<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Office 365 Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/bg-p/MicrosoftDefenderforOffice365Blog</link>
    <description>Microsoft Defender for Office 365 Blog articles</description>
    <pubDate>Sat, 25 Apr 2026 15:47:16 GMT</pubDate>
    <dc:creator>MicrosoftDefenderforOffice365Blog</dc:creator>
    <dc:date>2026-04-25T15:47:16Z</dc:date>
    <item>
      <title>Declutter and Defend: Reducing promotional mail noise with Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</link>
      <description>&lt;P&gt;Enterprise inboxes are overwhelmed with &lt;STRONG&gt;graymail&lt;/STRONG&gt; — legitimate, bulk email like newsletters, vendor promotions, and product updates that isn't malicious but buries the messages that matter. When high volumes of these mails land in the inbox, it crowds out priority communications and can dull security vigilance. Employees conditioned to ignore repetitive emails may miss signs of a real threat. It also creates recurring work for admins and security teams who must continuously tune filters, manage exception requests, and chase noise from user reports for email that isn’t malicious. Because graymail passes every spam filter check, traditional defenses don't separate it — leaving this signal-to-noise gap unaddressed.&lt;/P&gt;
&lt;P&gt;Today we’re excited to announce that &lt;STRONG&gt;Microsoft Defender now includes built-in graymail filtering. &lt;/STRONG&gt;It is delivered natively through a new &lt;STRONG&gt;Promotions experience in Outlook&lt;/STRONG&gt; that automatically classifies and separates bulk email, so it no longer competes with business-critical communication in the inbox. Now in&amp;nbsp;&lt;STRONG&gt;Public Preview&lt;/STRONG&gt;, this capability learns from how users interact with graymail to become more accurate over time. Coupled with the existing &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener"&gt;Bulk Senders Insight report&lt;/A&gt;, Defender brings data-driven bulk classification and control into the security workflows you already use.&lt;/P&gt;
&lt;H5&gt;What Is Graymail?&lt;/H5&gt;
&lt;P&gt;Graymail is legitimate bulk email that isn't malicious—product newsletters, event announcements, marketing promotions, and software update notifications from reputable, authenticated senders. It is distinct from spam and from phishing - graymail comes from real organizations with proper authentication and traditional spam filters aren't designed to handle it.&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Graymail handling in Microsoft Defender&lt;/H4&gt;
&lt;P&gt;Microsoft Defender's approach is built on three principles: &lt;STRONG&gt;classify intelligently, deliver natively, and learn continuously&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H5&gt;Promotions Folder — Intelligent Inbox Organization&lt;/H5&gt;
&lt;P&gt;A dedicated &lt;STRONG&gt;Promotions folder,&lt;/STRONG&gt; natively provisioned in Outlook, now keeps legitimate bulk mail out of the primary inbox. Promotional content is separated from priority emails without being sent to &lt;STRONG&gt;Junk&lt;/STRONG&gt;, which means users can still access and browse newsletters and updates at their own pace. The folder appears at the top level of the mailbox for easy discovery and is visible across all Outlook experiences.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Non-spam bulk mail&lt;/STRONG&gt; below the organization's configured &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk Complaint Level&lt;/A&gt; threshold is automatically routed to the Promotions folder.&lt;/LI&gt;
&lt;LI&gt;Messages from senders the user has explicitly&amp;nbsp;&lt;STRONG&gt;allowed&lt;/STRONG&gt; continue to land in the Inbox.&lt;/LI&gt;
&lt;LI&gt;Messages identified as&amp;nbsp;&lt;STRONG&gt;spam&lt;/STRONG&gt; continue to go to Junk.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;To enable the Promotions folder administrators need to enable the &lt;STRONG&gt;"Bulk Moves Enabled"&lt;/STRONG&gt; setting in their anti-spam policy. The Promotions folder is then created for all users and used for routing only when this setting is ON.&lt;/P&gt;
&lt;P&gt;Existing mail flow is unaffected.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 1: system tagging of “Promotions” in outlook client and promotions folder (previously tagged as “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Promotional mail tagging and Mailbox Rule Support&lt;/H5&gt;
&lt;P&gt;Messages classified as graymail will automatically be labeled with a &lt;STRONG&gt;"Promotions" system tag&lt;/STRONG&gt; in Outlook. The tag provides instant visual context without requiring users to open each message and is visible in Outlook on the Web and the native Outlook desktop apps for Windows and Mac. During Public Preview, the tagging component is opt-in, requiring administrators to &lt;STRONG&gt;enable it by configuring an Exchange Transport Rule&lt;/STRONG&gt;. Once generally available, it will be enabled by default.&lt;/P&gt;
&lt;P&gt;Because this classification is integrated at the client level, the Promotions tag can also be used as a condition in Outlook mailbox rules. This enables custom routing logic for advanced scenarios like moving all promotions-tagged messages from a specific sender to a custom folder, flagging certain promotional emails for follow-up, or auto-forwarding or deleting promotions that meet specific criteria. This transforms the Promotions classification from a one-way filter into a flexible building block for personal and organizational workflows—particularly valuable for power users and teams with compliance or archival requirements.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure 2: User inbox rules using “Promotion” tag (previously “Bulk” in private and public preview)&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;Adaptive Learning&lt;/H5&gt;
&lt;P&gt;Microsoft Defender's graymail filtering gets smarter with every interaction. The system learns directly from how users handle their mail. When a user moves a message out of the Promotions folder and back to the Inbox, future emails from that sender will no longer be placed in the Promotions folder. When a user moves a message from the Inbox into the Promotions folder, future emails from that sender will be routed to the Promotions folder automatically.&lt;/P&gt;
&lt;P&gt;This creates a personalized, self-improving experience that becomes more accurate over time - no manual rule configuration required, no safe-sender lists to maintain, and no filtering rules for IT teams to manage on behalf of individual employees.&lt;/P&gt;
&lt;H5&gt;Built into existing Security Workflows&lt;/H5&gt;
&lt;P&gt;Administrators also gain visibility through the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;&lt;STRONG&gt;Bulk Senders Insight report&lt;/STRONG&gt;&lt;/A&gt;, which provides data-driven guidance on what your organization actually receives and can help tune your bulk mail filtering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Graymail has long been the unsolved middle ground of email security—too legitimate to block, too noisy to ignore. Microsoft Defender now handles it where it should be handled: inside the platform, inside the mailbox, and inside the security workflows your organization already relies on. No new portals, no new vendors, no compromise between security and user experience.&lt;/P&gt;
&lt;H4&gt;Get Started&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Configure promotions tagging and the promotions folder today - &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-complaint-level-bcl-about" target="_blank" rel="noopener"&gt;Bulk email detection documentation on Microsoft Learn&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Monitor the experience using the &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-bulk-senders-insight-optimizing-bulk-email-management-for-enterprise/4193963" target="_blank" rel="noopener" data-lia-auto-title="Bulk Senders Insight report" data-lia-auto-title-active="0"&gt;Bulk Senders Insight report&lt;/A&gt;.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 23 Apr 2026 03:59:21 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/declutter-and-defend-reducing-promotional-mail-noise-with/ba-p/4511732</guid>
      <dc:creator>FaithEbenezerOquong</dc:creator>
      <dc:date>2026-04-23T03:59:21Z</dc:date>
    </item>
    <item>
      <title>Announcing Public Preview: Security Copilot’s Email Summary in Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-public-preview-security-copilot-s-email-summary-in/ba-p/4510357</link>
      <description>&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Co-Authors: &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/cristinadagamah/2944483" target="_blank" rel="noopener" data-lia-auto-title="Christina Da Gama Henriquez" data-lia-auto-title-active="0"&gt;Cristina Da Gama Henriquez&lt;/A&gt; and &lt;A class="lia-internal-link lia-internal-url lia-internal-url-user" href="https://techcommunity.microsoft.com/users/ajaj_shaikh/1489303" target="_blank" rel="noopener" data-lia-auto-title="Ajaj Shaikh" data-lia-auto-title-active="0"&gt;Ajaj Shaikh&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;AI is rapidly reshaping both sides of the security landscape, and email remains one of the most common and complex entry points for attacks. As adversaries use AI to scale more sophisticated phishing and email-based threats, defenders are under pressure not just to detect them, but to quickly understand what actually happened. Microsoft continues to apply generative and agentic AI across the email protection stack to help stop threats before they reach the inbox and catch what inevitably gets through in the SOC. Still, for security analysts, understanding an email threat requires piecing together context across the incident and its related artifacts. Much of that context exists within the Email entity experience, but it is spread across metadata, timelines, URLs, and attachments, making it time-consuming to connect the dots and act with confidence.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce the public preview of Security Copilot’s Email summary capability, designed to bring those insights together and make email threat investigations faster, clearer, and more actionable. With Security Copilot included in Microsoft 365 E5, organizations will be able to bring AI directly into their flow of work—extending these benefits across the SOC at no additional cost.*&lt;/P&gt;
&lt;H4&gt;Bringing clarity into the investigation workflow&lt;/H4&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;Email summary brings AI-generated context directly into the Email entity page, transforming fragmented detection data into a clear, natural-language explanation of what happened and why. Analysts can access it from the Security Copilot right-side pane, the same place where Copilot activity across Microsoft Defender is surfaced. Instead of navigating across multiple views to reconstruct the story, analysts can generate a summary that connects the signals and highlights what matters most. And it all happens in seconds.&lt;/P&gt;
&lt;P&gt;Built on Security Copilot’s summarization capabilities, Email summary uses the same data analysts already rely on, like email metadata, timeline events, URLs, and attachments, and turns it into a cohesive narrative. It explains how a message was evaluated, what actions were taken, and where risk exists, without requiring manual correlation.&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;A summary that follows how analysts think&lt;/H4&gt;
&lt;P&gt;The experience is intentionally embedded in the Email entity page, where investigations already happen, so analysts don’t have to change how they work to benefit from it. The output is structured to match how analysts approach an investigation. It starts with a concise overview of the email, including what was detected, what actions were taken, and any key indicators. From there, it walks through the timeline of events, helping reconstruct how the email was delivered, interacted with, and remediated. It also breaks down URLs and attachments, calling out malicious signals and explaining associated risks in plain language.&lt;/P&gt;
&lt;P&gt;Importantly, this is a user-triggered experience. Analysts generate a summary when they need it, ensuring the capability is both intentional and efficient.&lt;/P&gt;
&lt;H4&gt;From fragmented data to confident decisions&lt;/H4&gt;
&lt;P&gt;Email summary is a foundational step toward making email threat investigations more explainable and efficient. Today, it brings together existing signals into a clear, actionable narrative. Over time, it will evolve to incorporate additional signal depth: detonation (sandboxing) results, submission responses, and more granular insights from the filtering stack, further strengthening the completeness and fidelity of each investigation.&lt;/P&gt;
&lt;P&gt;As threats continue to grow in speed and sophistication, the ability to quickly understand and act is just as critical as detection itself. Email summary helps close that gap, giving analysts the clarity they need to respond with confidence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;*&lt;EM&gt;Eligible Microsoft 365 E5 customers will have 400 Security Compute Units (SCUs) per month for every 1,000 user licenses, up to 10,000 SCUs per month. This included capacity is expected to support typical scenarios. Customers will have an option to pay for scaling beyond the allocated amount at a future date with $6 per SCU on a pay-as-you-go basis, and will get a 30-day advanced notification when this option is available. &lt;/EM&gt;&lt;A class="lia-external-url" href="https://aka.ms/scpinclusioninfo" target="_blank"&gt;Learn more.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:19:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/announcing-public-preview-security-copilot-s-email-summary-in/ba-p/4510357</guid>
      <dc:creator>cristinadagamah</dc:creator>
      <dc:date>2026-04-14T20:19:58Z</dc:date>
    </item>
    <item>
      <title>From Impersonation Calls to Transparent Reporting: Defending the New Front Door of Attacks</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/from-impersonation-calls-to-transparent-reporting-defending-the/ba-p/4503050</link>
      <description>&lt;P&gt;Email is still a major entry point—but it’s no longer the only one that matters. Today’s attackers are increasingly shifting to &lt;STRONG&gt;collaboration channels like Microsoft Teams&lt;/STRONG&gt;, where trust is implicit and interaction is real time. Decisions happen fast, and that changes the economics of attacks. Adversaries can pressure users, adapt on the fly, and accelerate their objectives before traditional controls have time to respond. They can then pivot laterally across identities, endpoints, and cloud apps.&lt;/P&gt;
&lt;P&gt;And it’s not just chats and shared links anymore. &lt;STRONG&gt;Teams calling has emerged as a high-impact social-engineering path&lt;/STRONG&gt;—a “front door” attackers can use to bypass inbox defenses. They can impersonate familiar brands or internal functions. They can also try to extract credentials or persuade a user to take immediate action. In a typical flow, an attacker leverages urgency and context. For example, they may reference an “account issue” following suspicious email activity. They then use the real-time pressure of a call to drive a user toward compromise. That’s why protection must happen directly in the collaboration experience.&lt;/P&gt;
&lt;P&gt;At &lt;STRONG&gt;RSA 2026&lt;/STRONG&gt;, we’re announcing new Microsoft Defender capabilities designed for exactly this reality. They give SOC teams visibility that matches how attacks unfold across Microsoft Teams. They also help end users easily identify impersonation attempts, so they can stop them before compromise. And we’re introducing the new Protection and Posture Insights report, which provides tenant-specific insights about your collaboration security with Microsoft Defender.&lt;/P&gt;
&lt;H4&gt;Protect your organization from voice-based attacks in Microsoft Teams&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Voice phishing (vishing) is a fast-growing vector&lt;/STRONG&gt; because it lets attackers bypass message-based filters and manipulate targets in real time. But security teams haven’t had the same level of coverage for Teams calls that they’ve come to expect for email and messages. That’s why we’re excited to announce inline protection and SOC- investigation capabilities for Microsoft Teams calls. Microsoft Defender can now stop the interaction&amp;nbsp;&lt;EM&gt;while it’s happening&lt;/EM&gt; and SOC teams can then investigate the full path &lt;EM&gt;after the fact&lt;/EM&gt;.&lt;/P&gt;
&lt;H4&gt;Hunt and remediate suspicious calls&lt;/H4&gt;
&lt;P&gt;When attackers use Teams calls to impersonate a brand, internal IT, or a trusted organization, security teams need more than anecdotal user reports—they need forensic visibility and the ability to act. Microsoft Defender has turned Teams calling from a blind spot into a &lt;STRONG&gt;first-class SOC signal&lt;/STRONG&gt;, so you can now:&lt;/P&gt;
&lt;P&gt;Investigate Teams calling activity at scale through Advanced hunting. Use new call-focused data to identify suspicious patterns and validate risk across the organization. This includes unusual external callers, first-time contacts, or activity that aligns with brand impersonation patterns.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pivot directly into a call’s details using a call entity experience. Analysts can quickly understand what happened and who was involved, without stitching together context across multiple tools.&lt;/LI&gt;
&lt;LI&gt;Take mitigation actions inline by blocking malicious domains or addresses in Teams via the Tenant Allow/Block List. This turns investigation into immediate containment and helps prevent repeat attempts.&lt;/LI&gt;
&lt;LI&gt;Close the loop with end-user reporting. Pair what users flag as a security risk with what analysts can hunt and confirm. The SOC can move faster and reduce ambiguity when seconds matter.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;Figure 1: Teams call activity events in advanced hunting&lt;/img&gt;&lt;img&gt;Figure 2: Call entity panel for deeper investigation in advanced hunting&lt;/img&gt;
&lt;H4&gt;Stop impersonation in real time&lt;/H4&gt;
&lt;P&gt;While insights are critical, the most effective way to reduce vishing impact is to interrupt social engineering while the user is still deciding what to do.&lt;/P&gt;
&lt;P&gt;Now, when a Teams call appears to be impersonating a known organization or trusted entity, users will see a persistent in-call warning banner. It shows during the incoming-call experience and while on the call. That gives users clear, contextual guidance &lt;EM&gt;before&lt;/EM&gt; they comply with attacker instructions. It also extends the same protection approach used for chat impersonation into the calling surface.&lt;/P&gt;
&lt;img&gt;Figure 3: Teams call real-time notification informing the user that the call is suspicious.&lt;/img&gt;
&lt;P&gt;And because improving protection depends on learning from real interactions, users can also provide feedback by reporting a call as not a security risk to help improve the accuracy of warnings over time.&lt;/P&gt;
&lt;P&gt;That makes Defender the only collaboration security tool that provides inline user feedback – in real-time.&lt;/P&gt;
&lt;H4&gt;Turn Defender telemetry into executive-ready security understanding with the Protection &amp;amp; Posture Insights report&lt;/H4&gt;
&lt;P&gt;To help organizations clearly understand the threats targeting their environment and how Defender is helping protect against them, we are introducing the&lt;STRONG&gt; Protection &amp;amp; Posture Insights report.&lt;/STRONG&gt; It is available directly in the Defender portal and built on tenant-specific telemetry. The report provides a customized view of the spam, phishing, and malware campaigns observed against users—showing how attackers are attempting to gain access, what techniques are being used, who is being targeted, and where risk is concentrated across the environment.&lt;/P&gt;
&lt;P&gt;The Protection &amp;amp; Posture Insights report goes beyond surface-level threat counts to highlight patterns and exposure unique to each tenant, including emerging phishing techniques, malware delivery methods, and zero-day threats identified through detonation analysis. It also shows how these threats are handled across delivery locations—such as inbox, junk, and quarantine—and which detection technologies and policies are engaged, giving teams a clearer understanding of how attackers are interacting with their environment.&lt;/P&gt;
&lt;P&gt;In addition to threat visibility, the report delivers &lt;STRONG&gt;personalized insights and targeted security policy recommendations&lt;/STRONG&gt; based on each customer’s configuration and observed threat activity. By surfacing coverage gaps, priority account targeting, and opportunities to strengthen policy enforcement, teams can take focused action to reduce exposure and improve security posture. With consistent, tenant-specific reporting over time, organizations can validate results, track progress, and share credible, executive-ready security outcomes—without manual data assembly.&lt;/P&gt;
&lt;img&gt;Figure 4: Executive summary of the new Protection &amp;amp; Posture Insights report&lt;/img&gt;
&lt;P&gt;This kind of personalized visibility answers the most important question for any security team: what was stopped in &lt;EM&gt;my&lt;/EM&gt; environment, and why. It’s also helpful to pair those tenant-specific insights with an objective, industry-wide view. That’s why we publish official email security performance benchmarking. We use consistent, real-world measurements of detection and efficacy across phishing, malware, and spam. That way, you can compare Microsoft Defender against other secure email gateway (SEG) and integrated cloud email security (ICES) solutions. For a deeper look at what the latest results reveal, check out &lt;A href="https://www.microsoft.com/en-us/security/blog/2026/03/12/from-transparency-to-action-what-the-latest-microsoft-email-security-benchmark-reveals/" target="_blank" rel="noopener"&gt;From transparency to action: What the latest Microsoft email security benchmark reveals.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;These new Microsoft Defender capabilities close a critical gap in collaboration security. They help customers interrupt Teams call–based social engineering. They also give the SOC actionable call visibility and faster containment to prevent repeat attempts. Combined with the Protection &amp;amp; Posture Insights report, security teams can more easily report what was stopped in their tenant. They can also prioritize the next control improvements and strengthen end‑to‑end SOC outcomes across email and Teams.&lt;/P&gt;
&lt;H4&gt;Visit Us at RSA 2026&amp;nbsp;&lt;/H4&gt;
&lt;P&gt;Join us at the Microsoft booth at the Moscone Center to see these innovations in action!&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More information:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Learn more about &lt;/STRONG&gt;&lt;A href="https://www.microsoft.com/security/business/siem-and-xdr/microsoft-defender-office-365" target="_blank" rel="noopener"&gt;Defender for Office 365&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Find out how to &lt;A href="https://aka.ms/protect-against-multi-modal-attacks" target="_blank" rel="noopener"&gt;protect your organization&lt;/A&gt; against multi-modal attacks&lt;/LI&gt;
&lt;LI&gt;Check out our recent blog: &lt;A href="https://aka.ms/disrupting-threat-targeting-teams" target="_blank" rel="noopener"&gt;Disrupting threats targeting Microsoft Teams&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 27 Mar 2026 23:13:51 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/from-impersonation-calls-to-transparent-reporting-defending-the/ba-p/4503050</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2026-03-27T23:13:51Z</dc:date>
    </item>
    <item>
      <title>Part 3: Build custom email security reports with Power BI and workbooks in Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-3-build-custom-email-security-reports-with-power-bi-and/ba-p/4490127</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;TL;DR&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;: We're releasing a brand-new Power BI template for email security reporting and a major update (v3) to the Microsoft Sentinel workbook. Both solutions share the same rich visuals and insights. Choose Power BI for quick deployment without Sentinel, or the Sentinel workbook for extended data retention and multi-tenant scenarios. Get started in minutes with either option.&lt;/EM&gt;&lt;/P&gt;
&lt;H2&gt;Introduction&lt;/H2&gt;
&lt;P&gt;Security teams in both small and large organizations track key metrics to make critical security decisions and identify meaningful trends in their organizations. &amp;nbsp;While Microsoft Defender for Office 365 provides rich, built-in reporting capabilities, many security teams need custom reporting solutions to create dedicated views, combine multiple data sources, and derive deeper insights tailored to their unique requirements.&lt;/P&gt;
&lt;P&gt;Earlier last year (&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/build-custom-email-security-reports-and-dashboards-with-workbooks-in-microsoft-s/4352242" target="_blank" rel="noopener"&gt;Part 1&lt;/A&gt; and &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/part-2-build-custom-email-security-reports-and-dashboards-with-workbooks-in-micr/4411303" target="_blank" rel="noopener"&gt;Part 2&lt;/A&gt;) we shared examples of how you can use &lt;A href="https://learn.microsoft.com/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks in Microsoft Sentinel&lt;/A&gt; to build a custom email security insights dashboard for Microsoft Defender for Office 365.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce the release of a &lt;STRONG&gt;new Power BI template file&lt;/STRONG&gt; for Microsoft Defender for Office 365 customers, along with an &lt;STRONG&gt;updated version&lt;/STRONG&gt; of the &lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel.&lt;/STRONG&gt; Both &amp;nbsp;solutions share the same visual design and structure, giving you a consistent experience regardless of which platform you choose.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Power BI template file - &lt;/STRONG&gt;Microsoft Defender for Office 365 Detections and Insights:&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft Sentinel workbook&lt;/STRONG&gt;&amp;nbsp;- Microsoft Defender for Office 365 Detections and Insights:&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;NEW: Power BI template file for Microsoft Defender for Office 365 Detections and Insights&lt;/H2&gt;
&lt;P&gt;This custom reporting template file utilizes Power BI and Microsoft Defender XDR Advanced Hunting through the &lt;A href="https://learn.microsoft.com/en-us/graph/api/resources/security-api-overview?view=graph-rest-1.0" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Graph security API&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;It is designed for Microsoft Defender for Office 365 customers who have access to Advanced Hunting but are not using Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;Advanced Hunting data in Microsoft Defender for Office 365 tables is available for up to 30 days. The reporting template uses these same data tables to visualize insights into an organization's email security, including protection, detection, and response metrics provided by Microsoft Defender for Office 365.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Note:&lt;/U&gt;&lt;/STRONG&gt; If data retention beyond 30 days is required, customers can use the Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;You can find the new .pbit template file and detailed instructions on how to set up and use it in the &lt;A href="https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Microsoft%20Defender%20for%20Office%20365" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;unified Microsoft Sentinel and Microsoft 365 Defender GitHub repository&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;This new Power BI template uses the same visuals and structure as the Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel, providing an easy way to gain deep email security insights across a wide range of use cases.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;H2&gt;UPDATED: Microsoft Defender for Office 365 Detections and Insights workbook in Microsoft Sentinel&lt;/H2&gt;
