<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Office 365 topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/bd-p/MicrosoftDefenderforOffice365</link>
    <description>Microsoft Defender for Office 365 topics</description>
    <pubDate>Fri, 10 Apr 2026 10:29:33 GMT</pubDate>
    <dc:creator>MicrosoftDefenderforOffice365</dc:creator>
    <dc:date>2026-04-10T10:29:33Z</dc:date>
    <item>
      <title>Do XDR Alerts cover the same alerts available in Alert Policies?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/do-xdr-alerts-cover-the-same-alerts-available-in-alert-policies/m-p/4508139#M1144</link>
      <description>&lt;P&gt;The alerts in question are the 'User requested to release a quarantined message', 'User clicked a malicious link', etc. About 8 of these we send to 'email address removed for privacy reasons'. That administrator account has an EOM license, so Outlook rules can be set. We set rules to forward those 8 alerts to our 'email address removed for privacy reasons' address. This is, very specifically, so the alert passes through the @tenant.com address, and our ticketing endpoint knows what tenant sent it. But this ISN'T ideal because it requires an EOP license (or similar - this actually hasn't been an issue until now just because of our customer environments). I've looked at the following alternatives: -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Setting email address removed for privacy reasons as the recipient directly on the Alert Policies in question. This results in the mail going directly from &lt;a href="javascript:void(0)" data-lia-user-mentions="" data-lia-user-uid="2865264" data-lia-user-login="microsoft" class="lia-mention lia-mention-user"&gt;microsoft&lt;/a&gt; to our Ticketing Portal - so it ends up sorted into Microsoft tickets. and the right team doesn't get it.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;SMTP Forwarding via either Exchange AC User controls or Mail Flow Rules. But these aren't traditional forwarding, and they have the same issue as above.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Making administrator @tenant.com a SHARED mailbox that we can also login to (for administration purposes). But this doesn't allow you to set Outlook rules (or even login to Outlook).&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I've checked out the newer alerts under Defender's Settings panel - XDR alerts, I think they're called. Wondering if these can be leveraged at all for this? Essentially, trying to get these Alerts to come to our external ticketing address, from the tenants domain (instead of Microsoft). I could probably update Autotask's rules to check for a header, and set that header via Mail Flow rules, but.. just hoping I don't have to do that for everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 18:43:55 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/do-xdr-alerts-cover-the-same-alerts-available-in-alert-policies/m-p/4508139#M1144</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-02T18:43:55Z</dc:date>
    </item>
    <item>
      <title>Impersonation Protection: Users to Protect should also be Trusted Senders</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/impersonation-protection-users-to-protect-should-also-be-trusted/m-p/4508138#M1143</link>
      <description>&lt;P&gt;Hey all, sort of a weird question here. Teaching my staff about Impersonation Protection, and it's kind of occurred to me that any external sender added to 'Senders to Protect' sort of implicitly should also be a 'Trusted Sender'. Example - we're an MSP, and we want our Help Desk (email address removed for privacy reasons) to be protected from impersonation. Specifically, we want to protect the 'Help Desk' name.&amp;nbsp; So we add email address removed for privacy reasons to Senders to protect. However, we ALSO want to make sure our emails come thru. So we've ALSO had to add email address removed for privacy reasons to Trusted Senders on other tenants.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Chats with Copilot have sort of given me an understanding that this is essentially a 'which is more usefuI' scenario. But CoPilot makes things up, and I want some human input.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In theory, ANYONE we add to 'trusted senders' we ALSO want protected from Impersonation. Anyone we protect from Impersonation we ALSO want to trust. Copilot says you SHOULDN'T do both.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Which is better / more practical?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 18:30:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/impersonation-protection-users-to-protect-should-also-be-trusted/m-p/4508138#M1143</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2026-04-02T18:30:38Z</dc:date>
    </item>
    <item>
      <title>I would like to know the complete list of alerts whose serviceSource is MDO</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-would-like-to-know-the-complete-list-of-alerts-whose/m-p/4507270#M1142</link>
