound email communications.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;While journaling was designed for archiving and similar use cases, we know that various ICES vendors utilize journaling rules to route emails to the vendor’s test environment to evaluate the effectiveness of their solution.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Journaling occurs before Defender filtering, so both solutions act&amp;nbsp;independently and partially, complicating operational clarity for SOC teams.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This approach&amp;nbsp;can lead to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;duplicate catch scenarios&lt;/EM&gt;,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;therefore misstating the unique catch rate of&amp;nbsp;the ICES vendor&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;If a journaled copy of a phishing email is routed to an ICES vendor, this occurs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;before it was filtered by Microsoft Defender&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Consequently, both Microsoft Defender and the ICES vendor now simultaneously assess the message, and both solutions may act on it independently. This often results in duplicate catch&amp;nbsp;scenarios&amp;nbsp;and creates ambiguity around which solution blocked the threat, ultimately making it challenging to assess the true&amp;nbsp;effectiveness of each layer. Some ICES vendors may consider every email they filter “a&amp;nbsp;miss by Microsoft Defender”. However, as journaling occurs before Defender&amp;nbsp;filtering, it’s generally an incomplete representation.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Therefore, we do not recommend the implementation of journaling for benchmarking or operational clarity purposes of ICES vendor solutions that operate next to Microsoft Defender.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Journaling + post-delivery actions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Some vendors combine journaling with post-delivery actions via Graph API or&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/client-developer/exchange-web-services/ews-applications-and-the-exchange-architecture" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Exchange Web Services&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(EWS). This approach enables them to take remediation actions on emails after they have been delivered to users’ mailboxes, such as moving messages to the Junk folder or adding labels to alert users of potential threats. However, if Defender quarantines a message first, the ICES vendor may not be able to perform these actions, limiting their impact. Furthermore, when a vendor deletes and recreates a message using EWS, it can result in duplicate message IDs, which fragments SOC visibility and slows incident response. As a result, these configurations should be avoided, as they can lead to unreliable investigations and operational complexity.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Connector-based implementations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Connectors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;are typically used to route mail between Exchange Online and on-premises or non-Microsoft systems. Some vendors repurpose this mechanism to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Route&amp;nbsp;messages out of Exchange Online after Microsoft Defender filtering.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Apply their own filtering.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reinject the message as a new email.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Using connectors to send messages out of Exchange Online after Microsoft Defender filtering, apply additional vendor filtering, and then return them as new emails introduces major&amp;nbsp;operational risks.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Reinjecting messages strips the original sender authentication context (SPF, DKIM, DMARC), which can lead to false positives, duplicate quarantines, and inconsistent reporting across tools like Explorer, Advanced Hunting, and Message Trace in Microsoft Defender. With this configuration, SOC teams may&amp;nbsp;see multiple message IDs for the same email, making it difficult to correlate events and accurately track message disposition.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;This also impacts post-delivery protections such as&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/zero-hour-auto-purge" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Zero-hour Auto Purge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, which may fail or be misapplied. These issues increase investigation time, reduce visibility, and can undermine existing protections, impacting the overall security of an&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;organization.&amp;nbsp;That’s why&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service#integration-via-in-and-out-mail-routing" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;documentation states that we strongly recommend avoiding this configuration.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When assessing statistics or performance claims about Microsoft Defender’s effectiveness, it’s important to keep in mind how deployment configurations can shape outcomes. As outlined above, techniques such as journaling, connector-based routing, and post-delivery actions may introduce complexities that affect how performance is measured. These integration approaches can result in discrepancies within metrics, making it challenging to accurately attribute detections or gauge overall effectiveness. It is essential for security leaders and SOC teams to interpret results and make informed decisions about your organization’s email security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s&amp;nbsp;commitment to&amp;nbsp;effective ICES&amp;nbsp;vendor&amp;nbsp;integration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By understanding the impact of&amp;nbsp;the various&amp;nbsp;integration techniques, security leaders can ensure their layered email security delivers&amp;nbsp;streamlined SOC workflows&amp;nbsp;and the highest level of protection for email.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft is committed to working collaboratively&amp;nbsp;with all&amp;nbsp;ICES vendors&amp;nbsp;to help&amp;nbsp;them&amp;nbsp;embrace best&amp;nbsp;practices&amp;nbsp;in integrating with Microsoft Exchange so they can work effectively alongside Microsoft Defender.&amp;nbsp;Whether using the&amp;nbsp;documented&amp;nbsp;best&amp;nbsp;practices&amp;nbsp;with&amp;nbsp;Microsoft&amp;nbsp;Exchange&amp;nbsp;or&amp;nbsp;joining&amp;nbsp;the Defender&amp;nbsp;ecosystem&amp;nbsp;to build an even deeper integration,&amp;nbsp;either approach will help ensure that&amp;nbsp;the&amp;nbsp;solutions&amp;nbsp;work seamlessly alongside Microsoft&amp;nbsp;Defender.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Learn more&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="0" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Integration best practices&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-ices-vendor-ecosystem" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender ICES vendor ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Email security effectiveness benchmarking&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 06 Nov 2025 04:36:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/ensure-your-ices-solution-works-seamlessly-alongside-microsoft/ba-p/4466691</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2025-11-06T04:36:32Z</dc:date>
    </item>
  </channel>
</rss>