&lt;P&gt;We are excited to announce the release of a &lt;STRONG&gt;new version (3.0.0)&lt;/STRONG&gt; of the &lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt; workbook in &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The workbook is part of the &lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; &lt;STRONG&gt;solution&lt;/STRONG&gt; in Microsoft Sentinel and can be installed and started to use with a few simple clicks.&lt;/P&gt;
&lt;P&gt;In this new release we incorporated feedback we have received from many customers in the past few months to add new visuals, updated existing visuals and add insights focusing on security operations.&lt;/P&gt;
&lt;H3&gt;What’s New&lt;/H3&gt;
&lt;P&gt;Here are some notable changes and new capabilities available in the updated workbook template.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Improved structure:&lt;/STRONG&gt; Headings and grouped insights have been added to tabs for easier navigation and understanding of metrics.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Contextual explanations:&lt;/STRONG&gt; Each tab, section, and visual now includes descriptions to help users interpret insights effectively.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Drill-down capability:&lt;/STRONG&gt; A single “Open query link” action allows users to view the underlying KQL query for each visual, enabling quick investigation and hunting by modifying conditions or removing summaries to access raw data.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detection Dashboard tab enhancements:&lt;/STRONG&gt; Added an &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/reports-mdo-email-collaboration-dashboard#phish--malware-efficacy-card" target="_blank" rel="noopener"&gt;example Effectiveness metric&lt;/A&gt;, updated visuals to focus on overall Microsoft Defender for Office 365 protection values, and introduced new sections for &lt;A href="https://go.microsoft.com/fwlink/?linkid=2323913" target="_blank" rel="noopener"&gt;Emerging Threats&lt;/A&gt; and &lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;Microsoft 365 Secure Email Gateway Performance.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;New Security Operations Center (SOC) Insights tab:&lt;/STRONG&gt; Provides operational metrics such as Security Incident Response, Investigation, and Response Actions for SOC teams.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced threat insights:&lt;/STRONG&gt; Includes &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365s-language-ai-for-phish-enhancing-email-securit/4410446" target="_blank" rel="noopener"&gt;new LLM-based content analysis&lt;/A&gt; detections and threat classification insights on the &lt;STRONG&gt;Emails – Phish Detections&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;External forwarding insights:&lt;/STRONG&gt; Added deep visibility into &lt;STRONG&gt;Inbox rules&lt;/STRONG&gt; and &lt;STRONG&gt;SMTP forwarding in Outlook&lt;/STRONG&gt;, including destination details to assess potential data leakage risks.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Geo-location improvements:&lt;/STRONG&gt; Sender IPv4 insights now include top countries for better geographic context for each Threat types (Malware, Spam, Phish).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced top attacked users and top senders:&lt;/STRONG&gt; Added &lt;STRONG&gt;TotalEmailCount&lt;/STRONG&gt; and &lt;STRONG&gt;Bad_Traffic_Percentage&lt;/STRONG&gt; for richer context in top attacked users and senders charts.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanded URL click insights:&lt;/STRONG&gt; URL click-based threat detection visuals now include &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safelinks-protection-for-links-generated-by-m365-copilot-chat-and-office-apps/4396828" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft 365 Copilot&lt;/STRONG&gt;&lt;/A&gt; as a workload.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;How to use the workbook across multiple tenants&lt;/H3&gt;
&lt;P&gt;If you manage multiple environments with Microsoft Sentinel — or you are an &lt;STRONG&gt;MSSP (Managed Security Service Provider)&lt;/STRONG&gt; working across multiple customer tenants — you can also use the workbook in multi‑tenant scenarios.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants#use-cross-workspace-workbooks" target="_blank" rel="noopener"&gt;Once the required configuration is in place,&lt;/A&gt; you can change the Subscription and Workspace parameters in the workbook to be multi select and load data from one or multiple tenants.&lt;/P&gt;
&lt;P&gt;This enables to see deep email security insights in multi‑tenant environments, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Aggregated multi‑tenant view:&lt;/STRONG&gt;&lt;BR /&gt;You can view aggregated insights across tenants in a &lt;STRONG&gt;single workbook view&lt;/STRONG&gt;. By multi‑selecting tenants in the &lt;STRONG&gt;Subscription&lt;/STRONG&gt; and &lt;STRONG&gt;Workspace&lt;/STRONG&gt; parameters, the workbook automatically loads and combines data from all selected environments for all visuals on all tabs.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Side‑by-side‑ comparison:&lt;/STRONG&gt;&lt;BR /&gt;For example, you can compare phishing detection trends or top attacked users across two or more tenants simply by opening the workbook in two browser windows placed side by side.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; For the multiselect option‑ to work in the current workbook version, you need to manually adjust the &lt;STRONG&gt;Subscription&lt;/STRONG&gt; and &lt;STRONG&gt;Workspace&lt;/STRONG&gt; parameters. This configuration is planned to become the default in the next release of the workbook. Until then, you &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/extend-sentinel-across-workspaces-tenants#use-cross-workspace-workbooks" target="_blank" rel="noopener"&gt;can simply apply this change using the workbook’s &lt;STRONG&gt;Edit&lt;/STRONG&gt; mode.&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;How to get the updated workbook version&lt;/H3&gt;
&lt;P&gt;The latest&amp;nbsp;version of the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt;&amp;nbsp;workbook is available&amp;nbsp;as part of&amp;nbsp;the&amp;nbsp;&lt;STRONG&gt;Microsoft&amp;nbsp;Defender XDR&lt;/STRONG&gt;&amp;nbsp;solution in the &lt;STRONG&gt;Microsoft Sentinel - Content hub&lt;/STRONG&gt;. Version&amp;nbsp;&lt;STRONG&gt;3.0.13&lt;/STRONG&gt;&amp;nbsp;of the solution has the updated workbook template.&lt;/P&gt;
&lt;P&gt;If you already have the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt;&amp;nbsp;solution deployed, &lt;STRONG&gt;version 3.0.13&lt;/STRONG&gt; is available now as an update. After you install the update, you will have the new workbook template available to use.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: If you had the workbook saved from a previous template version, make sure you delete the old workbook and use the save button on the new template to recreate a new local version with the latest updates.&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;If you install the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; solution for the first time, you are deploying the latest version and will have the updated template ready to use.&lt;/P&gt;
&lt;H3&gt;How to edit and share the workbook with others&lt;/H3&gt;
&lt;P&gt;You can customize each visual easily. Simply edit the workbook after saving,&amp;nbsp;then&amp;nbsp;adjust the underlying KQL query,&amp;nbsp;change the type of&amp;nbsp;the&amp;nbsp;visual,&amp;nbsp;or&amp;nbsp;create new insights.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;Visualize your data using workbooks in Microsoft Sentinel | Microsoft Learn&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Granting other users access to the workbook also possible, see the &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/manage-access-to-microsoft-sentinel-workbooks-with-lower-scoped-rbac/3906280" target="_blank" rel="noopener"&gt;Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC&lt;/A&gt; on the Microsoft Sentinel Blog.&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Do you have feedback related to reporting in Microsoft Defender for Office 365?&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;You can provide direct feedback via filling the form:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-teams="true"&gt;&lt;A href="https://aka.ms/mdoreportingfeedback" target="_blank" rel="noopener" aria-label="Link aka.ms/mdoreportingfeedback"&gt;aka.ms/mdoreportingfeedback&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have questions or feedback about Microsoft Defender for Office 365?&lt;/P&gt;
&lt;P&gt;Engage with the community and Microsoft experts in the &lt;A href="https://aka.ms/MDOForum" target="_blank" rel="noopener"&gt;Defender for Office 365 forum&lt;/A&gt;. &amp;nbsp;&lt;/P&gt;
&lt;H2&gt;More information&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/microsoft-365-defender-sentinel-integration?tabs=azure-portal" target="_blank" rel="noopener"&gt;Integrate Microsoft Defender XDR with Microsoft Sentinel&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about Microsoft Sentinel&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about&amp;nbsp;&lt;A href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Defender XDR&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 10 Feb 2026 22:50:16 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-3-build-custom-email-security-reports-with-power-bi-and/ba-p/4490127</guid>
      <dc:creator>dmozes</dc:creator>
      <dc:date>2026-02-10T22:50:16Z</dc:date>
    </item>
    <item>
      <title>Secure collaboration in Microsoft Teams with efficient and automated Threat Protection and response</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-collaboration-in-microsoft-teams-with-efficient-and/ba-p/4484479</link>
      <description>&lt;H3&gt;New Layers of Protection for Teams Messages&lt;/H3&gt;
&lt;P&gt;With more than 300 million monthly active users on Microsoft Teams, ensuring secure collaboration has become increasingly critical. As the threat landscape continues to change, our security measures must adapt accordingly. To address these challenges, we are pleased to announce enhanced protection and Security Operations response capabilities for enterprise messages containing URLs in Teams, utilizing Microsoft Defender.&lt;/P&gt;
&lt;H3&gt;Threat Profile – Tech Support Impersonation with Phishing URLs&lt;/H3&gt;
&lt;P&gt;In previous &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/protection-against-multi-modal-attacks-with-microsoft-defender/4438786" target="_blank" rel="noopener"&gt;blogs&lt;/A&gt;, we’ve discussed how threat actors are employing multimodal attacks and targeting users in an organization over Teams by impersonating tech support.&amp;nbsp; Lately some of these attackers have been observed steering their victims towards malicious websites that appear purpose-built to complete their harmful objectives while allaying the victim’s suspicions.&lt;/P&gt;
&lt;P&gt;The typical attack chain proceeds as follows:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Hybrid attacks often begin with mail bombing (spam) directed at the targeted individual, followed by Teams messages or calls in which the attacker impersonates IT support personnel offering to resolve the spam issue.&lt;/LI&gt;
&lt;LI&gt;Victims may then be deceived into granting system access to the attacker via remote management and monitoring tools such as Quick Assist or AnyDesk.&lt;/LI&gt;
&lt;LI&gt;In recent incidents, attackers have directed victims to malicious URLs that closely resemble legitimate internal IT security update or patching tools, featuring falsified logos and branding.&lt;/LI&gt;
&lt;LI&gt;These sites are actually conventional phishing platforms intended to capture user credentials and enable malware deployment, while victims believe their spam problem is being resolved.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Below: &lt;/STRONG&gt;Rendering of a malicious URL shared over Teams by an attacker to an intended victim&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Microsoft Defender uses robust detection engines and threat intelligence to support URL warnings, post-delivery protection, and advanced hunting for Teams, enabling comprehensive protection against evolving attack vectors.&lt;/P&gt;
&lt;H3&gt;Near real-time defense&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For Worldwide customers with Teams enterprise licenses and above &lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Our new advanced near-real-time protection ensures that any message containing URLs is thoroughly scanned and appropriately flagged before delivery. End users are notified with a warning tip upon messages delivery when malicious URLs are detected, helping them recognize and avoid potential risk. Threats don’t always appear right away, to stay ahead of evolving attacks, protection continues for up to 48 hours after a message is delivered. If a previously safe URL later becomes weaponized, the message is automatically updated with a warning tip, ensuring users remain protected even after the message reaches them.&lt;/P&gt;
&lt;P&gt;This dual-layered approach means:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Immediate warnings&lt;/STRONG&gt; for messages with known malicious URLs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Post-delivery detection&lt;/STRONG&gt; that adapts to evolving threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Protection across internal and external communications&lt;/STRONG&gt;, including chats and channels, regardless of tenant origin.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These capabilities powered by Microsoft Defender will provide out-of-the-box protection as it will be enabled by default and will be available for all Teams enterprise users, with no additional configuration required. This ensures that every user benefits from advanced protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 1: Recipient view of message warnings&lt;/img&gt;&lt;img&gt;Figure 2: Sender view of message warnings&lt;/img&gt;
&lt;H3&gt;Empowering Users and SOC Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Security is a shared responsibility. We’re enabling &lt;A href="https://learn.microsoft.com/defender-office-365/submissions-teams" target="_blank" rel="noopener"&gt;users to report&lt;/A&gt; false negatives (FN) and false positives (FP) directly from Teams messages. These reports feed into Microsoft Defender investigation workflows, helping improve detection accuracy and reduce support overhead.&lt;/P&gt;
&lt;P&gt;Users can now report potentially malicious messages or messages incorrectly detected as malicious directly from the message context menu in Microsoft Teams:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Report as security risk&lt;/STRONG&gt;: For messages that seem suspicious but weren’t flagged.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Report as not security risk&lt;/STRONG&gt;: For messages that were flagged but are actually safe.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This enables users to actively contribute to their organization's security management and protection efforts, while simultaneously enhancing the accuracy of Microsoft Defender detection controls. Reports may be submitted for both internal and external communications including chats, meetings, and channels ensuring comprehensive coverage across all collaboration platforms such as Teams web, desktop, and mobile clients. Upon submission, these reports are accessible to administrators and security operations personnel in the Microsoft Defender portal as incidents, where they can efficiently triage, investigate, and respond.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 3: Report a concern&lt;/img&gt;&lt;img&gt;Figure 4: Report a wrong detection&lt;/img&gt;
&lt;H3&gt;Holistic Visibility for Security Operation Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Security Operation teams need context, coverage, and control. That’s why we’ve introduced three new Advanced Hunting tables in Microsoft Defender designed specifically to surface Microsoft Teams message metadata and enable deep investigations across both internal and external communications.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;MessageEvents&lt;/STRONG&gt;: Captures metadata for all Teams messages containing URLs at the time of delivery.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MessagePostDeliveryEvents&lt;/STRONG&gt;: Surfaces messages that were flagged as malicious after delivery, including Zero-hour auto purge (ZAP) actions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;MessageURLInfo&lt;/STRONG&gt;: Provides granular details on URLs extracted from Teams messages.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These tables are now generally available in the &lt;A href="https://security.microsoft.com/v2/advanced-hunting" target="_blank" rel="noopener"&gt;Microsoft Defeder portal&lt;/A&gt; providing direct insight into Teams message flows.&lt;/P&gt;
&lt;P&gt;SOC teams can now hunt across all external (federated) messages, not just messages that contain URLs. This is a major step forward in enabling cross-tenant threat detection and response, especially in today’s hybrid collaboration environments. All three tables are accessible via &lt;A href="https://learn.microsoft.com/en-us/graph/api/security-security-runhuntingquery?view=graph-rest-1.0&amp;amp;tabs=http" target="_blank" rel="noopener"&gt;Advanced Hunting APIs&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/streaming-api" target="_blank" rel="noopener"&gt;Streaming APIs&lt;/A&gt;, allowing SOC teams to integrate hunting workflows into their existing automation pipelines.&lt;/P&gt;
&lt;P&gt;To further enhance visibility, we’ve added a new column called &lt;STRONG&gt;SafetyTip&lt;/STRONG&gt; to both the MessageEvents and MessagePostDeliveryEvents tables. This column flags whether a &lt;STRONG&gt;URL warning tip&lt;/STRONG&gt; was shown to the user in the Teams client, helping SOC teams distinguish between warning and block detections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 5: Hunt on message warnings&lt;/img&gt;
&lt;P&gt;Third-party security information and event management (SIEM) solutions can also integrate with and utilize these hunting tables via the Microsoft Defender Streaming API. For instance, in Splunk, the new tables may be configured to automatically flow into your Splunk instance, supporting extended data retention by leveraging the latest version of the Microsoft Defender Splunk connector. It is important to ensure that the new Teams protection tables are selected during connector configuration to enable the continuous transfer of relevant data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 6: Connector config and version needed to connect to 3rd party SIEMs&lt;/img&gt;
&lt;H3&gt;Empower Security Teams to Act Against Threats&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We’ve introduced a powerful new capability that gives security teams greater control and confidence when managing potential risks in Teams. With this feature, security admins can investigate suspicious conversations in Advanced Hunting and instantly &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/teams-message-entity-panel" target="_blank" rel="noopener"&gt;remove internal users&lt;/A&gt; from unsafe chats, revoking their access and clearing all prior chat history to prevent further exposure. This proactive step ensures employees stay protected from threat actors and sensitive information remains secure.&lt;/P&gt;
&lt;P&gt;The experience is streamlined through the &lt;STRONG&gt;Action Wizard&lt;/STRONG&gt;, accessible directly from the Teams entity flyout, making remediation fast and intuitive. Every action is fully traceable in &lt;STRONG&gt;Action Center&lt;/STRONG&gt;, providing a centralized view for monitoring and validating security interventions, while &lt;STRONG&gt;audit logs&lt;/STRONG&gt; deliver records for reporting. These capabilities empower organizations to contain risks in real time, strengthen collaboration security, and maintain trust across their digital workplace.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 7: remove a user from a conversation directly from the defender portal&lt;/img&gt;
&lt;H3&gt;Response capabilities for Security Teams&lt;/H3&gt;
&lt;P&gt;&lt;EM&gt;For worldwide customers with an MDO (Microsoft Defender for Office 365) P2 license or an E5 license&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;In addition to these enhanced detection, investigation and hunting capabilities, security team members are now able to perform advanced response actions for Microsoft Teams directly in the Microsoft Defender portal. Security Operations Center (SOC) analysts and admins can directly block malicious domains from within the &lt;A href="https://security.microsoft.com/tenantAllowBlockList" target="_blank" rel="noopener"&gt;Microsoft Defender portal&lt;/A&gt;, seamlessly adding targeted entries to the Teams Admin Center (TAC) blocked domains list without leaving their security workflows and switching portals. This capability enables near real-time protection when suspicious or abusive external organizations are identified. SOC teams can immediately block suspicious organizations, effectively halting new external chat messages, invites, and channel communications from those domains while deleting existing ones. These controls empower organizations to react to emerging risks in minutes, all while maintaining compliance and reducing operational overhead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 8: Block domains in Teams via TABL&lt;/img&gt;
&lt;H3&gt;Expanding Admin Quarantine and Zero-Hour Auto-Purge (ZAP) to MDO P1&lt;/H3&gt;
&lt;P&gt;We are also extending the power of Zero-hour auto-purge (ZAP) and Teams admin quarantine to even more customers, bringing this post-delivery protection layer to Microsoft Defender for Office 365 Plan 1. This reinforces our commitment to secure-by-default protection across all Microsoft Teams environments.&lt;/P&gt;
&lt;P&gt;ZAP automatically moves malicious messages containing phishing or malware URLs from internal Teams chats and channels to admin quarantine in the Microsoft Defender portal. This post-delivery protection ensures that even if a threat evades initial detection, it can be neutralized before causing harm.&lt;/P&gt;
&lt;P&gt;This capability will be enabled by default for all Microsoft Teams customers with Microsoft Defender for Office Plan 1, providing immediate protection without requiring additional configuration. Security admins maintain full control through the Microsoft Defender portal, where quarantined Teams messages can be reviewed, managed, and released if needed. This expansion ensures more customers benefit from continuous, automated threat removal, strengthening protection across Teams with no extra effort required&lt;/P&gt;
&lt;P&gt;These new protections reflect our commitment to delivering security that scales effortlessly with the way people work today. By combining real-time detection, post-delivery protection, and user-driven feedback loops, we’re giving organizations the tools to stay ahead of emerging threats without slowing down collaboration.&lt;/P&gt;
&lt;P&gt;These capabilities are engineered to operate efficiently in the background, providing assurance and proactive security measures. This enables frontline workers, IT administrators, and SOC analysts to concentrate on their core responsibilities while maintaining a secure working environment.&lt;/P&gt;
&lt;H3&gt;To learn more&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-about" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-about&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-quick-configure" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-quick-configure&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/mdo-support-teams-sec-ops-guide" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-support-teams-sec-ops-guide&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 14 Jan 2026 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/secure-collaboration-in-microsoft-teams-with-efficient-and/ba-p/4484479</guid>
      <dc:creator>MalvikaBalaraj</dc:creator>
      <dc:date>2026-01-14T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Strengthening calendar security through enhanced remediation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/strengthening-calendar-security-through-enhanced-remediation/ba-p/4456876</link>
      <description>&lt;P&gt;In today’s evolving threat landscape, phishing attacks are becoming increasingly sophisticated, often leveraging meeting invites to bypass traditional defenses. While Security Operations (SOC) teams rely on Microsoft Defender’s remediation actions to remove malicious emails, a hidden risk persists: calendar entries created by Outlook during email delivery. These entries can remain active even after the email is deleted, leaving users exposed to harmful content. This update addresses that gap.&lt;/P&gt;
&lt;H4&gt;Remediation supports cleaning up calendar entries&lt;/H4&gt;
&lt;P&gt;SOC teams currently use remediation actions such as &lt;STRONG&gt;Move to Junk&lt;/STRONG&gt;, &lt;STRONG&gt;Delete&lt;/STRONG&gt;, &lt;STRONG&gt;Soft Delete&lt;/STRONG&gt;, and &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; to quickly eliminate email threats from user inboxes. However, meeting invite emails introduce an additional challenge. Even after the email is removed, Outlook automatically creates a calendar entry during delivery, which remains accessible to users.&lt;/P&gt;
&lt;P&gt;For example, consider a phishing email sent as a meeting invite. Despite the admin removing the email from the user’s inbox, the user can still interact with the same malicious content via the calendar entry.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;This residual entry may contain harmful links or phishing content, creating a security gap. With this update, we’re taking the first step toward closing that gap. &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; will now also remove the associated calendar entry for any meeting invite email. This ensures threats are fully eradicated—not just from the inbox but also from the calendar—reducing the risk of user interaction with malicious content.&lt;/P&gt;
&lt;P&gt;This change applies to &lt;STRONG&gt;Hard Delete&lt;/STRONG&gt; actions taken from any surface, including Explorer, Advanced Hunting, and API.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) Deleted calendar entries can be restored by resending the meeting invite.&lt;/P&gt;
&lt;P&gt;2) This action does not remove calendar entries manually added by users via .ics files.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H4&gt;Ability to Block URL domains via submission/TABL actions from Explorer&lt;/H4&gt;
&lt;P&gt;SOC teams can currently add senders and URLs to the TABL block list when submitting false negatives to Microsoft. However, phishing campaigns often use variations of URLs under the same parent domain, making full URL blocking less effective.&lt;/P&gt;
&lt;P&gt;With this update, TABL options for URL domains are now dynamically surfaced, enabling SOC teams to block entire domains without leaving their workflow. This enhancement simplifies remediation and strengthens defenses against domain-based phishing attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;These updates strengthen SOC remediation workflows by closing critical security gaps and ensuring threats are fully neutralized across all user touchpoints. By extending remediation to calendar entries and enabling domain-level URL blocking, we deliver comprehensive protection that reduces risk, streamlines operations, and safeguards user experiences. At Microsoft, our priority is your security, and we remain committed to empowering SOC teams with tools that make defense smarter and more effective.&lt;/P&gt;
&lt;H4&gt;Learn more:&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/remediate-malicious-email-delivered-office-365" target="_blank"&gt;Remediate malicious email that was delivered in Office 365 - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 17:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/strengthening-calendar-security-through-enhanced-remediation/ba-p/4456876</guid>
      <dc:creator>nithinnara</dc:creator>
      <dc:date>2025-11-24T17:00:00Z</dc:date>
    </item>
    <item>
      <title>Microsoft Ignite 2025: Transforming Phishing Response with Agentic Innovation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</link>