      <description>&lt;P&gt;Hi all&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In order to determine the alerts that should be monitored by the SOC, I would like to identify, from the alerts listed at the link below, those whose serviceSource is Microsoft Defender for Office 365 (MDO).&lt;/P&gt;&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/alert-policies" target="_blank"&gt;Alert policies in the Microsoft Defender portal - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I couldn’t find where this is documented, no matter how thoroughly I searched, so I would appreciate it if you could point me to the relevant documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 12:14:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-would-like-to-know-the-complete-list-of-alerts-whose/m-p/4507270#M1142</guid>
      <dc:creator>Kota2</dc:creator>
      <dc:date>2026-03-31T12:14:37Z</dc:date>
    </item>
    <item>
      <title>I have absolutely no idea what Microsoft Defender 365 wants me to do here</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-have-absolutely-no-idea-what-microsoft-defender-365-wants-me/m-p/4481993#M1132</link>
      <description>&lt;P&gt;The process starts with an emal:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;There's more below on the email - an offer for credit monitoring, an option to add another device, an option to download the mobile app - but I don't want to do any of the, so I click on the "Open Defender" button, which results in this:&lt;/P&gt;&lt;img /&gt;&lt;P&gt;OK, so my laptop is the bad boy here, there's that Status not of "Action recommended", with no "recommendations" and the only live link here is "Add device", something I don't need to do.&amp;nbsp; The only potential "problem" I can even guess at here is that Microsoft is telling me that the laptop needs updating.&amp;nbsp; Since I seldom use the laptop, only when traveling, I'd guess the next time I'd fire it up the update will occur, but of course I really don't know that's the recommended action it's warning me about, do I?&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'd expect that if something is warning you "ACTION NEEDED!!!" they'd be a little more explicit, wouldn't you?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Dec 2025 15:30:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/i-have-absolutely-no-idea-what-microsoft-defender-365-wants-me/m-p/4481993#M1132</guid>
      <dc:creator>JustTom</dc:creator>
      <dc:date>2025-12-30T15:30:01Z</dc:date>
    </item>
    <item>
      <title>Tenant Forwarding - Trusted ARC Sealer</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/tenant-forwarding-trusted-arc-sealer/m-p/4478434#M1131</link>
      <description>&lt;P&gt;As part of a tenant to tenant migration we often need to forward mail from one tenant to another. This can cause some issues with email authentication verdicts on the destination tenant. Is it possible or best practice to configure another tenant as a Trusted ARC sealer to help with forwarded email deliverability?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 16:57:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/tenant-forwarding-trusted-arc-sealer/m-p/4478434#M1131</guid>
      <dc:creator>weebles</dc:creator>
      <dc:date>2025-12-16T16:57:00Z</dc:date>
    </item>
    <item>
      <title>Email - Override/Bypass Events</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-override-bypass-events/m-p/4472544#M1129</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;how can i extract the override/bypass informations by using EXO Powershell Module, Advanced Hunting or Graph API? I have searched in cmdlets but no luck.&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 10:39:23 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/email-override-bypass-events/m-p/4472544#M1129</guid>
      <dc:creator>mhmmdrn</dc:creator>
      <dc:date>2025-11-24T10:39:23Z</dc:date>
    </item>
    <item>
      <title>License question</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/license-question/m-p/4465971#M1127</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I've read, if I have 10 licensed (Defender for Office 365) users, each with their own mailbox and an additional shared mailbox connected, I only need to license those 10 users (the shared mailbox doesn't need to be licensed additionally). However, I don't see such a provision in the licensing agreements themselves. If I understand this correctly, can someone point me to the relevant clause in the agreement?&lt;/P&gt;&lt;P&gt;Does a shared mailbox that no one uses require a Defender license (if the organization uses Defender for Office 365 licenses)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thx.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 13:27:48 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/license-question/m-p/4465971#M1127</guid>
      <dc:creator>rafalbartczak</dc:creator>
      <dc:date>2025-10-31T13:27:48Z</dc:date>
    </item>
    <item>