      <description>&lt;P&gt;Phishing attacks remain one of the most persistent and damaging threats to organizations worldwide. Security teams are under constant pressure to investigate a growing number of user reported phishing emails daily, ensuring accurate verdicts and timely responses. As threats grow in volume and sophistication, SOC teams are forced to spend valuable time triaging and investigating, often at the expense of strategic defense and proactive threat hunting.&lt;/P&gt;
&lt;P&gt;At Microsoft Ignite 2025 we are delivering innovation that showcases our continued commitment to infuse AI agents, and agentic workflows into the core of our email security solution and SOC operations to automate repetitive tasks, accelerate investigations, and provide transparent, actionable insights for every reported phishing email. In addition, we continue to invest in our ecosystem partnerships to empower customers with seamless integrations, as they adopt layered security solutions to&amp;nbsp;comply with&amp;nbsp;regulatory requirements, enhance detection, and ensure robust protection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today I’m excited to announce:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;General Availability of the Security Copilot Phishing Triage Agent&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Agentic Email Grading System in Microsoft Defender&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Cisco and VIPRE Security Group join the Microsoft Defender ICES ecosystem&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;The Security Copilot Phishing Triage Agent is now generally available&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In March 2025, we introduced the &lt;A href="https://www.youtube.com/watch?v=lHjkt5V6AZw\" target="_blank"&gt;Phishing Triage Agent&lt;/A&gt;, designed to autonomously handle user-submitted phishing reports at scale. The agent classifies incoming alerts, resolves false positives, and escalates only the malicious cases that require human expertise. Today, we’re announcing its general availability. We will also be extending the agent to triage alerts for identity and cloud alerts.&lt;/P&gt;
&lt;P&gt;The Phishing triage agent automates repetitive tasks, accelerates investigations, and every decision is transparent, allowing security teams to focus on what matters most—investigating real threats and strengthening the overall security posture. Early results prove how it is transforming analyst work:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identified 6.5X more malicious alerts&lt;/LI&gt;
&lt;LI&gt;Improved verdict accuracy by 77%&lt;/LI&gt;
&lt;LI&gt;Agent supported analysts spent 53% more time investigating real threats&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=Y_hfh1PGvEM/1763429041212" data-video-remote-vid="https://www.youtube.com/watch?v=Y_hfh1PGvEM/1763429041212" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FY_hfh1PGvEM%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DY_hfh1PGvEM&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FY_hfh1PGvEM%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Agentic email grading: Advanced analysis of phishing email submissions&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;When customers report suspicious messages to Microsoft, they expect clarity, speed, and actionable insights to protect their environment. They expect a response they can trust, understand easily, and take additional investigation and response action for the organization.&lt;/P&gt;
&lt;P&gt;Previously, when customers reported messages to Microsoft, our response depended largely on manual human grader reviews, creating delays and inconsistent verdicts. Customers often waited several hours for a response, and sometimes it lacked clarity on how a verdict was reached.&lt;/P&gt;
&lt;P&gt;Today, we are excited to announce that we integrated an &lt;STRONG&gt;agentic grading system&lt;/STRONG&gt; into the Microsoft Defender submission analysis and response workflow when customers report phishing messages to Microsoft.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Image 2: Agentic Email Grading: Advanced analysis of phishing email submissions&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The agentic grading system brings a new level of speed and transparency to phishing analysis. It uses large language models (LLMs) orchestrated within an agentic workflow to analyze phishing emails, assess the full content of a submitted email, and communicate context and related metadata. This system combines advanced AI with existing machine learning models and human review for additional levels of accuracy and transparency for decision making. Every verdict comes with higher quality, clear verdicts, and context-rich explanations tailored to each phishing email submission. Additionally, it establishes a feedback mechanism that enhances continuous learning and self-healing, thereby strengthening and optimizing protection over time.&lt;/P&gt;
&lt;P&gt;By reducing reliance on manual reviews, users will experience lower wait times, faster responses and higher-quality results. It will enable security teams to respond promptly and act confidently against phishing threats.&lt;/P&gt;
&lt;P&gt;Over time we plan to expand beyond phishing verdicts to include &lt;STRONG&gt;spam, scam, bulk, and clean classifications&lt;/STRONG&gt;, making the process more comprehensive. The system will continue to evolve through feedback and adapt to emerging attack patterns.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;How to view agentic submission responses in Microsoft Defender&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When you report a suspicious email—whether as an admin or an end user—you can now see how Microsoft Defender’s new &lt;STRONG&gt;agentic grading system&lt;/STRONG&gt; evaluates your submission. To view agentic grading system responses, follow the steps below:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Report the suspicious email&lt;/STRONG&gt;&lt;BR /&gt;Submit the email through the admin submission or user-reported submission process.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Sign in to Microsoft Defender&lt;/STRONG&gt;&lt;BR /&gt;Go to https://security.microsoft.com.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Navigate to Submissions&lt;/STRONG&gt;&lt;BR /&gt;From the left menu, select:&lt;BR /&gt;Investigation &amp;amp; response &amp;gt; Actions &amp;amp; submissions &amp;gt; Submissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Choose the correct tab&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;Emails for admin submissions&lt;/LI&gt;
&lt;LI&gt;User reported for user submissions&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Open the submission details&lt;/STRONG&gt;&lt;BR /&gt;Click the email submission you want to review. A flyout panel will display Result details.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Look for the Agentic AI note&lt;/STRONG&gt;&lt;BR /&gt;If the verdict was generated by Agentic AI, you’ll see:&lt;BR /&gt;&lt;EM&gt;“AI-generated content may be incorrect. Check it for accuracy.”&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Image 3: AI generated explainable verdicts&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Expanding the Integrated Cloud Email Security (ICES) ecosystem&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;In June, we introduced the Microsoft Defender &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/introducing-the-microsoft-defender-for-office-365-ices-vendor-ecosystem/4424817" target="_blank"&gt;ICES vendor ecosystem&lt;/A&gt;, a&amp;nbsp;unified framework that enables seamless integration of Microsoft’s Defender’s email security solution with trusted third-party vendors. Today we are excited to announce two new partners: &lt;STRONG&gt;Cisco&lt;/STRONG&gt; and &lt;STRONG&gt;VIPRE Security Group&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The addition of these partners to our ecosystem reinforces our ongoing commitment to support customers in their choice to strategically layer their email security solutions. Organizations benefit from a unified quarantine experience, and a deep integration across the various SOC experiences including threat explorer, advanced hunting, and the email entity page, while providing clear insight into detection efficacy of each solution.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;As we continue to innovate, our commitment remains steadfast: empowering defenders with intelligent, transparent, and integrated security solutions that adapt to the evolving threat landscape. By infusing agentic AI into every layer of Microsoft Defender, expanding our ecosystem of trusted partners, and delivering faster, more actionable insights, we’re helping organizations build resilience and stay ahead of attackers. Our strategy is rooted in delivering real value making security simpler, more effective, and adapted to the needs of every customer.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn More:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Want to know what else is new in Microsoft Defender at Ignite 2025 check out the blog &lt;A href="https://aka.ms/DefenderAIIgnite25" target="_blank"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;For info on how to complete &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-admin?view=o365-worldwide" target="_blank"&gt;admin phish submissions&lt;/A&gt;, please see&lt;/LI&gt;
&lt;LI&gt;For end user reported phish submissions, you need to have it configured for reporting messages to Microsoft. &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-user-reported-messages-custom-mailbox?view=o365-worldwide" target="_blank"&gt;Set it up today&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Join us at Microsoft Ignite&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Join us at Microsoft Ignite to see these advancements in action and discover how intelligent, agentic defense is becoming accessible to every organization. Don’t miss our featured sessions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK239?source=sessions" target="_blank"&gt;&lt;STRONG&gt;AI vs AI: Protect email and collaboration tools with Microsoft Defender&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;on Thursday, November 20&lt;SUP&gt;th&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/86f5e0a7-8748-4914-a097-cd84ee1a4395" target="_blank"&gt;Learn More&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft Defender: Building the agentic SOC with guest Allie Mellen&lt;/STRONG&gt; on Wednesday, November 19&lt;SUP&gt;th&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK241?source=sessions" target="_blank"&gt;Learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Empowering the SOC: Security Copilot and the rise of Agentic Defense&lt;/STRONG&gt; on Friday, November 21&lt;SUP&gt;st&lt;/SUP&gt;. &lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK1731?source=sessions" target="_blank"&gt;Learn more&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-ignite-2025-transforming-phishing-response-with/ba-p/4470791</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2025-11-18T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Office 365: Fine-Tuning</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-fine-tuning/ba-p/4469416</link>
      <description>&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;In incident response, most business email compromise&amp;nbsp;doesn’t&amp;nbsp;start with “sophisticated zero-day malware.” It starts with configuration gaps:&amp;nbsp;forwarding&amp;nbsp;mail outside the tenant, users clicking through Safe Links warnings, impersonation policies left at day-one defaults, or post-delivery cleanup still relying on a human analyst at 2:00 AM. Those gaps are what attackers&amp;nbsp;actually exploit.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog covers our top recommendations for fine-tuning Microsoft Defender for Office 365 configuration from hundreds of deployments and recovery engagements:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Core fine-tuning actions every&amp;nbsp;email or security&amp;nbsp;admin should land right now&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Data-driven bulk mail tuning (BCL and Bulk Mail Insights)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Impersonation and anti-phishing policy hygiene for executive protection&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Automate post-delivery cleanup by enabling Automated Remediation&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Each section includes a short video and practical guidance you can apply&amp;nbsp;immediately&amp;nbsp;in Microsoft Defender for Office 365.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These recommendations align with Microsoft’s “secure by default” direction: applying the Standard and Strict preset security policies to users, using&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to catch configuration drift, and enforcing least-privilege release of high-risk mail.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When possible, enable&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/preset-security-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Preset security policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to give you Microsoft’s recommended settings for Safe Links, Safe Attachments, Anti-Phishing, and Anti-Spam.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you use custom policies (or if you exclude users from the Presets) then use&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;regularly to&amp;nbsp;compare&amp;nbsp;custom&amp;nbsp;policies to&amp;nbsp;the&amp;nbsp;Standard/Strict baselines,&amp;nbsp;since those get updated as Microsoft updates the Preset policies.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Core Fine-Tuning Checklist for Defender for Office 365&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This section&amp;nbsp;highlights&amp;nbsp;six controls we recommend implementing broadly. These are “day one hardening” items we repeatedly&amp;nbsp;validate&amp;nbsp;with customers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Block automatic external forwarding by default&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;Attackers often create hidden inbox rules that quietly forward mail (invoices, purchase orders, wire info) to an external account they control. Use outbound spam policies to block automatic external forwarding for the entire org and then create tightly scoped exceptions only for the handful of mailboxes that legitimately need it. &lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This prevents data leakage and payment fraud scenarios where mail auto-forwards out of your tenant without anyone noticing. Although this setting is on by default (“System Controlled” means that external forwarding is disabled),&amp;nbsp;we’ve&amp;nbsp;found many tenants where this was disabled because the admin&amp;nbsp;didn’t&amp;nbsp;know how to create a custom policy for authorized forwarders. The trick is to order custom outbound policies to run as a higher priority than the default outbound policy which should be set to block auto-forwarded emails. It is&amp;nbsp;a good idea&amp;nbsp;to regularly review the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/exchange/monitoring/mail-flow-reports/mfr-auto-forwarded-messages-report" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;auto forwarded message report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(located in the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://admin.exchange.microsoft.com/#/reports/autoforwardedmessages" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Exchange Admin Center&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Use Enhanced Filtering for Connectors (“skip listing”) when necessary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;If you’re routing inbound mail through a third-party Secure Email Gateway or an on-prem hop before Microsoft 365, Defender will see that intermediary as the source IP instead of the original sending IP, which degrades anti-spoofing effectiveness.&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Enhanced Filtering for Connectors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— also called skip listing — lets Microsoft 365 look past that last hop and evaluate the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;real&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; sending IP and headers, so SPF / DKIM / DMARC and anti-spam logic work correctly.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;This setting does not support&amp;nbsp;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://learn.microsoft.com/exchange/transport-routing#route-incoming-internet-messages-through-the-exchange-online-organization" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;centralized mail routing&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&amp;nbsp;(unless the routing is linear; see the Enhanced Filtering for Connectors&amp;nbsp;learn&amp;nbsp;article), so make sure you are not using that before enabling Enhanced Filtering.&amp;nbsp;Centralized routing is sometimes used by organizations running a hybrid Exchange deployment, connecting Exchange Online with an on-premises Exchange Server organization.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Do this instead of blanket SCL -1 transport rules that “bypass spam filtering for anything coming from our gateway.” Over-bypassing means phishing that slipped through the third-party filter can sail straight to user inboxes, which Microsoft specifically warns against.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Turn on Safe Attachments protection beyond email (SharePoint, OneDrive, Teams)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;In the Safe Attachments “Global settings,” make sure Defender for Office 365 is set to protect files in SharePoint, OneDrive, and Microsoft Teams. When enabled, if a file is identified as malicious, Defender automatically locks the file in-place&amp;nbsp;so users&amp;nbsp;can’t&amp;nbsp;open it in Teams or OneDrive. This gives you malware detonation and containment in collaboration channels, not&amp;nbsp;just&amp;nbsp;email.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This step closes a gap we still see a lot: customers protect mail attachments well, but shared files and Teams chats are wide open. In the 1&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;st&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;part of this blog series, Microsoft MVP Purav Desai describes (&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;here&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) how to prevent users from downloading malicious files by running a SharePoint PowerShell cmdlet:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;
&lt;PRE&gt;&lt;SPAN data-contrast="auto"&gt;Set-SPOTenant&amp;nbsp;-DisallowInfectedFileDownload&amp;nbsp;$true&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Don’t let users click through Safe Links warnings&lt;/SPAN&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links rewrites and time-of-click scans URLs in mail, Office apps, and Teams. In the Safe Links policy, clear “Let users click through to the original URL.” That prevents the classic “I know it says it’s malicious, but I really need to see it…” moment. Users get blocked instead of “warned but allowed.”&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This setting is also enforced in Microsoft’s Standard AND Strict preset security policies where click-through is explicitly disabled.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Go beyond the default Common Attachment filter&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;The anti-malware policy’s&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/anti-malware-protection-about#common-attachments-filter-in-anti-malware-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Common Attachment filter&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;blocks known dangerous file extensions (executable content, scriptable content, etc.). Microsoft ships a default list (historically 50+ high-risk extensions), and you can customize it to block&amp;nbsp;additional&amp;nbsp;file types common in malware delivery, like HTML droppers or password-protected archives. Messages with those file types are treated as malware and quarantined.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Do this centrally rather than relying on users to “spot a suspicious attachment.” Automation beats user judgment here.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Use custom quarantine policies that require admin approval (instead of self-release)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;If you are not using the Preset Policies, you can create a &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/quarantine-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;quarantine policy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to customize the user experience with quarantined messages. For anything phishing-related, I recommend creating a custom policy that allows the user to “request release from admin.” That means users can raise a hand if they think something should not have been quarantined, and an Incident is created for administrators to review before it is released. To me, this strikes the best balance between security and productivity.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;This keeps containment intact and gives the SOC final say. It also creates an auditable workflow: who asked for release, who approved it, and why.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/Kcp1GKVdSbM?si=yg9GEtLkndn3ET1e/1763049724683" data-video-remote-vid="https://youtu.be/Kcp1GKVdSbM?si=yg9GEtLkndn3ET1e/1763049724683" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FKcp1GKVdSbM%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DKcp1GKVdSbM&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKcp1GKVdSbM%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Bulk Mail Insights: Tune BCL using your tenant’s mail&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Bulk email (“graymail”) is noisy. Payroll alerts and&amp;nbsp;benefits&amp;nbsp;notifications are legitimate, but they look exactly like phishing. At the same time, true marketing email (graymail)&amp;nbsp;are&amp;nbsp;also&amp;nbsp;bulk. The traditional response (“just whitelist the sender so users stop complaining”) often opens the door for attacker-looking mail to get delivered straight to executives.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Defender for Office 365 gives you something better: Bulk Mail Insights (a.k.a.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/anti-spam-bulk-senders-insight" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Bulk senders insight&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;). This report shows, over the last&amp;nbsp;60 days, how much mail at each Bulk Complaint Level (BCL 1–9) was delivered vs. blocked, which senders are generating volume, and where users are likely to experience false positives or false negatives. You can interactively simulate raising or lowering the bulk threshold and&amp;nbsp;immediately&amp;nbsp;see, “If we tighten BCL, how many more messages get quarantined? How many of those were&amp;nbsp;probably junk? How many were&amp;nbsp;probably wanted?”&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You stop tuning bulk mail based on anecdotes and start tuning based on real telemetry from your own tenant.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can justify decisions to leadership and audit (“We set BCL at X because here is the simulation showing false positive/false negative impact”).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You avoid blanket allow rules. Instead, you adjust bulk thresholds for legitimate high-volume senders while keeping stricter actions for everyone else.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Note: You can&amp;nbsp;modify&amp;nbsp;the BCL threshold in your default or custom anti-spam policy, but you&amp;nbsp;can’t&amp;nbsp;change it inside the&amp;nbsp;Standard&amp;nbsp;(BCL:6)&amp;nbsp;or Strict&amp;nbsp;(BCL:5)&amp;nbsp;preset security policies themselves. Standard and Strict are already aligned to Microsoft’s recommended baselines.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/EU5jOce49EI?si=J6ZwTJ4lioAffDMX/1763049834960" data-video-remote-vid="https://youtu.be/EU5jOce49EI?si=J6ZwTJ4lioAffDMX/1763049834960" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FEU5jOce49EI%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DEU5jOce49EI&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FEU5jOce49EI%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Additional Links:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://security.microsoft.com/senderinsights" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://security.microsoft.com/senderinsights&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-senders-insight" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/anti-spam-bulk-senders-insight&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-deployment-guide#step-2-configure-threat-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/mdo-deployment-guide#step-2-configure-threat-policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/preset-security-policies#policy-settings-in-preset-security-policies&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/recommended-settings-for-eop-and-office365" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/recommended-settings-for-eop-and-office365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;SPAN class="lia-text-color-15"&gt;Anti-Phishing / Impersonation Tuning: Protect the people attackers&amp;nbsp;actually spoof&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Business email compromise very often looks like this: “Hi, can you handle this payment today?” sent from an address that looks like your CFO or CEO. Microsoft Defender for Office 365 includes targeted impersonation protection, but it only really works if you target your most targeted executives.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here are five pitfalls we see&amp;nbsp;over and over:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Empty or stale VIP list&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Populate “users to protect / high value targets” with executives, finance approvers, legal, anyone authorized to move money or data. Review it monthly. Roles change, and you only get a finite number of protected users (for example, ~350 entries). An out-of-date list silently weakens protection for the people attackers&amp;nbsp;actually impersonate.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Phishing email threshold stuck at 1 forever&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;We find organizations that are not using the preset policies have left their phishing threshold values at the default “1” because of initial false positives. We recommend raising it to match the Standard Preset (“3”) or Strict (“4”).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Weak action&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;If suspicious “CFO” mail just goes to Junk, users can still act on it. High-confidence impersonation of executives should be quarantined with&amp;nbsp;AdminOnly&amp;nbsp;or request-release workflows, not left in end-user control. Tie this back to the custom quarantine policies&amp;nbsp;(discussed later in this article).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Common-name overload&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;If your CEO’s name is something extremely common,&amp;nbsp;you’ll&amp;nbsp;get noise. Expect it.&amp;nbsp;Don’t&amp;nbsp;“turn off” protection for that name —&amp;nbsp;add that address to the Trusted Senders otherwise it will be blocked as an impersonation attempt. Use Trusted Senders / Trusted Domains for known-good partners and vendors so you keep protection high without drowning in alerts.&amp;nbsp;Add only legitimate senders/domains to the Trusted Senders or Trusted Domains instead of lowering enforcement.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;No scheduled review&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This control&amp;nbsp;can’t&amp;nbsp;be “set and forget.” Put impersonation tuning and spoof intelligence review on a monthly checklist. That lets you catch new vendors pretending to be finance, new “urgent wire” lure patterns, and any drift from Standard / Strict baseline that&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; will also call out.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;When done right, impersonation protection is not just “spam reduction.” It’s payment fraud prevention.