      <title>Secure Score rec. out of date - Entra consent settings</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-score-rec-out-of-date-entra-consent-settings/m-p/4462376#M1125</link>
      <description>&lt;P&gt;TLDR: 1. SecureScore recommendation for user consent settings does not match the User Consent settings recommendation. 2. Also, the recommendation on User Consent page is not described in a sensible way.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This recommendation - Ensure user consent to apps accessing company data on their behalf is not allowed - instructs people to set the Consent Settings to 'Allow users to consent to low-level permissions', and select the low-level permissions. Optionally, to also set up admin workflow. This is the SecureScore recommended process we've been using. It &lt;STRONG&gt;was&lt;/STRONG&gt; bugged, so we'd set it to 'Resolved by ____' usually once completed. It looks like this is fixed and now properly shows Completed (from testing, the manual resolve statuses aren't overwritten by the automatic completion - it'll wait until those are set to something else to update it to completed. Anyway,, that's not the issue.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Recently noticed on the actual Consent blade, it shows that the recommendation is Microsoft-managed. I've never noticed this before - i believe it's new. So now it's kinda unclear what's ACTUALLY recommended. Reading the associated KB, it is described currently as 'end users can consent for any user consentable delegated permissions EXCEPT: Files.Read.All, Files.ReadWrite.All, Sites.Read.All, Sites.ReadWrite.All.'&lt;STRONG&gt;. But it doesn't actually describe what are 'user consentable' is&lt;/STRONG&gt;... is that whatever 'low impact' permissions you set? is it something completely different?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So the options are&lt;BR /&gt;1. Users can't consent&lt;BR /&gt;2. Users can consent to permissions you deem low-risk&lt;BR /&gt;3. &lt;STRONG&gt;Users can consent to permissions users can consent to,&lt;/STRONG&gt; but not these x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;There isn't a feedback button on SecureScore.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 16:45:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-score-rec-out-of-date-entra-consent-settings/m-p/4462376#M1125</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-10-17T16:45:16Z</dc:date>
    </item>
    <item>
      <title>user-reported phishing emails</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/user-reported-phishing-emails/m-p/4450911#M1117</link>
      <description>&lt;P&gt;Dear Community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a technical question regarding user-reported emails. In Defender, under “Action and Submissions” -&amp;gt; “Submissions,” I can see the emails that users have reported under the “user reported” option. There, we have the option to analyze these emails and mark them as “no threats found,” “phishing,” or “spam.” The user is then informed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Question: Do these reported emails remain in the user's inbox when they report them? If not, do we have the option to return these reported emails to the user's inbox with the “No threats found” action? Because I don't see this option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In another tenant, under “Choose response Action,” I see “move or delete,” but the “inbox” option is grayed out. Why is that?&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 12:34:28 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/user-reported-phishing-emails/m-p/4450911#M1117</guid>
      <dc:creator>SleeperHead</dc:creator>
      <dc:date>2025-09-04T12:34:28Z</dc:date>
    </item>
    <item>
      <title>False positive report</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/false-positive-report/m-p/4447164#M1115</link>
      <description>&lt;P&gt;Microsoft defender false tags and deletes freegate VPN as trojan virus&lt;/P&gt;&lt;P&gt;https://en.m.wikipedia.org/wiki/Freegate&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2025 16:42:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/false-positive-report/m-p/4447164#M1115</guid>
      <dc:creator>imanbarati</dc:creator>
      <dc:date>2025-08-22T16:42:51Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Office (MDO) - Customize Results Email for User Reported Messages</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-mdo-customize-results-email-for/m-p/4442093#M1112</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I would like to customize the results email from MDO to the users. From the documentation, I can see the option to modify "Email body results text" and "Email footer text":&lt;/P&gt;&lt;img&gt;Microsoft Defender for Office (MDO) documentation about custom results email&lt;/img&gt;&lt;img&gt;Custom notification options in the Defender portal&lt;/img&gt;&lt;P&gt;Unfortunately, the documentation doesn't specify anything beyond that. Therefore, I have the following questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What exactly is the Email "body" and "footer" in this template? (Compare to screenshot below)&lt;/LI&gt;&lt;LI&gt;Is the title/header part of the "body"?&lt;/LI&gt;&lt;LI&gt;What type of text from is available? (Plain/HTML/Markdown etc.)&lt;/LI&gt;&lt;/UL&gt;&lt;img&gt;Example Email / Default "SPAM" response&lt;/img&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have experience with customizing these result emails? Feedback would be appreciated, thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 10:41:56 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-mdo-customize-results-email-for/m-p/4442093#M1112</guid>
      <dc:creator>PhilippZiemke</dc:creator>
      <dc:date>2025-08-11T10:41:56Z</dc:date>
    </item>
    <item>
      <title>Disabling Auto Align Feature in Microsoft Defender 365 Console Alerts</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/disabling-auto-align-feature-in-microsoft-defender-365-console/m-p/4441086#M1111</link>
      <description>&lt;P&gt;The Microsoft Defender 365 console has recently started auto aligning the alert screen upon clicking on an alert name, which seems to be part of the updated alert management experience. This change is quite bothersome and distracting. How can this feature be disabled?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 13:05:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/disabling-auto-align-feature-in-microsoft-defender-365-console/m-p/4441086#M1111</guid>
      <dc:creator>HeyNiko</dc:creator>
      <dc:date>2025-08-07T13:05:59Z</dc:date>
    </item>
    <item>
      <title>'system has learned from the submission / mail is automatically allowed'</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/system-has-learned-from-the-submission-mail-is-automatically/m-p/4437908#M1109</link>
      <description>&lt;P&gt;Hey folks, got an alert about a tenant allow//block list entry expiring. Only recently did we start getting these, because only recently did we start using expiring whitelisting. But I'm a little confused by the details, which says 'Mail from x is now automatically alllowed and the allow entry has been removed' and the activity that ''an allow entry is no longer required as the system has learned from the submission'&lt;/P&gt;&lt;P&gt;The referenced email is actually an internal tenant - it receives ticket requests, and sends out ticket updates. But I'm REALLY curious about the 'automatic' allowing. Is this a feature limited to Defender 2, or part of Microsoft's AI detection framework for all 365 Defender/EOP? I don't even remember submitting this email - if I did, it was probably more than 45 days ago. So&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Is this notice primarily that the entry had expired, but ALSO it's not needed or does this send out as soon as 'the system' recognizes it &amp;nbsp;as legitimate, and removed regardless of the time left?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2) is there a way to review a list of entries Microsoft has 'accepted'?&lt;/P&gt;&lt;P&gt;3) What exactly does this 'allow'? I know that the tenant allow/block list allowed a certain set of lower-risk indicators in an email, but still blocked some higher-risk ones - unless there was a submission made. At that point, more is allowed. But there's still a limit, compared to a blanket bypass on the policy itself.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2025 18:20:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/system-has-learned-from-the-submission-mail-is-automatically/m-p/4437908#M1109</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-07-29T18:20:41Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender EOP</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-eop/m-p/4435793#M1104</link>
      <description>&lt;P&gt;We have been experiencing an issue since last week where we are unable to view the details of quarantined emails. Could you please confirm if this is related to a known backend service issue, or if there are any specific troubleshooting steps we should perform on our end?&lt;/P&gt;&lt;img /&gt;&lt;P&gt;Any guidance or updates would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jul 2025 10:18:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-eop/m-p/4435793#M1104</guid>
      <dc:creator>Salamat_Shah</dc:creator>
      <dc:date>2025-07-23T10:18:29Z</dc:date>
    </item>
    <item>
      <title>Searching for Activities in Audit Log returns repeated results - appears broken</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/searching-for-activities-in-audit-log-returns-repeated-results/m-p/4433816#M1103</link>