&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;div data-video-id="https://youtu.be/7ydzG5_CceQ?si=WaNMXfRlaxJon6x0/1763049868383" data-video-remote-vid="https://youtu.be/7ydzG5_CceQ?si=WaNMXfRlaxJon6x0/1763049868383" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F7ydzG5_CceQ&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D7ydzG5_CceQ&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2F7ydzG5_CceQ%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H3 aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Automated Investigation &amp;amp; Response (AIR): Let Defender&amp;nbsp;remove malicious&amp;nbsp;email before your SOC has to!&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;One of the biggest wins you can land quickly is letting Microsoft Defender for Office 365&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/air-auto-remediation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;automatically remove clusters of malicious messages&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;— without waiting for analyst approval on every single item.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here’s how it works. Defender’s&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/defender-office-365/air-about" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Automated Investigation and Response (AIR)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;groups messages into “clusters” based on shared indicators like the same malicious URL or malicious file hash. If you opt in to automatic remediation for those cluster types, AIR will go find every matching copy of that threat across the tenant and soft-delete those messages, not just the one that triggered the alert.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It turns post-delivery cleanup into something that happens immediately instead of “after Tier 1 has time to review.”&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It removes known-bad messages from user mailboxes (and related collaboration surfaces like Teams) before a target can click.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;It dramatically cuts the classic “Did anyone else get this?” manual hunt-and-purge work that burns out SOC analysts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When you configure AIR automation settings in the Microsoft Defender portal (Settings &amp;gt; Email &amp;amp; collaboration &amp;gt; MDO automation settings), you’ll see checkboxes for “Similar files” and “Similar URLs.” Selecting those opts you into automatic soft delete for those clusters. Today, soft delete is the default supported action for these automatic remediations, enabling administrators to undo a deletion, if necessary.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This is Defender for Office 365 Plan 2 / Microsoft 365 E5 functionality, and it’s exactly the kind of “secure operations by default” Microsoft has been pushing: detect, contain, and clean up automatically, then let humans investigate with context instead of manually chasing every copy of a phish.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This automation triggers when malicious clusters are detected.&amp;nbsp;For&amp;nbsp;automating the&amp;nbsp;classification&amp;nbsp;and triage of&amp;nbsp;user-submitted phishing incidents, check out the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/phishing-triage-agent" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Copilot Phishing Triage Agent (&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Preview)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;div data-video-id="https://youtu.be/CvafayjGR-I?si=a0yj1_w3fQzz6xRJ/1763049893316" data-video-remote-vid="https://youtu.be/CvafayjGR-I?si=a0yj1_w3fQzz6xRJ/1763049893316" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FCvafayjGR-I%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DCvafayjGR-I&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FCvafayjGR-I%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Additional Links:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;GA Announcement:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/-/auto-remediation-of-malicious-messages-in-automated/4418047" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://techcommunity.microsoft.com/blog/-/auto-remediation-of-malicious-messages-in-automated/4418047&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Docs:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/air-auto-remediation" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/air-auto-remediation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Final Thoughts&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Defender for Office 365 is more than “email filtering.” It’s part of your security operations surface. The decisions you make about automated remediation (AIR), bulk mail thresholds, Safe Links/Attachment&amp;nbsp;behavior, outbound forwarding, connector hygiene, quarantine policy, and impersonation tuning directly determine how easy — or how hard — it is for an attacker to&amp;nbsp;penetrate&amp;nbsp;your organization.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s current guidance is clear:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Apply Standard or Strict preset security policies so users get&amp;nbsp;the&amp;nbsp;recommended&amp;nbsp;protections by default (for example, Safe Links with no click-through).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;If you must use a custom policy,&amp;nbsp;review the recommendations from the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/configurationAnalyzer" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configuration analyzer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;monthly&amp;nbsp;for new recommendations, or&amp;nbsp;to catch and correct drift whenever someone weakens a control.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Align internal procedures with the excellent&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-sec-ops-guide?view=o365-worldwide" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security Operations Guide for Defender for Office 365.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Lock down quarantine so only admins can release high-risk messages, with an auditable “request release” path for users.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Turn on automated remediation so Defender can remove malicious clusters of messages before anyone clicks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Organizations that land these basics are in a dramatically better position during an incident. Instead of “Who clicked the link?” you can say, “AIR already pulled it, users were blocked from clicking through, outbound forwarding is disabled, and impersonation of the CFO is quarantined for admin review.” That’s what “secure by default” actually looks like in production.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;________&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This blog was authored by &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://mvp.microsoft.com/en-US/MVP/profile/f9cb9fdd-37e8-ea11-a814-000d3a8dfe0d" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;Joe Stocker&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, Microsoft Security MVP and Founder of Patriot Consulting Technology Group, in partnership with the Microsoft Defender for Office 365 product team, including&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Paul Newell&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, Senior Product Manager, Microsoft Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-image-alt=""&gt;Joe Stocker&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;Microsoft Security MVP&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn More and Meet the Author&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt;&amp;nbsp;by the esteemed Microsoft Most Valuable Professionals (MVPs). Now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real-world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit&amp;nbsp;&lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat!&amp;nbsp;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt;&amp;nbsp;for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Additional MVP Tips and Tricks Blogs and Videos in this Four-Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365: Migration &amp;amp; Onboarding" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Migration &amp;amp; Onboarding &lt;/A&gt;by Purav Desai&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" target="_blank" rel="noopener" data-lia-auto-title="Safeguarding Microsoft Teams with Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;Safeguarding Microsoft Teams with Microsoft Defender for Office 365 &lt;/A&gt;by Pierre Thoor&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365&lt;/A&gt; by Mona Ghadiri&lt;/LI&gt;
&lt;LI&gt;(&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416" target="_blank" rel="noopener" data-lia-auto-title="This" data-lia-auto-title-active="0"&gt;This&lt;/A&gt; post) "Microsoft Defender for Office 365: Fine-Tuning" by Joe Stocker&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 19 Nov 2025 20:52:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-fine-tuning/ba-p/4469416</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-19T20:52:09Z</dc:date>
    </item>
    <item>
      <title>You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/you-may-be-right-after-all-disputing-submission-responses-in/ba-p/4467151</link>
      <description>&lt;H5&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG class="lia-align-left"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN class="lia-text-color-15"&gt;Introduction&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG class="lia-align-left"&gt;As a&amp;nbsp;&lt;A class="lia-external-url" href="https://mvp.microsoft.com/mvp" target="_blank" rel="noopener"&gt;Microsoft MVP (Most Valuable Professional)&lt;/A&gt; specializing in SIEM, XDR, and Cloud Security,&lt;/STRONG&gt; I have witnessed the rapid evolution of cybersecurity technologies, especially those designed to protect organizations from sophisticated threats targeting email and collaboration tools. Microsoft Defender for Office 365 introduced an LLM-based engine to help better &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/submissions-response-using-ai-for-enhanced-result-explainability/4423843" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;classify&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;phishing emails that, these days, are mostly written using AI anyways about a year ago. Today,&amp;nbsp;I'm&amp;nbsp;excited to spotlight a new place AI has been inserted into a workflow to make it better…a feature that elevates the transparency and responsiveness of threat management: the ability to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/submissions-admin" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;dispute a submission response&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; directly within Microsoft Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Understanding the Challenge &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;While the automated and human-driven analyses are robust in Defender for Office 365, there are occasions where the response—be it a verdict of "benign" or "malicious"— doesn’t fully align with the security team's context or threat intelligence. If you are a Microsoft 365 organization with Exchange Online mailboxes, you’re probably familiar with how admins can use the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Submissions&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;page in the Microsoft Defender portal to&amp;nbsp;submit&amp;nbsp;messages, URLs, and attachments to Microsoft for analysis. &lt;/SPAN&gt; &lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;As a recent enhancement, now all the &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/submissions-response-using-ai-for-enhanced-result-explainability/4423843" target="_blank" rel="noopener"&gt;admin submissions use LLM based response&lt;/A&gt; for better explainability.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;In the past, disputing such verdicts required separate support channels, using Community support, or manual email processes, often delaying resolution and impacting the speed of cyber operations.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN class="lia-text-color-15"&gt;Introducing the Dispute Submission Response Feature &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;With the new dispute submission response feature, Microsoft Defender for Office 365 bridges a critical gap in the incident response workflow. Now, when a security analyst or administrator receives a verdict on a submitted item, they have the option to dispute the response directly within the Microsoft 365 Defender portal. This feature streamlines feedback, allowing teams to quickly flag disagreements and provide additional context for review at the speed of operations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;How It Works &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Upon submission of a suspicious item, Microsoft Defender for Office 365 provides a response indicating its assessment—malicious, benign, or other categorizations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;If the security team disagrees with the verdict, they can select the "Dispute" option and submit their rationale, including supporting evidence and threat intelligence. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;The disputed case is escalated directly to Microsoft’s threat research team for further review, and the team is notified of progress and outcomes. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This direct feedback loop not only empowers security teams to advocate for their organization's unique context, but also enables Microsoft to continually refine detection algorithms and verdict accuracy based on real-world input, because security is a team sport.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Benefits for Security Operations &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Faster Resolution&lt;/STRONG&gt;: Streamlined dispute submission&amp;nbsp;eliminates&amp;nbsp;the need for external support tickets and escalations, reducing turnaround time for critical cases. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Greater Transparency&lt;/STRONG&gt;: The feature fosters a collaborative relationship between customers and Microsoft, ensuring that verdicts are not final judgments but points in an ongoing dialogue. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Continuous Improvement&lt;/STRONG&gt;: Feedback from disputes enhances Microsoft’s threat intelligence and improves detection for all Defender for Office 365 users. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL class="lia-align-left"&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="7" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Empowerment&lt;/STRONG&gt;: Security teams gain a stronger voice in the protection of their environment, reinforcing trust in automated defenses. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;div data-video-id="https://youtu.be/RebmuifVfPA?si=CFzIjqPEcSdea-j2/1762462354864" data-video-remote-vid="https://youtu.be/RebmuifVfPA?si=CFzIjqPEcSdea-j2/1762462354864" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FRebmuifVfPA%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DRebmuifVfPA&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FRebmuifVfPA%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;H5 class="lia-align-left"&gt;&lt;SPAN class="lia-text-color-15"&gt;MVP Insights: Real-World Impact &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;Having worked with global enterprises,&amp;nbsp;I’ve&amp;nbsp;seen how nuanced and context-specific threats can be. Sometimes, what appears benign to one organization may be a targeted attack for another, a&amp;nbsp;slight modification to a URL may catch one email, but not others, as slight changes are made as billions of emails are sent. We are only as good as the consortium. The ability to dispute submission responses creates a vital safety net, ensuring that security teams are not forced to accept verdicts that could expose them to risk.&amp;nbsp;It’s&amp;nbsp;a welcome step toward adaptive, user-driven security operations. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5 class="lia-align-left" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Conclusion &amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-contrast="auto"&gt;The dispute submission response feature in Microsoft Defender for Office 365 is one of the most exciting features for me, because it focuses on enabling organizations striving for agility and accuracy in threat management. By enabling direct, contextual feedback, Microsoft empowers security teams to play an active role in shaping their defenses. As an MVP, I encourage all users to leverage this feature, provide detailed feedback, and help drive the future of secure collaboration in the cloud. You may be right after all.  &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;_________&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;This blog has been generously and expertly authored by Microsoft Security MVP, &lt;A href="https://mvp.microsoft.com/en-US/MVP/profile/9126849d-1cb4-ed11-b596-000d3a1ad36b" target="_blank" rel="noopener"&gt;Mona Ghadiri&lt;/A&gt;&amp;nbsp;with support of the Microsoft Defender for Office 365 product team.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-image-alt=""&gt;Mona Ghadiri&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;Microsoft Security MVP&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-left"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 class="lia-align-left"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;BR /&gt;&lt;SPAN class="lia-text-color-20"&gt;Learn More and Meet the Author&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P class="lia-align-left"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks &lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt; by the esteemed Microsoft Most Valuable Professionals (MVPs). Now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real-world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit &lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat! &lt;A class="lia-external-url" href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt; for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P class=""&gt;&lt;STRONG&gt;2) Additional MVP Tips and Tricks Blogs and Videos in this Four-Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;1.&amp;nbsp; &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365: Migration &amp;amp; Onboarding" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Migration &amp;amp; Onboarding&lt;/A&gt; by Purav Desai&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;2. &amp;nbsp;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" target="_blank" rel="noopener" data-lia-auto-title="Safeguarding Microsoft Teams with Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;Safeguarding Microsoft Teams with Microsoft Defender for Office 365&lt;/A&gt; by Pierre Thoor&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;3. (&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="This" data-lia-auto-title-active="0"&gt;This&lt;/A&gt; blog post) You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365 by Mona Ghadiri&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;4. &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416?previewMessage=true" target="_blank" rel="noopener" data-lia-auto-title=" Microsoft Defender for Office 365: Fine-Tuning | Real-world Defender for Office 365 tuning that closes real attack paths " data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Fine-Tuning | Real-world Defender for Office 365 tuning that closes real attack paths &lt;/A&gt;by Joe Stocker&lt;/P&gt;
&lt;H4&gt;&lt;SPAN style="color: #34495e;"&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI class="lia-align-left"&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI class="lia-align-left"&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 19 Nov 2025 14:59:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/you-may-be-right-after-all-disputing-submission-responses-in/ba-p/4467151</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-19T14:59:01Z</dc:date>
    </item>
    <item>
      <title>Ensure your ICES solution works seamlessly alongside Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/ensure-your-ices-solution-works-seamlessly-alongside-microsoft/ba-p/4466691</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today’s evolving threat landscape, organizations increasingly rely on layered email security solutions to protect users and sensitive data. Microsoft supports and collaborates with Integrated Cloud Email Security (ICES) vendors that work in conjunction with Microsoft Defender, and customers who choose a layered approach to email security to ensure the maximum level of email protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;It is, however, key that when integrating ICES solutions with Microsoft Defender, to follow best practices to maximize security and operational efficiency. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this blog, we explain these best practices in more detail and outline three other routing techniques commonly used across ICES vendors. This will allow organizations to understand the impact of non-standard mail routing configurations on their security operations (SOC) effectiveness and partner with their ICES vendors on the best approach.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Best&amp;nbsp;practices&amp;nbsp;for ICES&amp;nbsp;vendor&amp;nbsp;integration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has outlined best practices for third-party solutions integrating with Microsoft 365, where recommended and supported approaches include DNS mail routing or the Graph API.&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;This article&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;provides more details on&amp;nbsp;these&amp;nbsp;approaches and&amp;nbsp;also outlines&amp;nbsp;integration&amp;nbsp;techniques&amp;nbsp;that we do not recommend.&amp;nbsp;By using these best practices, any&amp;nbsp;3&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-fontsize="12"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;party&amp;nbsp;email&amp;nbsp;security&amp;nbsp;vendor&amp;nbsp;can ensure that their solution works seamlessly alongside Microsoft&amp;nbsp;Defender.&amp;nbsp;In addition, we recently&amp;nbsp;launched&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-ices-vendor-ecosystem" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender ICES vendor ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. This gives partners an additional&amp;nbsp;option&amp;nbsp;for integration, where we partner directly with&amp;nbsp;the&amp;nbsp;solution provider&amp;nbsp;to build a deeper&amp;nbsp;integration between the ICES solution and Microsoft Defender.&amp;nbsp;We&amp;nbsp;harmonize telemetry, email verdicts, security policies, and more,&amp;nbsp;to&amp;nbsp;provide&amp;nbsp;joint customers with optimized&amp;nbsp;protection and SOC workflows&amp;nbsp;in the Defender portal.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Non-standard email routing&amp;nbsp;techniques&amp;nbsp;used by ICES&amp;nbsp;vendors&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We know that as the ICES space evolved, several vendors integrated with Microsoft Exchange using non-standard email routing techniques, such as journaling, connector-based routing, and post-delivery actions. These functions were originally designed for different purposes. When deployed alongside Microsoft Defender, these integration approaches can introduce unique complexities for mail flow and SOC operations. Understanding how these techniques work and their potential impact is essential for making informed decisions about your organization’s email security architecture and are outlined below.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Journaling for email security benchmarking&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/security-and-compliance/journaling/journaling" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Email journaling&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(Figure 1) is&amp;nbsp;a legacy Exchange Online feature originally designed for archiving and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;to help&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;organizations meet legal, regulatory, and organizational compliance requirements by recording inbound and outbound email communications.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;While journaling was designed for archiving and similar use cases, we know that various ICES vendors utilize journaling rules to route emails to the vendor’s test environment to evaluate the effectiveness of their solution.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Journaling occurs before Defender filtering, so both solutions act&amp;nbsp;independently and partially, complicating operational clarity for SOC teams.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This approach&amp;nbsp;can lead to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;duplicate catch scenarios&lt;/EM&gt;,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;&amp;nbsp;therefore misstating the unique catch rate of&amp;nbsp;the ICES vendor&lt;/STRONG&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;If a journaled copy of a phishing email is routed to an ICES vendor, this occurs&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;before it was filtered by Microsoft Defender&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. Consequently, both Microsoft Defender and the ICES vendor now simultaneously assess the message, and both solutions may act on it independently. This often results in duplicate catch&amp;nbsp;scenarios&amp;nbsp;and creates ambiguity around which solution blocked the threat, ultimately making it challenging to assess the true&amp;nbsp;effectiveness of each layer. Some ICES vendors may consider every email they filter “a&amp;nbsp;miss by Microsoft Defender”. However, as journaling occurs before Defender&amp;nbsp;filtering, it’s generally an incomplete representation.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Therefore, we do not recommend the implementation of journaling for benchmarking or operational clarity purposes of ICES vendor solutions that operate next to Microsoft Defender.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Journaling + post-delivery actions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Some vendors combine journaling with post-delivery actions via Graph API or&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/client-developer/exchange-web-services/ews-applications-and-the-exchange-architecture" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Exchange Web Services&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;(EWS). This approach enables them to take remediation actions on emails after they have been delivered to users’ mailboxes, such as moving messages to the Junk folder or adding labels to alert users of potential threats. However, if Defender quarantines a message first, the ICES vendor may not be able to perform these actions, limiting their impact. Furthermore, when a vendor deletes and recreates a message using EWS, it can result in duplicate message IDs, which fragments SOC visibility and slows incident response. As a result, these configurations should be avoided, as they can lead to unreliable investigations and operational complexity.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Connector-based implementations&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/set-up-connectors-to-route-mail" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Connectors&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;are typically used to route mail between Exchange Online and on-premises or non-Microsoft systems. Some vendors repurpose this mechanism to:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Route&amp;nbsp;messages out of Exchange Online after Microsoft Defender filtering.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Apply their own filtering.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reinject the message as a new email.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Using connectors to send messages out of Exchange Online after Microsoft Defender filtering, apply additional vendor filtering, and then return them as new emails introduces major&amp;nbsp;operational risks.