      <description>&lt;P&gt;I'm in Defender, using the Audit Log tool,&amp;nbsp;&lt;STRONG&gt;trying&lt;/STRONG&gt; to find out who changed the Anti-Phishing policy on the 23rd of January. Selecting the 'Activities - friendly names' drop-down, and inputting 'policy' returns&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A number of different categories + activities for stuff unrelated to Defender (ie, Purview, CoPilot in Outlook,, SharePoint AI use, the 365 AC, 'Places Directory' - whatever that is) but nothing related to Defender (the tool I'm opening it within)...&lt;/LI&gt;&lt;LI&gt;The same category - M365 Apps Admin Services cloud policy activities - about 30 times, with every activity it includes. Probably 70% of the results, are just this same thing over and over. I looked into it - because I've never heard of this, yet it SOUNDS like something related to what I do.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;First off, on the [audit log activities](https://learn.microsoft.com/en-us/purview/audit-log-activities#microsoft-365-apps-admin-services-cloud-policy-activities) KB, this category is listed once, with 4 activities. there's about 13 that show up in each duplicated category in the search, so that's unhelpful. It links to &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365-apps/admin-center/overview-cloud-policy" target="_blank"&gt;another kb&lt;/A&gt; which seems to imply that 'Cloud Policy service' is not an actual thing - it's just a marketing/conceptual term for a functionality of InTune. Why it's not in the InTune KB - I do not know - I've made some suggestions to the KB's&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first KB I mentioned does not list any activities for Defender's policies - there's stuff for Endpoint (multiple categories), XDR (multiple categories)... So I have 2 questions.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;1) Is anyone able to advise how to get the data I want? At this point, I'm not even sure this audit log would PULL any relevant data, based on the lack of activities - so I don't really want to just blanket search for that date, and sift through stuff.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;2) Does anyone know how to use this tool effectively? Know of a KB that is good and reliable and helpful?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jul 2025 14:00:52 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/searching-for-activities-in-audit-log-returns-repeated-results/m-p/4433816#M1103</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-07-16T14:00:52Z</dc:date>
    </item>
    <item>
      <title>Help me understand why this email was quarantined?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/help-me-understand-why-this-email-was-quarantined/m-p/4427946#M1097</link>
      <description>&lt;P&gt;I'm pretty familiar with Defender's Threat Policies. I've probably set them up on 40 tenants. I know the Hosted Content Filter Policy is backend for Anti Spam Inbound policy. I know that, confusingly, the AntiSpam Inbound Policies contain the actions for High Confidence/Normal Confidence Phishing - NOT the AntiPhishing policies (which seem more geared towards impersonation). What I DON'T know is why this was quarantined - and whether the anti-phish policy had anything to do with it. The Policy Type linked is the IB Anti Spam. This tenant is one of the few we have set at a BCL tolerance level of 7 - which shows me that 0 messages in the last 60 days would've been caught for this reason (which would include the email in question). So it was either the SCL or some 'anti phish' component of the anti-spam policy. I have none of the custom 'increase spam score' markers here. I was sure there was a 'evidence' tab within email entity, but i guess not - the only info I have about the detection (now released) is the following:&lt;BR /&gt;&lt;BR /&gt;This particular sender does not send reliably over 45 days, but&amp;nbsp; also has been a business partner of this tenant for decades. So rather than the Tenant Allow/Block list which allows a max of 45 days, I want to add it to the offending policy. which SEEMS like it would be the inbound anti-spam - except that it also says it's phishing everywhere. I don't want to bypass both the phishing and spam policies unless I have to - but I don't really know why this got blocked.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;It's an external address that had sent an email days ago that got through without issue... This one has an attached pdf, but so do they all.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thoughts?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;img /&gt;&lt;img /&gt;&lt;P class="lia-clear-both"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 15:45:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/help-me-understand-why-this-email-was-quarantined/m-p/4427946#M1097</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-06-27T15:45:37Z</dc:date>
    </item>
    <item>
      <title>Block all internet traffic except some sites</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/block-all-internet-traffic-except-some-sites/m-p/4421403#M1094</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;i've a subset of machines that need only access to some sites, like internal websites, office365 and av updates but i'm being asked to block all other sites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can i use office365 defender (https://security.microsoft.com/securitysettings/endpoints) to do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is the best option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jun 2025 14:18:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/block-all-internet-traffic-except-some-sites/m-p/4421403#M1094</guid>