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Reinjecting messages strips the original sender authentication context (SPF, DKIM, DMARC), which can lead to false positives, duplicate quarantines, and inconsistent reporting across tools like Explorer, Advanced Hunting, and Message Trace in Microsoft Defender. With this configuration, SOC teams may&amp;nbsp;see multiple message IDs for the same email, making it difficult to correlate events and accurately track message disposition.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;This also impacts post-delivery protections such as&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/zero-hour-auto-purge" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Zero-hour Auto Purge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, which may fail or be misapplied. These issues increase investigation time, reduce visibility, and can undermine existing protections, impacting the overall security of an&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;organization.&amp;nbsp;That’s why&amp;nbsp;our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service#integration-via-in-and-out-mail-routing" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;documentation states that we strongly recommend avoiding this configuration.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When assessing statistics or performance claims about Microsoft Defender’s effectiveness, it’s important to keep in mind how deployment configurations can shape outcomes. As outlined above, techniques such as journaling, connector-based routing, and post-delivery actions may introduce complexities that affect how performance is measured. These integration approaches can result in discrepancies within metrics, making it challenging to accurately attribute detections or gauge overall effectiveness. It is essential for security leaders and SOC teams to interpret results and make informed decisions about your organization’s email security posture.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft’s&amp;nbsp;commitment to&amp;nbsp;effective ICES&amp;nbsp;vendor&amp;nbsp;integration&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By understanding the impact of&amp;nbsp;the various&amp;nbsp;integration techniques, security leaders can ensure their layered email security delivers&amp;nbsp;streamlined SOC workflows&amp;nbsp;and the highest level of protection for email.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft is committed to working collaboratively&amp;nbsp;with all&amp;nbsp;ICES vendors&amp;nbsp;to help&amp;nbsp;them&amp;nbsp;embrace best&amp;nbsp;practices&amp;nbsp;in integrating with Microsoft Exchange so they can work effectively alongside Microsoft Defender.&amp;nbsp;Whether using the&amp;nbsp;documented&amp;nbsp;best&amp;nbsp;practices&amp;nbsp;with&amp;nbsp;Microsoft&amp;nbsp;Exchange&amp;nbsp;or&amp;nbsp;joining&amp;nbsp;the Defender&amp;nbsp;ecosystem&amp;nbsp;to build an even deeper integration,&amp;nbsp;either approach will help ensure that&amp;nbsp;the&amp;nbsp;solutions&amp;nbsp;work seamlessly alongside Microsoft&amp;nbsp;Defender.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Learn more&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="0" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-integrate-security-service" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Integration best practices&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-ices-vendor-ecosystem" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender ICES vendor ecosystem&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="-" data-font="Aptos" data-listid="1" data-list-defn-props="{&amp;quot;335551671&amp;quot;:0,&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Aptos&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;-&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/07/17/transparency-on-microsoft-defender-for-office-365-email-security-effectiveness/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Email security effectiveness benchmarking&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 06 Nov 2025 04:36:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/ensure-your-ices-solution-works-seamlessly-alongside-microsoft/ba-p/4466691</guid>
      <dc:creator>JeffreyPinkston</dc:creator>
      <dc:date>2025-11-06T04:36:32Z</dc:date>
    </item>
    <item>
      <title>Safeguarding Microsoft Teams with Microsoft Defender for Office 365</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/safeguarding-microsoft-teams-with-microsoft-defender-for-office/ba-p/4464086</link>
      <description>&lt;H5&gt;As organizations rely more on Microsoft Teams for daily collaboration, securing this platform has become a top priority. Threat actors are increasingly targeting Teams chats and channels with phishing links and malicious files, making it critical for IT admins and security professionals to extend protection beyond email. Enter Microsoft Defender for Office 365, now armed with dedicated Teams protection capabilities. Microsoft Defender for Office 365 enables users to report suspicious messages, brings time-of-click scanning of URLs and files into Teams conversations, and provides rich alerts and hunting insights for SecOps teams.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;As a collaborative piece between Pierre Thoor, a Microsoft Security Most Valuable Professional (MVP), and the Defender for Office 365 Product Engineering Team, the below guides with accompanying videos emphasize a proactive, user-driven approach to threat detection and response, turning everyday Teams interactions into actionable security signals for SecOps.&lt;/H5&gt;
&lt;H4 class="lia-align-center" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;See something, say something: Reporting suspicious messages in Microsoft Teams&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;div data-video-id="https://youtu.be/0Qb7Udkgpks?si=aS5BiTx0d4PahdZf/1761599555724" data-video-remote-vid="https://youtu.be/0Qb7Udkgpks?si=aS5BiTx0d4PahdZf/1761599555724" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F0Qb7Udkgpks%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D0Qb7Udkgpks&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F0Qb7Udkgpks%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Your fastest sensor isn’t AI – it’s your people. Report this message in Microsoft Teams lets anyone flag a suspicious conversation in two clicks and routes a triageable submission to your security team in the Microsoft Defender portal.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Speed to signal:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Catch threats at the conversation layer, not just in email.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Complete context:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Original message, participants, URLs, and verdicts in one place.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="21" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Habit-forming:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; A simple, repeatable action employees remember under pressure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;How to report (desktop, web, and mobile)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;In Desktop/Web&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" style="list-style-type: none;"&gt;
&lt;OL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Hover the message → &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;… &lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;More options&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; →&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Report this message&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-15"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Select &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Security concern&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; → (optional) add a short note → &lt;/SPAN&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;Report&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="lia-text-color-15"&gt;&lt;STRONG&gt;In Mobile (iOS/Android) app&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" style="list-style-type: none;"&gt;
&lt;OL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="23" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Long-press the message → &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Report message&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="23" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Select&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Security concern&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; → (optional) add a short note → &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Report&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;*Tip:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Short notes like “Unexpected MFA reset link” help analysts triage faster.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Where reports go (for security teams)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;In the Microsoft Defender portal, navigate to:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Investigation &amp;amp; response&lt;/STRONG&gt; →&lt;STRONG&gt; Actions and submissions&lt;/STRONG&gt; → &lt;STRONG&gt;Submissions&lt;/STRONG&gt; → &lt;STRONG&gt;User reported&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Open an item to view the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Teams message&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; entity (sender/domain, Teams message ID, extracted URLs, verdict) and take action – mark as phish/clean, pivot to Explorer or Advanced Hunting, or copy indicators.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Quick setup check&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;UL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" style="list-style-type: none;"&gt;
&lt;UL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Defender portal → Settings → Email &amp;amp; collaboration → User reported settings:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; enable &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Monitor reported messages in Microsoft Teams&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px" aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Licensing:&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Microsoft Defender for Office 365 &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Plan 2&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; (included in Microsoft 365 E5).&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What good looks like (mini playbook)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;User reports&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; the message.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Security triages&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; the submission and captures the URL/domain and other indicators.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Block or allow&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; as appropriate via the &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Tenant Allow/Block List (TABL)&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Hunt&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; for related activity or clicks (see Video 3).&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Close the loop&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;: thank the reporter and share the outcome to reinforce the behavior.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Common gotchas&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reporting is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;disabled&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; in the Teams messaging policy – verify before rollout.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="26" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Some users assume “Report” &lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;notifies the sender&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; – clarify that it routes to the Security team, not the sender.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Call to action:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Enable reporting for your users and add this line to your awareness site:&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;“If it feels phishy, report – don’t click.”&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 class="lia-align-center" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;Think before you click - Safe Links catches threats at click-time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=SwqEjAKppag/1761599631615" data-video-remote-vid="https://www.youtube.com/watch?v=SwqEjAKppag/1761599631615" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FSwqEjAKppag%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSwqEjAKppag&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSwqEjAKppag%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Links can change after delivery. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; waits until &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;click-time&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, evaluates the destination, and shows an in-app warning page in Teams. Pair it with the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tenant Allow/Block List (TABL)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; to tune quickly across the tenant.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Prevents delayed redirects:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt; Avoids “clean-at-send” methods.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Consistent protection in Teams:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Familiar warning UX reduces risky clicks.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Rapid tuning:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Block newly observed domains in seconds; no advanced transport rules required.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What you’ll see in the video&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Policy check (Teams in scope)&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Defender portal →&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Email &amp;amp; collaboration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; → &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Policies &amp;amp; rules&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; → &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Threat policies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;→ &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; → ensure &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Apply Safe Links to Microsoft Teams&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; is enabled for target users or groups OR that you use Standard/Strict Preset Policy.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Warning page at click-time&lt;/STRONG&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt; &lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Post a benign test URL in Teams and click it to show the Safe Links warning experience.&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Block it as you spot it (Allow/Block)&lt;/STRONG&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt; &lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Defender portal →&amp;nbsp;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Threat policies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;→&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Tenant Allow/Block List&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;→ &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;URLs&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; →&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Add&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; (domain or URL).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Re-click in Teams – now blocked &lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;at click-time&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Optional telemetry (Advanced Hunting)&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;Confirm outcomes and adoption:&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE class="lia-indent-padding-left-90px"&gt;&lt;SPAN data-contrast="auto"&gt;UrlClickEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(24h) and Workload == "Teams"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| summarize Clicks=count(), Users=dcount(AccountUpn) by ActionType&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| order by Clicks desc&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Deployment tips&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Start with a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;pilot group&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; that includes IT + power users; expand after validation.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="16" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Create a&amp;nbsp;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;review cadence&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; for TABL (e.g., monthly) and expire temporary blocks.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Troubleshooting&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;No warning page?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Verify policy scope includes the user and the Teams workload.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Block not taking effect?&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;Give TABL a short sync window, then re-test; confirm you blocked the correct domain/URL pattern.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 class="lia-align-center" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;“Hunt the chat”: Advanced hunting for Teams threats&amp;nbsp;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;div data-video-id="https://youtu.be/k67lWfy16z0/1761843589249" data-video-remote-vid="https://youtu.be/k67lWfy16z0/1761843589249" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fk67lWfy16z0&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dk67lWfy16z0&amp;amp;image=http%3A%2F%2Fi.ytimg.com%2Fvi%2Fk67lWfy16z0%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Overview&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;With Advanced Hunting you can quickly reconstruct activity in Microsoft Teams – who sent the message, who clicked the link, and what protections kicked in. This section shows how the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;four Teams-relevant tables&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; work together, so you can move from signal to action quickly.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;New: message warnings for malicious URLs (internal and external)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Teams now shows a &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;warning banner&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; on messages that contain URLs flagged as spam, phishing, or malware. Warnings appear in &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;internal and external&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; chats/channels, and can be &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;added after delivery&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; (up to ~48 hours) if a URL’s reputation changes. This complements &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; (time-of-click) and doesn’t replace ZAP; when ZAP removes a message, that action takes precedence. Public preview began &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;September 2025&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;GA November 2025&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, enabled by default at GA and manageable in &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Teams admin center → Messaging settings&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;See Message Center: &lt;/SPAN&gt;&lt;A href="https://admin.cloud.microsoft/?#/MessageCenter/:/messages/MC1150984" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://admin.cloud.microsoft/?#/MessageCenter/:/messages/MC1150984&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The four tables you’ll use&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;MessageEvents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; – delivery context (sender, thread, internal vs. external).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;MessagePostDeliveryEvents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; – post-delivery actions, including &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Phish ZAP&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; and &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Malware &lt;STRONG&gt;ZAP&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;MessageUrlInfo&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; – URLs extracted from Teams messages.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;UrlClickEvents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; – time-of-click outcomes for links, including those clicked in Teams.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What you’ll learn in the video&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Surface &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;active external domains&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; in your tenant’s Teams chats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Identify &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;who clicked&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; risky links and the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;click outcomes&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; (via Safe Links telemetry).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;See where &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;message warnings&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; appear in the chat UI.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="33" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Pivot to an incident&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; and block indicators fast via the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Tenant Allow/Block List (TABL)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;A couple hunts to try right now&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;1) Malicious verdicts in Teams (last 24 hours)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Find messages that already carry a Spam/Phish/Malware verdict – your fastest triage queue.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;BR /&gt;MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(1d)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where ThreatTypes has "Phish" or ThreatTypes has "Malware" or ThreatTypes has "Spam"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| project Timestamp, SenderDisplayName, SenderEmailAddress,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RecipientDetails, IsOwnedThread, ThreadType, IsExternalThread, ReportId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Use it for&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; a quick sweep + pivot to incident/entities, then TABL block if needed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;2) “IT helpdesk” imposters in external DMs (last 5 days)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;Surface social-engineering lures that impersonate support.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(5d)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where IsExternalThread == true&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where (RecipientDetails has "help" and RecipientDetails has "desk")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or (RecipientDetails has "it"&amp;nbsp;&amp;nbsp; and RecipientDetails has "support")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or (RecipientDetails has "working" and RecipientDetails has "home")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or (SenderDisplayName has "help" and SenderDisplayName has "desk")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or (SenderDisplayName has "it"&amp;nbsp;&amp;nbsp; and SenderDisplayName has "support")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or (SenderDisplayName has "working" and SenderDisplayName has "home")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| project Timestamp, SenderDisplayName, SenderEmailAddress,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RecipientDetails, IsOwnedThread, ThreadType, ReportId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Use it for:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; first-contact scams (external tenant posing as IT). Pair with &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Safe Links&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; telemetry to see who clicked.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Tip:&lt;/STRONG&gt; has is token-aware and generally faster/cleaner than contains for word matches. Keep both hunts &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;detection-ready&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; by ensuring the final projection includes Timestamp and ReportId.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;3) BONUS! External DMs with links (last 7 days)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-60px"&gt;&lt;SPAN data-contrast="auto"&gt;MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(7d) and IsExternalThread == true&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| join kind=inner (MessageUrlInfo) on TeamsMessageId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| summarize Links=dcount(Url), Senders=dcount(SenderEmailAddress) by UrlDomain&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| top 10 by Links desc&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;4) Who clicked (Teams workload) – exposure view:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;UrlClickEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(7d) and Workload == "Teams"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| project Timestamp, AccountUpn, Url, ActionType&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| order by Timestamp desc&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 class="lia-align-center" aria-level="1"&gt;&lt;SPAN class="lia-text-color-15"&gt;“From Hunt to Action”: Respond &amp;amp; contain&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;div data-video-id="https://youtu.be/14zHFEFXlHo/1761843540965" data-video-remote-vid="https://youtu.be/14zHFEFXlHo/1761843540965" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F14zHFEFXlHo%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D14zHFEFXlHo&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F14zHFEFXlHo%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Finding a risky link in Teams is only half the job. This walkthrough shows how to go &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;from detection to containment&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; – block the domain, clean up delivered messages, and cut attacker access.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Why this matters&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Speed:&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; Shrink time from “we saw it” to “it’s blocked”.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Consistency:&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Turns ad-hoc hunting into a repeatable response flow.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Coverage:&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Pair URL blocking with identity and device containment.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What you’ll see in the video&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Turn a hunt into an alert&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;In Advanced Hunting, run a short query (below) and choose &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Create detection rule&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; to schedule it. Alerts auto-create incidents you can triage.