      <dc:creator>joaquimlopes</dc:creator>
      <dc:date>2025-06-06T14:18:32Z</dc:date>
    </item>
    <item>
      <title>All Excel Macro Files Suddenly Flagged as Malware (X97M/Slacker.gen!A) Across M365 Starting April 16</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/all-excel-macro-files-suddenly-flagged-as-malware-x97m-slacker/m-p/4411435#M1092</link>
      <description>&lt;P&gt;Starting around 8 PM GMT+8 on April 16, 2025, macro-enabled Excel files with extensions such as .xlsm, .xlsb, or .xls began being automatically flagged as malware, specifically identified as X97M/Slacker.gen!A—when opened or edited in SharePoint, OneDrive, or Teams. Before this, the same files were not flagged as malicious, even when opened or edited, and this behavior had remained consistent for several months.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This issue affects our entire tenant, with over 800 files being flagged as malware under the name X97M/Slacker.gen!A. These files are located across various locations and have been modified by different users.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We are a Cloud-only tenant, and we have not done any configuration changes in Threat Policies for the past few months.&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 07:37:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/all-excel-macro-files-suddenly-flagged-as-malware-x97m-slacker/m-p/4411435#M1092</guid>
      <dc:creator>Tiam</dc:creator>
      <dc:date>2025-05-07T07:37:40Z</dc:date>
    </item>
    <item>
      <title>Marking Quarantine Notice senders as safe for entire tenant</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/marking-quarantine-notice-senders-as-safe-for-entire-tenant/m-p/4411185#M1091</link>
      <description>&lt;P&gt;Our users get quarantine notices weekly. They're configured to come from &lt;A class="lia-external-url" href="mailto:email address removed for privacy reasons" target="_blank"&gt;email address removed for privacy reasons&lt;/A&gt; (the domain specific to tenant).. sometimes they come from &lt;A class="lia-external-url" href="mailto:email address removed for privacy reasons" target="_blank"&gt;email address removed for privacy reasons&lt;/A&gt; anyways, but this is fine.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The thing is, I end up with a LOT of users who end up receiving these in their junk mail. We have a lot of&amp;nbsp; tenants - I don't really have the time to keep checking them, taking action on mis-junked items. Most stuff is configured to go to quarantine anyway.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What's the best way to allow these senders? The IB Anti-Spam safe-senders component is not Secure-Score recommended, and we try to keep these scores high. But the tenant allow/block list allows a max of 45days since last use. There's so many options, I'm a little confused as to what's 'right'&lt;BR /&gt;&lt;BR /&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 14:39:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/marking-quarantine-notice-senders-as-safe-for-entire-tenant/m-p/4411185#M1091</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-05-06T14:39:02Z</dc:date>
    </item>
    <item>
      <title>upgraded from P1 to P2... how do I configure this?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/upgraded-from-p1-to-p2-how-do-i-configure-this/m-p/4399682#M1082</link>
      <description>&lt;P&gt;Upgraded to Defender 365 P2 from P1, based on the automated responses. Kinda figured we'd be able to tweak these, but I guess not? Anyway, I'm a little bit confused about how to set this up maximally. Realized yesterday we had a 'User click a malicious link" investigation that was pending - but no one knew. When I click 'Email Notification' in the 'Incidents' window, it brings me to the XDR settings menu, with options for setting emails to notify of Alerts, Incidents and Threat Analytics. Except we don't have XDR? So I can't tell if these are even valid?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The documentation on the AIR component is really hard to decipher - wondering if anyone has much experience with this, and knows how to configure it optimally? As in, how do I notify someone of a Critical Investigation, or something needing approval for remediation? Can I configure certain things to not require approval? Like... removing a reported phishing email from everyone's inbox?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 14:34:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/upgraded-from-p1-to-p2-how-do-i-configure-this/m-p/4399682#M1082</guid>
      <dc:creator>underQualifried</dc:creator>
      <dc:date>2025-04-01T14:34:04Z</dc:date>
    </item>
  </channel>
</rss>