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Block at click-time (Safe Links + TABL)&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;In the incident, open the&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;URL entity&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; and add the URL/domain to the &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Tenant Allow/Block List (TABL)&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; so future Teams clicks are blocked by Safe Links.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Post-delivery cleanup (ZAP)&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;BR /&gt;&lt;/SPAN&gt;If a malicious message slipped through,&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;ZAP&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; can remove or mark it after delivery. You’ll see evidence on the incident timeline.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Contain accounts and devices&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="29" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;Revoke user sessions&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;in Entra ID to invalidate active tokens.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;Reset the password &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;(and require strong, unique credentials), then enforce MFA for the account.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;Review MFA methods &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and remove anything suspicious;&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;review app consents and revoke illicit grants.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="o" data-font="Courier New" data-listid="28" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Courier New&amp;quot;,&amp;quot;469769242&amp;quot;:[9675],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;o&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;If endpoints are onboarded,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; isolate the device &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;in Microsoft Defender for Endpoint to stop outbound connections while you investigate.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The Microsoft Learn guide, &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/responding-to-a-compromised-email-account" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;https://learn.microsoft.com/en-us/defender-office-365/responding-to-a-compromised-email-account&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, for compromised accounts recommends session revocation, password reset, MFA enforcement, reviewing OAuth app consents and admin roles, and checking mail forwarding/rules – steps that complement the Teams response you see here.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The hunt&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This KQL surfaces rare external domains in Teams and any user clicks.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;let lookback = 1d;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;// External Teams messages&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;let externalMsgs =&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | where Timestamp &amp;gt; ago(lookback) and IsExternalThread == true&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;    | project MsgTime = Timestamp, TeamsMessageId, SenderEmailAddress, ME_ReportId = ReportId;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;// URLs found in Teams messages&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;let urlsInMsgs =&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    MessageUrlInfo&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | where Timestamp &amp;gt; ago(lookback)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | project MUI_Time = Timestamp, TeamsMessageId, Url, UrlDomain, MUI_ReportId = ReportId;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;// Clicks coming from Teams&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;let clicks =&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    UrlClickEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | where Timestamp &amp;gt; ago(lookback) and Workload == "Teams"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | project ClickTime = Timestamp, Url, Clicker = AccountUpn, ClickAction = ActionType, UCE_ReportId = ReportId;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;// Define “rare” domains in the period&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;let rareDomains =&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    urlsInMsgs&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | summarize msgCount = dcount(TeamsMessageId) by UrlDomain&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    | where msgCount &amp;lt; 3;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;rareDomains&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| join kind=inner (urlsInMsgs) on UrlDomain&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| join kind=leftouter (externalMsgs) on TeamsMessageId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE class="lia-indent-padding-left-30px"&gt;&lt;SPAN data-contrast="auto"&gt;| join kind=leftouter (clicks) on Url&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;| project&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    Timestamp = coalesce(ClickTime, MUI_Time, MsgTime),&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    UrlDomain,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    Url,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    SenderEmailAddress,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    Clicker,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    ClickTime,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    ClickAction,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    TeamsMessageId,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;    ReportId  = coalesce(UCE_ReportId, MUI_ReportId, ME_ReportId)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;After verifying results, select Create detection rule, set a schedule (e.g., hourly), and map entities so incidents include the right artifacts.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;What good looks like (response playbook)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Alert fires &lt;/STRONG&gt;→ open incident&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;; confirm scope and entities.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Block URL/domain&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; via TABL to stop future clicks.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Confirm ZAP&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;removed or marked delivered messages.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Revoke sessions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; and &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;reset password&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;enforce MFA&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Review MFA methods&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; and &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;remove unknown devices/methods&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Audit app consents&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;(revoke illicit grants) and verify the user holds &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;no unexpected admin roles&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;If email abuse is suspected, check for&amp;nbsp;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;forwarding&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; or malicious &lt;/SPAN&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Inbox rules&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt; &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="%1." data-font="" data-listid="31" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Isolate device&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; if execution is suspected; collect artifacts and un-isolate after remediation.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;FAQs&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Does the block remove the message?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; No – TABL blocks &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;at click-time&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. Post-delivery removal is handled by &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;ZAP&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; when detections apply.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;Will revoking sessions disrupt users?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; It forces sign-in again (expected). Communicate this in your response template.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="30" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;What if the attacker used consent phishing?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; Revoke the offending &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;&lt;STRONG&gt;enterprise app consent&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt; and review publisher verification status.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Call to action:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Save the query, create the detection, and attach this playbook to your incident template. The goal every time:&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;find&lt;/STRONG&gt; → &lt;STRONG&gt;block &lt;/STRONG&gt;→ &lt;STRONG&gt;clean up &lt;/STRONG&gt;→ &lt;STRONG&gt;contain&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;Securing Microsoft Teams is most effective when technology and people work together. By enabling user reporting, leveraging real-time protections, and empowering security teams to act quickly, organizations can turn everyday collaboration into a strong defense against threats.&lt;BR /&gt;&lt;BR /&gt;##&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Please take two minutes to take&amp;nbsp;&lt;A href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR2iBDQTKG39MosjBnE33D3VUQjFFQTdQRzY0WFdRT04wMVMzN1E2RlVDVC4u&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt;this survey&lt;/A&gt;&amp;nbsp;to let us know what you think of this blog (series), video, and community content.&lt;BR /&gt;&lt;BR /&gt;Questions or comments on this blog "Microsoft Defender for Office 365 – A Four-Part Guide to Secure Collaboration" for the author or other readers? Please log in and post your response below!&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;BR /&gt;_____________&lt;/P&gt;
&lt;P&gt;This blog has been generously and expertly authored by Microsoft Security MVP,&amp;nbsp;&lt;A class="lia-external-url" href="https://mvp.microsoft.com/en-US/MVP/profile/6fba834e-4a7f-ec11-8d21-0022482837b1" target="_blank" rel="noopener"&gt;Pierre Thoor&lt;/A&gt;&amp;nbsp;with support of the Microsoft Defender for Office 365 product team.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-image-alt=""&gt;Pierre Thoor&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;Microsoft Security MVP | &lt;A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/mvp-champ-spotlight--pierre-thoor/4448061" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365 Champ" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365 Champ&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;STRONG&gt;Learn More and Meet the Author&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt;&amp;nbsp;by the esteemed Microsoft Most Valuable Professionals (MVPs), now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit&amp;nbsp;&lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat!&amp;nbsp;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt;&amp;nbsp;for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;2) Additional MVP-Authored Blogs in this Four- Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;OL class="lia-indent-padding-left-30px"&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-migration--onboarding/4462906" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Defender for Office 365: Migration &amp;amp; Onboarding" data-lia-auto-title-active="0"&gt;Microsoft Defender for Office 365: Migration &amp;amp; Onboarding &lt;/A&gt;by Purav Desai&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;(&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" data-lia-auto-title="This " data-lia-auto-title-active="0" target="_blank"&gt;This &lt;/A&gt;post) Safeguarding Microsoft Teams with Microsoft Defender for Office 365&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;
&lt;P data-testid="MessageSubject"&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365&lt;/A&gt; by Mona Ghadiri&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="lia-indent-padding-left-30px"&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416" data-lia-auto-title="Microsoft Defender for Office 365: Fine-Tuning" data-lia-auto-title-active="0" target="_blank"&gt;Microsoft Defender for Office 365: Fine-Tuning&lt;/A&gt; by Joe Stocker&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 class=""&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;STRONG&gt;Learn and Engage with the Microsoft Security Community&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 16:37:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/safeguarding-microsoft-teams-with-microsoft-defender-for-office/ba-p/4464086</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-13T16:37:54Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Office 365: Migration &amp; Onboarding</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-migration-onboarding/ba-p/4462906</link>
      <description>&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;STRONG&gt;This blog covers four key areas that are frequently missed&lt;/STRONG&gt;, but they are essential for a secure and auditable deployment of Defender for Office 365. Before diving into the technical details, it is important to clarify a common misconception about Defender for Office 365 protections.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Blocking Malicious File Downloads in SharePoint and OneDrive&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;A common assumption during onboarding is that Microsoft Defender for Office 365 protections only apply to email. In reality, Safe Attachments also integrates with SharePoint Online, OneDrive for Business and Microsoft Teams. It scans files for malware even after they are uploaded or shared internally.&lt;/P&gt;
&lt;P&gt;However, this protection is only effective when the configuration explicitly prevents users from downloading files flagged as malicious. Without this setting, files detected as threats can still be downloaded locally. This creates a major risk particularly if the malware is detected post-delivery.&lt;/P&gt;
&lt;P&gt;In one investigation, I found that this setting had been left at its default, allowing users to download malicious files from SharePoint. This oversight created a significant exposure risk until it was corrected. This setting is part of the Safe Attachments for SPO/ODB policy and is critical in reducing internal exposure. Once enabled, this setting protects users in real time and acts as a powerful audit point. If someone disables this setting, whether intentionally or by accident, that action is recorded in Purview's Unified Audit Log under the DisallowInfectedFileDownloadDisabled operation.&lt;/P&gt;
&lt;P&gt;The video below offers a brief walkthrough on how to enable the setting, details the associated audit log events, and provides guidance on configuring alerts for any modifications:&lt;/P&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=fpceNWx9vcU/1761166334333" data-video-remote-vid="https://www.youtube.com/watch?v=fpceNWx9vcU/1761166334333" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FfpceNWx9vcU%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DfpceNWx9vcU&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FfpceNWx9vcU%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;span class="lia-media-caption-text"&gt;&lt;EM class="lia-align-center"&gt;Video 1 – Enable, Audit, Alert: Full Setting Overview&lt;/EM&gt;&lt;/div&gt;
&lt;P&gt;Regularly auditing for this event can help identify misconfiguration or potentially malicious administrative activity that could indicate insider threat behaviour. Including this check as part of your continuous security monitoring process is a smart, proactive move. Learn more at&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/safe-attachments-for-spo-odfb-teams-configure#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files" target="_blank" rel="noopener"&gt;Step 2: (Recommended) Use SharePoint Online PowerShell to prevent users from downloading malicious files&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Once you have established protection against malicious files, the next step is ensuring your tenant is correctly set up to create and manage threat policies.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Ensuring Organization Customization is Enabled&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;A frustrating yet common hurdle during Defender for Office 365 onboarding is the inability to create threat policies such as anti-phishing or Safe Attachments policies. This confusion often stems from a basic configuration oversight: the tenant has not been enabled for organization customization. Without this step, the Microsoft 365 platform prevents the creation or editing of many critical security policies in Defender for Office 365.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;Figure 1 – Defender for Office 365 policies blocked until Enable-OrganizationCustomization is run.&lt;/img&gt;
&lt;P&gt;A few years prior with a new client being onboarded to Defender for Office 365, I encountered a situation where policy creation kept failing because this step wasn’t followed. It caused unnecessary delays and frustrated the security team until we identified the missing customization.&lt;/P&gt;
&lt;P&gt;The fix is simple. Run the Enable-OrganizationCustomization PowerShell cmdlet from Exchange Online. It is a one-time configuration task, but it is essential for policy management and overall service functionality.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Figure 2 - Output if you re-run the Enable-OrganizationCustomization command&lt;/img&gt;
&lt;P&gt;Including this step early in your deployment or migration plan prevents unnecessary delays and ensures the security team can fully leverage Defender for Office 365's capabilities from day one. This is particularly important for consultants who are brought in to assist after issues have already arisen. Getting ahead of this configuration means one less troubleshooting rabbit hole.&lt;/P&gt;
&lt;img&gt;&lt;SPAN class="lia-align-center"&gt;Figure 3 - Output shows 'false' when customization is enabled.&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;With customization enabled, you can now take advantage of the preset security policies to quickly build a solid baseline.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Using Preset Security Policies for a Strong Starting Point&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;One of the best tools Microsoft has provided for onboarding is the Preset Security Policies feature. These come in two flavors: Standard and Strict.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 4 - Defender for Office 365 Preset security policies (Standard &amp;amp; Strict protection)&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;They represent Microsoft’s recommended baseline configurations for anti-malware, anti-phishing, and spam protection. Learn more at&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/preset-security-policies" target="_blank" rel="noopener"&gt;Preset security policies in cloud organizations&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;For customers with limited security maturity or time to deeply understand the inner workings of Defender for Office 365, these presets are a game-changer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 5 - Microsoft recommendation is to apply standard protection to all users&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;In several cases, I have seen organizations with limited security teams benefit from activating these presets early. This approach gave them immediate protection while freeing up time to better understand and tune policies over time. For incident response, having a consistent and known-good baseline also helps reduce noise and false positives in the initial stages of deployment.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 6 - Apply strict Defender for Office 365 protection for priority users&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;After setting foundational policies, controlling who has access to what within Defender for Office 365 is crucial to maintaining a secure environment.&lt;/P&gt;
&lt;H5&gt;&lt;SPAN class="lia-text-color-15"&gt;Implementing Unified RBAC for Least Privilege Access&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;As more business units engage with Defender for Office 365 for everything from investigation to reporting, it is important to ensure each role has access only to what they need. Unified Role-Based Access Control (RBAC) in Defender for Office 365 makes this possible by allowing granular control over who can see and change what within the security portal.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 7 – Example least privilege role configuration for a Defender for Office 365 Incident Responder (image trimmed).&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;This becomes critically valuable in larger or more complex organizations where responsibilities are split between security, compliance, IT, and operations teams.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 8 - Activating Microsoft Defender for Office 365 Workload in Defender XDR Roles.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;By using unified RBAC, you can avoid the dangerous and often default behavior of assigning Security Administrator rights to everyone involved. Instead, define roles based on function. For example, Tier 1 analysts might only need view and investigation access, while admins can manage policies.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Figure 9 - Assigning a user to a Custom Microsoft Defender for Office 365 role, Entra Security Groups are also supported.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;This approach aligns with zero trust principles and makes it easier to audit who has access to sensitive areas. During onboarding, I recommend mapping stakeholders to the available roles and applying this model as early as possible. This helps establish accountability and improves your security posture before an incident occurs. Learn more at&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/compare-rbac-roles#map-defender-for-office-365-permissions-to-the-microsoft-defender-xdr-unified-rbac-permissions" target="_blank" rel="noopener"&gt;Map Defender for Office 365 permissions to the Microsoft Defender XDR Unified RBAC permissions&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Having set the right roles and permissions, it is vital to understand how these configurations contribute to a resilient and well-prepared security posture.&lt;/P&gt;
&lt;H5&gt;&lt;BR /&gt;&lt;SPAN class="lia-text-color-15"&gt;Final Thoughts&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;Successful onboarding to Microsoft Defender for Office 365 is not just about flipping switches. It is about making intentional configuration choices that support operational efficiency and long-term security goals. The points covered here are often missed in quick start guides but they are essential for building a solid foundation. Those who invest time in proper configuration are far better prepared when incidents arise. Migration is just the beginning. Set up Defender for Office 365 right to reduce risk and build real resilience.&lt;BR /&gt;&lt;EM&gt;&lt;BR /&gt;Please take two minutes to take&amp;nbsp;&lt;A href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR2iBDQTKG39MosjBnE33D3VUQjFFQTdQRzY0WFdRT04wMVMzN1E2RlVDVC4u&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt;this survey&lt;/A&gt; to let us know what you think of this blog (series), video, and community content.&lt;BR /&gt;&lt;BR /&gt;Questions or comments on this blog "Microsoft Defender for Office 365 Migration &amp;amp; Onboarding" for the author or other readers? Please log in and post your response below!&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;BR /&gt;_____________&lt;/P&gt;
&lt;P&gt;This blog has been generously and expertly authored by Microsoft Security MVP, &lt;A class="lia-external-url" href="https://mvp.microsoft.com/en-US/MVP/profile/5ad0a31e-f1ca-41e8-9348-2917e17f6f8f" target="_blank" rel="noopener"&gt;Purav Desai.&lt;/A&gt; with support of the Microsoft Defender for Office 365 product team.&lt;/P&gt;
&lt;img&gt;Purav Desai&lt;BR /&gt;&lt;SPAN data-teams="true"&gt;Lead M365 Incident Responder, Financial Services | Dual Microsoft Security MVP&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;STRONG&gt;Learn More and Meet the Author&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;1) December 16th Ask the Experts Webinar:&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 | Ask the Experts: Tips and Tricks&amp;nbsp;&lt;/A&gt;&lt;/STRONG&gt;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;(REGISTER HERE)&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;DECEMBER 16, 8 AM US Pacific&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You’ve watched the latest Microsoft Defender for Office 365&lt;A href="https://youtube.com/playlist?list=PLmAptfqzxVEUnmX3No1ZCCpU96Y9A-6PE&amp;amp;si=5Rb4EBp790ycQQ-t" target="_blank" rel="noopener"&gt;&amp;nbsp;best practices videos&lt;/A&gt;&amp;nbsp;and read the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;blog posts&lt;/A&gt;&amp;nbsp;by the esteemed Microsoft Most Valuable Professionals (MVPs). Now bring your toughest questions or unique situations straight to the experts. In this interactive panel discussion, Microsoft MVPs will answer your real-world scenarios, clarify best practices, and highlight practical tips surfaced in the recent series. We’ll kick off with a who’s who and recent blog/video series recap, then dedicate most of the time to your questions across migration, SOC optimization, fine-tuning configuration, Teams protection, and even Microsoft community engagement. Come ready with your questions (or pre-submit&amp;nbsp;&lt;A href="https://aka.ms/AAydpii" target="_blank" rel="noopener"&gt;here&lt;/A&gt;) for the expert Security MVPs on camera, or the Microsoft Defender for Office 365 product team in the chat!&amp;nbsp;&lt;A href="https://forms.office.com/r/ha21YfCgaR" target="_blank" rel="noopener"&gt;REGISTER NOW&lt;/A&gt;&amp;nbsp;for 12/16.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Additional MVP Tips and Tricks Blogs and Videos in this Four-Part Series:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;(This post) Microsoft Defender for Office 365: Migration &amp;amp; Onboarding&amp;nbsp;by Purav Desai&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/safeguarding-microsoft-teams-with-microsoft-defender-for-office-365/4464086" target="_blank" rel="noopener" data-lia-auto-title="Safeguarding Microsoft Teams with Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;Safeguarding Microsoft Teams with Microsoft Defender for Office 365&amp;nbsp;&lt;/A&gt;by Pierre Thoor&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-testid="MessageSubject"&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/you-may-be-right-after-all-disputing-submission-responses-in-microsoft-defender-/4467151" target="_blank" rel="noopener" data-lia-auto-title="You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365" data-lia-auto-title-active="0"&gt;You may be right after all! Disputing Submission Responses in Microsoft Defender for Office 365&lt;/A&gt; by Mona Ghadiri&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365-fine-tuning/4469416" target="_blank"&gt;Microsoft Defender for Office 365: Fine-Tuning&lt;/A&gt; by Joe Stocker&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-20"&gt;Learn and Engage with the Microsoft Security Community&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Log in and follow this&amp;nbsp;&lt;A href="https://aka.ms/AAyclgi" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 blog&lt;/A&gt;&amp;nbsp;and follow/post in the&amp;nbsp;&lt;A href="https://aka.ms/AAyclge" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 discussion space&lt;/A&gt;.
&lt;UL&gt;
&lt;LI&gt;Follow = Click the heart in the upper right when you're logged in 🤍&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Learn more about the&amp;nbsp;&lt;A href="https://aka.ms/MVPMDOvideo" target="_blank" rel="noopener"&gt;Microsoft MVP Program.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAycdmn" target="_blank" rel="noopener"&gt;Microsoft Security Community&lt;/A&gt;&amp;nbsp;and be notified of upcoming events, product feedback surveys, and more.&lt;/LI&gt;
&lt;LI&gt;Get early access to Microsoft Security products and provide feedback to engineers by joining the&amp;nbsp;&lt;A href="https://aka.ms/AAyclfq" target="_blank" rel="noopener"&gt;Microsoft Customer Connection Community&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Join the&amp;nbsp;&lt;A href="https://aka.ms/AAyclgu" target="_blank" rel="noopener"&gt;Microsoft Security Community LinkedIn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Nov 2025 16:34:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-migration-onboarding/ba-p/4462906</guid>
      <dc:creator>RenWoods</dc:creator>
      <dc:date>2025-11-13T16:34:57Z</dc:date>
    </item>
    <item>
      <title>Protection against multi-modal attacks with Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/protection-against-multi-modal-attacks-with-microsoft-defender/ba-p/4438786</link>
      <description>&lt;P&gt;Multi-modal (or hybrid) attacks are increasingly used by threat actors to orchestrate multi-phase campaigns. In &lt;A href="https://techcommunity.microsoft.com/blog/MicrosoftDefenderforOffice365Blog/protection-against-email-bombs-with-microsoft-defender-for-office-365/4418048" target="_blank" rel="noopener"&gt;Part 1 of our blog series&lt;/A&gt;, we explored how attackers use email bombing as a distraction technique to overwhelm users and bypass security controls. Today, we’re expanding that conversation to showcase how Microsoft Defender can detect and correlate certain hybrid, multi-modal attacks that span across email, Teams, identity, and endpoint vectors; and how these insights surface in the Microsoft Defender portal.&lt;/P&gt;
&lt;H2&gt;From distraction to deception: The rise of multi-modal attacks&lt;/H2&gt;
&lt;P&gt;Multi-modal attacks are on the rise and evolving! One type of such hybrid attacks, begins with a mail bombing event—flooding a user’s inbox with legitimate subscription emails—f&lt;SPAN data-teams="true"&gt;ollowed by using Microsoft Teams&lt;/SPAN&gt; to send messages to and call targeted users. The goal? To gain trust, distract defenders, and establish persistence.&lt;/P&gt;
&lt;P&gt;For example, attackers may pose as IT support personnel responding to a mail bombing incident, urging users to grant remote access in turn victimizing them to download malware-laced files. Our telemetry shows more than 300 threat actors executing multi-modal attacks, some of which involve Microsoft Teams. These tactics are not isolated—they’re coordinated. Learn more &lt;A href="https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/phish-click-breach-hunting-for-a-sophisticated-cyber-attack/4267916" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Defender continuously adapts to attacker behavior, enabling detection of emerging threats. Initially, attackers used simple terms like 'Help Desk' as their display name in Teams to deceive users, but evolved their tactics by incorporating other words like 'Cyber', using Unicode characters such as ‘☑️’, and inserting invisible characters to bypass detection. We also see these hybrid attacks resolving to compromises that may become evident through suspicious encoded PowerShell execution initiating a network connection. Now, Microsoft Defender for Office 365 can not only detect, but also correlate these signals across email, collaboration, and other modalities.&lt;/P&gt;
&lt;img /&gt;
&lt;H2&gt;Better attacker tracking and new detection types&lt;/H2&gt;
&lt;P&gt;It’s now easier to see coordinated multi-modal (hybrid) attack patterns directly in the Defender portal &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/microsoft-365-security-center-mdo" target="_blank" rel="noopener"&gt;via the Incident experience&lt;/A&gt;. This means security teams can easily:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Identify linked incidents&lt;/STRONG&gt;&amp;nbsp;across email, Teams, and identity platforms.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Track attacker movement&lt;/STRONG&gt;&amp;nbsp;from initial access to command-and-control (C2) stages.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Disrupt attacks in real time&lt;/STRONG&gt;&amp;nbsp;using robust detection and automated response.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;New alerts include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Mail bombing activity detected&lt;/STRONG&gt;&amp;nbsp;– Identifies high-volume email flood activity.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Potentially malicious IT support Teams impersonation post mail bombing&lt;/STRONG&gt;&amp;nbsp;– Flags suspicious Teams threads following email-based flooding activity.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Related alert includes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Suspicious encoded PowerShell execution initiating a network connection &lt;/STRONG&gt;– Detects obfuscated scripts reaching out to attacker infrastructure.&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;These alerts are designed to work together, painting a full picture of the attacker’s strategy and enabling defenders to act decisively.&lt;/P&gt;
&lt;H2&gt;Empowering SOC analysts with advanced hunting and IOCs&lt;/H2&gt;
&lt;P&gt;Detection is just the beginning. Security teams can pivot from incidents and alerts to deeper investigations using&amp;nbsp;&lt;STRONG&gt;Advanced Hunting&lt;/STRONG&gt;&amp;nbsp;in Microsoft Defender and&amp;nbsp;Microsoft Sentinel.&lt;/P&gt;
&lt;P&gt;By leveraging&amp;nbsp;&lt;STRONG&gt;Indicators of Compromise (IOCs)&lt;/STRONG&gt;—such as suspicious email addresses, IPs, or keywords like “IT Support”—customers can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Craft custom queries to uncover hidden threats.&lt;/LI&gt;
&lt;LI&gt;Search across identities, endpoints, and Office 365 data.&lt;/LI&gt;
&lt;LI&gt;Investigate post-breach activities like MFA changes or emergency password resets.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;IOCs can be collected via the incidents and alerts in the portal and in Advanced Hunting queries below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; AlertInfo &lt;/STRONG&gt;to collect general information and clickable links to more IOCs:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;AlertInfo&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt;= ago(2h)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Title == "Microsoft Teams chat initiated by a suspicious external user"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| top 100 by Timestamp&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; AlertEvidence &lt;/STRONG&gt;to collect potentially related IOCs from an alert:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;AlertEvidence&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt;= ago(2h)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Title == "Microsoft Teams chat initiated by a suspicious external user"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| top 100 by Timestamp&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are some example queries that can be used as&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/custom-detection-rules" target="_blank" rel="noopener"&gt;Custom detection rules&lt;/A&gt; in Advanced Hunting to detect mail bombing, malicious Teams content and password spray attempts respectively:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; EmailEvents &lt;/STRONG&gt;to detect mail bombing:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;EmailEvents&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(1d)&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where DetectionMethods contains "Mail bombing"&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| project Timestamp, NetworkMessageId, SenderFromAddress, RecipientEmailAddress&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Subject, ReportId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; MessageEvents, &lt;/STRONG&gt;a newly released table from our &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/general-availability-for-collaboration-security-for-microsoft-teams/4393040" target="_blank" rel="noopener"&gt;GA of Collaboration for Teams,&amp;nbsp;&lt;/A&gt;to detect malicious Teams content:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; | where Timestamp &amp;gt; ago(1d)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; | where ThreatTypes&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;has&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;"Phish"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;   &amp;nbsp;&amp;nbsp;&amp;nbsp; or ThreatTypes&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;has&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;"Malware"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;     or ThreatTypes&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;has&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;"Spam"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; | project Timestamp, SenderDisplayName, SenderEmailAddress, RecipientDetails, IsOwnedThread, ThreadType, IsExternalThread, ReportId&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; MessageEvents &lt;/STRONG&gt;to detect bi-directional communication with external Help Desk\Support representatives:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;MessageEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where Timestamp &amp;gt; ago(5d)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where (RecipientDetails contains "help" and RecipientDetails contains "desk")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;    or (RecipientDetails contains "it" and RecipientDetails contains "support")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;    or (RecipientDetails contains "working" and RecipientDetails contains "home")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| where IsExternalThread&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;== true&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;| project Timestamp, SenderDisplayName, SenderEmailAddress, RecipientDetails, IsOwnedThread, ThreadType&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use&lt;STRONG&gt; IdentityLogonEvents &lt;/STRONG&gt;to detect password spray attempts:
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;IdentityLogonEvents&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-teams="true"&gt;| where Timestamp &amp;gt; ago(5d)&amp;nbsp;&lt;BR /&gt;| where ActionType == "LogonFailed"&lt;BR /&gt;| where FailureReason has_any ("bad", "invalid")&lt;BR /&gt;| where FailureReason has_any ("username", "password")&lt;BR /&gt;| summarize FailedAttempts = count(), UniqueUsers = dcount(AccountUpn), UserList = make_set(AccountUpn, 10) by IPAddress, bin(Timestamp, 5m)&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-teams="true"&gt;| where LogonError in ("UserAccountNotFound", "BadPassword") --- has an error&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Additional detection and response strategies include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Monitor for news mentions of your organization and create detection rules for related message subjects.&lt;/LI&gt;
&lt;LI&gt;Track impersonation attempts of key personnel (e.g., CIO, IT support), especially if they are on social media or are publicized.&lt;/LI&gt;
&lt;LI&gt;Investigate unusual IP addresses or abnormal activity involving targeted individuals.&lt;/LI&gt;
&lt;LI&gt;Configure automatic remediation action in the custom detection rule to detect and remediate any potential threats without manual intervention&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;You can also block these external calls in Teams by blocking interaction with Trial tenants on Microsoft teams by using the &lt;A href="https://learn.microsoft.com/microsoftteams/trusted-organizations-external-meetings-chat?tabs=organization-settings#block-federation-with-teams-trial-only-tenants" target="_blank" rel="noopener"&gt;Teams federation controls.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;These queries help Defenders pivot from one IOC to another, uncovering the full scope of hybrid campaigns. Microsoft Sentinel can also be used to search, store, and share IOCs.&amp;nbsp; More information about this offering is available at &lt;A href="https://learn.microsoft.com/en-us/azure/sentinel/understand-threat-intelligence" target="_blank" rel="noopener"&gt;Threat intelligence - Microsoft Sentinel | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;H2&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;Multi-modal attacks are complex, but with the right tools, defenders are equipped to detect, correlate, and respond across modalities. By combining built-in detections with hunting strategies, organizations can stay ahead of evolving threats and protect their users from distraction-based deception.&lt;/P&gt;
&lt;P&gt;Note: The above alerts are available for customers with &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-about?view=o365-worldwide" aria-label="Link Microsoft Defender for Office 365" target="_blank"&gt;Microsoft Defender for Office 365&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/defender-cloud-apps/what-is-defender-for-cloud-apps" aria-label="Link Microsoft Defender for Cloud Apps" target="_blank"&gt;Microsoft Defender for Cloud Apps&lt;/A&gt; licenses. These updates are gradually rolling out to all customers worldwide.&lt;/P&gt;
&lt;P&gt;Watch this video to learn more: &lt;A href="https://www.youtube.com/watch?v=rXGsQpqCWD4" aria-label="Link Microsoft Defender for Office 365 | Mail Bombing and Mixed-Mode Attack Protection" target="_blank"&gt;Microsoft Defender for Office 365 | Mail Bombing and Mixed-Mode Attack Protection&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn&lt;/STRONG&gt;:&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts" target="_blank" rel="noopener"&gt;Manage incidents and alerts from Defender for Office 365 in Microsoft Defender XDR - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-support-teams-sec-ops-guide" target="_blank" rel="noopener"&gt;Security Operations Guide for Teams protection - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fstep-by-step-guides%2Funderstand-detection-technology-in-email-entity%23detection-technology-details-table&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086188331%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=POlpZ271ItYP%2Bs4gSXUfTFVijprqVl5n%2FugoAsilux4%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Detection technology details table&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fmdo-email-entity-page%23whats-on-the-email-entity-page&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086147612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=M9bgh4uI2PoUogUDl%2FoZcO4aiLP5U83iaXobucmvqRw%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;What's on the Email entity page&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fthreat-explorer-real-time-detections-about%23filterable-properties-in-the-all-email-view-in-threat-explorer&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086158879%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=pToCjIRNeM4maxkKDPb%2FQIzAmaRpNJF6Gc4HoOxpNA0%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Filterable properties in the All email view in Threat Explorer&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Feb 2026 20:06:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/protection-against-multi-modal-attacks-with-microsoft-defender/ba-p/4438786</guid>
      <dc:creator>birchj</dc:creator>
      <dc:date>2026-02-12T20:06:00Z</dc:date>
    </item>
    <item>
      <title>Submissions Response Using AI for Enhanced Result Explainability</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/submissions-response-using-ai-for-enhanced-result-explainability/ba-p/4423843</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are pleased to announce that Microsoft Defender for Office 365 now features large language model (LLM)-powered &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;responses&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; within the submission workflow. This update provides security and Exchange admin&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with clear, actionable insights into the reasons behind the classification of each submission&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;whether as spam, phishing, bulk, or clean - enabling more informed decision-making and response.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;What's new?&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Historically, submission results such as &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Threats found&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; or &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;No threats found&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; have provided limited insight into the reasoning behind classification decisions. The implementation of AI-LLM-based responses addresses this limitation by delivering intuitive and context-rich explanations that &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;clarify&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; why a message was categorized as spam, phishing, bulk, or clean. This enhancement reduces ambiguity and facilitates faster, more accurate responses by administrators. LLM-based responses are now available for administrative email submissions made from any location within the Defender portal.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;Where can you see LLM based responses?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Submissions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;page at &lt;A class="lia-external-url" href="https://security.microsoft.com/reportsubmission" target="_blank" rel="noopener"&gt;https://security.microsoft.com/reportsubmission&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: On the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Emails&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;tab, select entry to view the LLM based explanation in the details flyout.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;Example-&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Example where submissions response came as clean-&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;No threats found&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; The email is a simple and benign message with no malicious content or suspicious links. The sender and recipient both belong to the same domain (contoso.com), indicating internal communication. Interacting with this email poses no risk as it contains no harmful elements.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Example where submissions response came as malicious-&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Threats found. &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;The sender's email address (bad-vaibhav@contosoo.com) is suspicious and not associated with any legitimate organization. The email subject uses excessive promotional language and emojis, which is typical of spam emails. Interacting with the message could lead to unwanted advertisements or potential scams. Clicking on the provided link leads to a Contoso login page, which is a standard procedure for accessing internal resources.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Key Result Types with LLM Support&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;For the result types like &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Threats found&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;No threat found&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Bulk&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Spam&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; and a few &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Unknown&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;s&lt;/STRONG&gt;, you will see the LLM-based explanation. However, if for any reason the AI-generated explanation is unavailable, the system will fall back to the existing explanation, ensuring continuity in the experience.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720}"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Learn more:&lt;/SPAN&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720}"&gt;&lt;SPAN data-contrast="auto"&gt;Check out our&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-office-365/submissions-admin" target="_blank" rel="noopener"&gt;documentation&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for more details on submission workflows and &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/submissions-result-definitions" target="_blank" rel="noopener"&gt;AI-LLM&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; based integration.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-contrast="auto"&gt;Have feedback or questions about LLM based response? Join the conversation in the Microsoft Defender for Office 365 community forum.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 12:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/submissions-response-using-ai-for-enhanced-result-explainability/ba-p/4423843</guid>
      <dc:creator>soumyamishra</dc:creator>
      <dc:date>2025-07-01T12:00:00Z</dc:date>
    </item>
    <item>
      <title>Protection Against Email Bombs with Microsoft Defender for Office 365</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/protection-against-email-bombs-with-microsoft-defender-for/ba-p/4418048</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In today's digital age, email remains a critical communication tool for businesses and individuals. However, with the increasing sophistication of cyberattacks, email security has become more important than ever. One such threat that has been growing is the email bombing, a form of net abuse that sends large volumes of email to an address to overflow the mailbox, overwhelm the server, or distract attention from important email messages indicating a security breach. &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://en.wikipedia.org/wiki/Email_bomb" target="_blank" rel="noopener"&gt;Email bomb - Wikipedia&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Understanding Email Bombing&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://www.hhs.gov/sites/default/files/email-bombing-sector-alert-tlpclear.pdf" target="_blank" rel="noopener"&gt;Email bombing&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;, typically involves subscribing victims to a large number of legitimate newsletter and subscription services. Each subscription service sends email notifications, which in aggregate create a large stream of emails into the victim’s inbox, making email triage for legitimate emails very difficult. This form of attack is essentially a denial-of-service (DDOS) on the victim's email triaging attention budget.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Hybrid Attacks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;More recently, email subscription bombs have been coupled with simultaneous lures on Microsoft Teams, Zoom, or via phone calls. Attackers impersonate IT support and offer to help solve the email problem caused by the spike of unwanted emails, ultimately compromising the victim's system or installing malware on their system. This type of attack is brilliant because it creates a sense of urgency and legitimacy, making victims more likely to accept remote assistance and inadvertently allow malware planting or data theft. Read about the use of mail bombs where &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/" target="_blank" rel="noopener"&gt;threat actors misused&amp;nbsp;Quick Assist in social engineering attacks leading to ransomware | Microsoft Security Blog.&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Incidence and Purpose of Email Bombing&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Email bombing attacks have been around for many years but can have significant impacts on targeted individuals, such as enterprise executives, HR or finance representatives. These attacks are often used as precursors to more serious security incidents, including malware planting, ransomware, and data exfiltration. They can also mute important security alerts, making it easier for attackers to carry out fraudulent activities without detection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;New Detection&amp;nbsp;technology&amp;nbsp;for&amp;nbsp;Mail&amp;nbsp;Bombing&amp;nbsp;attacks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&lt;SPAN data-contrast="none"&gt;To address these types of attacks Microsoft Defender has now released a comprehensive solution involving a durable block to limit the influx of emails, the majority of which are often spam. By intelligently tracking message volumes across different sources and time intervals, this new detection leverages historical patterns of the sender and signals related to spam content. &lt;SPAN data-teams="true"&gt;It prevents mail bombs from being dropped into the user’s inbox and the messages are rather sent to the Junk folder (of Outlook).&lt;/SPAN&gt; Note: Safe sender lists in Outlook continue to be honored, so emails from trustworthy sources are not unexpectedly moved to the Junk folder (in order to prevent false positives). Since the initial rollout that started in early May, we’ve seen a tremendous impact in blocking mail bombing attacks out of our customers’ inboxes:&lt;/SPAN&gt; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;Statistic: Average 20-30K mail bombs blocked daily across 200-300 users.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;How to&amp;nbsp;leverage&amp;nbsp;new “Mail&amp;nbsp;bombing”&amp;nbsp;detection technology in SOC experiences&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;1. Investigation and hunting: &lt;/STRONG&gt;SOC analysts can now view the new Detection technology as Mail bombing within the following surfaces: Threat Explorer, Email entity page and Advanced Hunting empowering them to investigate, filter and hunt for threats related to mail bombing.&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;2. Custom detection rule&lt;/STRONG&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;To analyze the frequency and volume of attacks from mail bombing vector, or to have automated alerts configured to notify SOC user whenever there is a mail bombing attack, SOC analysts can utilize the custom detection rules in Advanced hunting by&amp;nbsp;writing a KQL query using data in DetectionMethods column of&amp;nbsp;EmailEvents&amp;nbsp;table.&amp;nbsp;Here’s&amp;nbsp;a sample query to get you started:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;EmailEvents&lt;/SPAN&gt; &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;   | where Timestamp &amp;gt; ago(1d)&lt;/SPAN&gt; &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;   | where DetectionMethods contains "Mail bombing"&lt;/SPAN&gt; &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;   | project Timestamp, NetworkMessageId, SenderFromAddress, Subject, ReportId&lt;/SPAN&gt;&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;The SOC experiences are rolled out worldwide to all customers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Conclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Email bombs represent an incidental threat in the world of cybersecurity. With the new detection technology for Mail Bombing, Microsoft Defender for Office 365 protects users from these attacks and empowers Security Operations Center Analysts to ensure to gain visibility into such attacks and take quick actions to keep organizations safe!&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;Note: &lt;SPAN data-teams="true"&gt;The Mail bombing protection is available by default in &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/eop-about" target="_blank" rel="noopener" aria-label="Link Exchange Online Protection"&gt;Exchange Online Protection&lt;/A&gt; and &lt;A href="https://learn.microsoft.com/en-us/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank" rel="noopener" aria-label="Link Microsoft Defender for Office 365"&gt;Microsoft Defender for Office 365&lt;/A&gt; plans.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;This blog post is associated with Message Center post MC1096885. &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-teams="true"&gt;Also read &lt;A href="https://techcommunity.microsoft.com/blog/MicrosoftDefenderforOffice365Blog/protection-against-multi-modal-attacks-with-microsoft-defender/4438786" aria-label="Link Part 2 of our blog series" target="_blank"&gt;Part 2 of our blog series&lt;/A&gt; to learn more about protection against multi-modal attacks involving mail bombing and correlation of Microsoft Teams activity in Defender. Watch this video to learn more: &lt;A href="https://www.youtube.com/watch?v=rXGsQpqCWD4" aria-label="Link Microsoft Defender for Office 365 | Mail Bombing and Mixed-Mode Attack Protection" target="_blank"&gt;Microsoft Defender for Office 365 | Mail Bombing and Mixed-Mode Attack Protection&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&lt;STRONG&gt;Learn&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fstep-by-step-guides%2Funderstand-detection-technology-in-email-entity%23detection-technology-details-table&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086188331%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=POlpZ271ItYP%2Bs4gSXUfTFVijprqVl5n%2FugoAsilux4%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Detection technology details table&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fmdo-email-entity-page%23whats-on-the-email-entity-page&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086147612%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=M9bgh4uI2PoUogUDl%2FoZcO4aiLP5U83iaXobucmvqRw%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What's on the Email entity page&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fdefender-office-365%2Fthreat-explorer-real-time-detections-about%23filterable-properties-in-the-all-email-view-in-threat-explorer&amp;amp;data=05%7C02%7CUrja.Gandhi%40microsoft.com%7Ce2f78cb604b34c4a089b08ddb4476d93%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638864941086158879%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=pToCjIRNeM4maxkKDPb%2FQIzAmaRpNJF6Gc4HoOxpNA0%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Filterable properties in the All email view in Threat Explorer&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 20:03:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/protection-against-email-bombs-with-microsoft-defender-for/ba-p/4418048</guid>
      <dc:creator>UrjaGandhi</dc:creator>
      <dc:date>2026-02-12T20:03:29Z</dc:date>
    </item>
    <item>
      <title>Introducing the Microsoft Defender for Office 365 ICES vendor ecosystem</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-the-microsoft-defender-for-office-365-ices-vendor/ba-p/4424817</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In today's digital landscape, the need for comprehensive security measures is more critical than ever, as email continues to be a primary vector for cyberattacks such as phishing and malware. To address this, Microsoft Defender for Office 365 leverages the extensive scale of Microsoft's threat intelligence, which processes trillions of signals daily. By integrating &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-ignite-redefining-email-security-with-llms-to-tackle-a-new-era-of-soci/4302421" target="_blank" rel="noopener" data-lia-auto-title="Large Language Models (LLMs)" data-lia-auto-title-active="0"&gt;Large Language Models (LLMs)&lt;/A&gt; and&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-defender-for-office-365s-language-ai-for-phish-enhancing-email-securit/4410446" target="_blank" rel="noopener" data-lia-auto-title="advanced Natural Language Processing" data-lia-auto-title-active="0"&gt;advanced Natural Language Processing&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;, Defender for Office 365 empowers organizations with AI-driven threat detection, behavioral analytics, and automated responses thus proactively identifying and neutralizing risks before they reach end users. This collaborative defense approach reinforces the principle that security is a team sport, requiring shared intelligence and coordinated action across the ecosystem.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We recognize in today’s&amp;nbsp;dynamic cyber threat landscape,&amp;nbsp;defense-in-depth strategy has become a vital approach not only for Microsoft customers but also across the broader Secure Email Gateway (SEG) market. Organizations are increasingly adopting layered security solutions to&amp;nbsp;comply with&amp;nbsp;regulatory requirements, enhanced detection, and ensure robust protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To address this, we’re announcing the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Defender for Office 365 ICES Vendor Ecosystem&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;—&amp;nbsp;a unified framework that enables seamless integration with trusted third-party vendors. This ecosystem is designed to&amp;nbsp;eliminate&amp;nbsp;integration friction and deliver:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Broader detection coverage&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; through vendor diversity&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Transparency&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; across&amp;nbsp;Microsoft Defender for Office 365&amp;nbsp;and partner detections&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Streamlined SOC workflows&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; through consistent policy enforcement and shared investigation tools&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="32" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Stronger compliance alignment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; with layered security mandates&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This partner ecosystem is about creating a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;cohesive defense fabric that enhances SOC efficiency&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; with Microsoft Defender for Office 365 as the foundation. The ecosystem also provides flexibility, scalability, and preparedness for the complexities of contemporary enterprise security.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With this in mind, we are pleased to announce that our trusted ICES security vendors,&amp;nbsp; &lt;STRONG&gt;Darktrace&lt;/STRONG&gt;&amp;nbsp;and&amp;nbsp;&lt;STRONG&gt;KnowBe4&lt;/STRONG&gt;, have become the first launch partners within our ecosystem. They offer customers a seamless and collaborative defense framework where each solution enhances the strengths of the others. We welcome additional partners soon as we continue to expand this integrated ecosystem.&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="none"&gt;“Our integration with Microsoft gives security teams the tools they need to act faster and more precisely to detect and respond to threats,” said&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;Jill Popelka&lt;/STRONG&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;CEO of Darktrace. “Together, we’re strengthening defenses where it matters most to our customers —at the inbox.”&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;“I’m&amp;nbsp;incredibly excited at the opportunity afforded by this partnership with Microsoft and the deeper integrations it&amp;nbsp;enables.&amp;nbsp; Leveraging this integration allows us to use our vast quorum of data around email security and human risk in a way that provides the most comprehensive layered security approach available to the&amp;nbsp;market.&amp;nbsp; A complementary defense strategy is mandatory and this integration with Microsoft M365 furthers that vision by combining&amp;nbsp;our capabilities&amp;nbsp;to create comprehensive defense strategies that address the full spectrum of modern cyber threats.”&amp;nbsp;noted&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Greg Kras&lt;/STRONG&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Chief Product Officer @ KnowBe4&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Unified Quarantine&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The core strength of this new ecosystem is the seamless integration between Defender for Office 365 and its ICES partners, through the Unified Quarantine feature. Managing quarantined messages from multiple solutions can often be complex and inefficient. Unified Quarantine streamlines the process by consolidating quarantined items identified by both Defender for Office 365 and third-party (3P) solutions into a single, unified interface, enhancing customer ease and visibility.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Administrators can efficiently review, release, or remediate messages through this unified interface, irrespective of the provider that identified the threat. This approach not only optimizes time management but also guarantees uniform policy enforcement and facilitates transparency on detections, resulting in improved operational efficiency and a more coherent user experience. As part of the Unified Quarantine, security admins can also see which provider quarantined the message.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Transparency and Insight Across Solutions&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In environments with multiple email security solutions, transparency is crucial to understanding each vendor's detections. Microsoft Defender for Office 365 offers a unified dashboard that clearly distinguishes between threats stopped by Defender and those&amp;nbsp;identified&amp;nbsp;by third-party solutions, ensuring transparent and fair attribution of protection&amp;nbsp;value.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This dashboard provides security teams with a comprehensive view of how each solution contributes to protection, helping to identify overlapping coverage and areas of unique value. This clarity supports more informed decision-making around threat trends, policy optimization, and vendor strategy fostering stronger collaboration between internal teams and external partners.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Deeper&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;&amp;nbsp;SOC&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;&amp;nbsp;Investigation Capab&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;ilities: Threat Explorer, Advanced Hunting, and Email Entity Pa&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;ge&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Modern defenders need tools for rapid investigation, root cause analysis, and tactical response. The Defender for Office 365 ecosystem unifies investigative workflows across partner solutions.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Within&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Threat Explorer&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, security analysts can seamlessly pivot between messages actioned by Microsoft Defender for Office 365 and those flagged by integrated partners. The side-by-side display of verdicts and actions enables quick correlation and pattern recognition.&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Advanced Hunting&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;brings even greater depth, allowing analysts to craft queries that span both Microsoft Defender for Office 365S and 3P data sources. This holistic view accelerates threat hunting and helps organizations surface novel attack techniques or gaps in coverage. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;PRE&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16447734,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[916,1832,2748,3664,4580,5496,6412,7328,8244,9160,10076,10992,11908,12824,13740,14656],&amp;quot;469777927&amp;quot;:[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],&amp;quot;469777928&amp;quot;:[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}"&gt;&lt;SPAN data-contrast="none"&gt;EmailEvents&lt;/SPAN&gt; &lt;BR /&gt;&lt;SPAN data-contrast="none"&gt;|&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;where&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&lt;/SPAN&gt;Timestamp &amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-10"&gt;ago&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;(&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-10"&gt;7d&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;)&lt;/SPAN&gt; &lt;BR /&gt;&lt;SPAN class="lia-text-color-19"&gt;//List emails caught by a Third-party solution&lt;/SPAN&gt; &lt;BR /&gt;&lt;SPAN data-contrast="none"&gt;|&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;where&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN class="lia-text-color-8"&gt;&amp;nbsp;&lt;/SPAN&gt;DetectionMethods&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;contains&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;"&lt;SPAN class="lia-text-color-15"&gt;Thirdparty&lt;/SPAN&gt;"&lt;/SPAN&gt; &lt;BR /&gt;&lt;SPAN data-contrast="none"&gt;|&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-8"&gt;project&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; NetworkMessageId,&amp;nbsp;RecipientEmailAddress,&amp;nbsp;ThreatTypes, DetectionMethods,&amp;nbsp;AdditionalFields,&amp;nbsp;LatestDeliveryLocation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335557856&amp;quot;:16447734,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[916,1832,2748,3664,4580,5496,6412,7328,8244,9160,10076,10992,11908,12824,13740,14656],&amp;quot;469777927&amp;quot;:[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],&amp;quot;469777928&amp;quot;:[1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1]}"&gt;&lt;SPAN data-contrast="auto"&gt;On the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Email Entity Page&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;, every message&amp;nbsp;surfaces&amp;nbsp;a complete action history, including which product&amp;nbsp;took action&amp;nbsp;and what verdict was assigned. This granular visibility demystifies complex incidents and builds confidence in the layered defense model.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As the threat landscape continues to evolve, so must our defenses. While organizations embrace defense-in-depth, fragmented integrations may lead to unintended consequences such as diminished detection capabilities, overlapping controls, and SOC inefficiencies. With the Defender for Office 365 ICES vendor ecosystem, Microsoft is setting a new standard for collaborative, integrated security platforms. By combining proven protection, seamless partnerships, and unified visibility, organizations can embrace defense-in-depth without complexity or compromise.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:276}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Whether combating phishing, malware, or the next generation of email-borne threats, customers benefit from a defense-in-depth strategy built for agility and efficiency. With hands-off enablement, unified experiences, and unmatched transparency, the Defender for Office 365 ecosystem empowers every organization to stay one step ahead—today and tomorrow.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;Learn More&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about the&amp;nbsp;Microsoft Defender for Office 365 ICES&amp;nbsp;Vendor Ecosystem, please visit&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-office-365/mdo-ices-vendor-ecosystem" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/defender-office-365/mdo-ices-vendor-ecosystem&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 21:43:12 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/introducing-the-microsoft-defender-for-office-365-ices-vendor/ba-p/4424817</guid>
      <dc:creator>Ramya_Chitrakar</dc:creator>
      <dc:date>2025-06-18T21:43:12Z</dc:date>
    </item>
    <item>
      <title>Auto-Remediation of Malicious Messages in Automated Investigation and Response (AIR) is GA</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/auto-remediation-of-malicious-messages-in-automated/ba-p/4418047</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We are excited to announce the GA release of auto-remediation of malicious messages through automated investigation and response (AIR) expanding this powerful tool and deliver on full end to end automation of key SOC scenarios.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;AIR works to triage, investigate and remediate and respond to high-impact, high-volume security alerts providing tenant level analysis to increase customer protection and optimize SOC teams. With this enhancement, customers will be able to configure AIR to automatically execute remediations for messages within malicious entity clusters saving SOC teams time and further expediting remediation by removing the need to for SOC teams to approve these actions!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To highlight the key user submission scenario, in addition to AIR completing triage, investigation, remediation identification, and end user feedback responses, customers may now configure AIR to take this a step even further to automatically execute on identified remediations.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Auto-Remediation Action&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&lt;SPAN data-contrast="auto"&gt;When AIR recognizes a malicious file or URL, it creates a cluster around the malicious file or URL grouping all messages that contain that file or URL into the respective cluster. The automated investigation then checks the location of the messages within the cluster and if it finds messages within user’s mailboxes, AIR will produce a remediation action. With the auto-remediation enhancement, if the customer has configured the cluster type to auto-remediate, this action will automatically be executed without the need for SecOps approval - removing identified threats at machine speed!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-contrast="auto"&gt;Auto-remediated clusters showing&amp;nbsp;in action center history with decided by&amp;nbsp;stating&amp;nbsp;automation:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Configuration&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&lt;SPAN data-contrast="auto"&gt;Auto-remediation will be controlled by a configuration within Settings &amp;gt; Email &amp;amp; Collaboration &amp;gt; MDO automation settings. Within the message clusters section, organizations may specify which types of message clusters they would like to be auto-remediated:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Similar files&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;When the automated investigation recognizes a malicious file, it creates a cluster around the malicious file grouping all messages that&amp;nbsp;contain&amp;nbsp;that file into the cluster. Selecting this checkbox will&amp;nbsp;opt&amp;nbsp;the organization into auto-remediation for these malicious file clusters.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1440,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Similar URLs&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;When the automated investigation recognizes a malicious URL, it creates a cluster around the malicious URL grouping all messages that&amp;nbsp;contain&amp;nbsp;the URL into the cluster. Selecting this checkbox will&amp;nbsp;opt&amp;nbsp;the organization into auto-remediation for these malicious URL clusters.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-contrast="auto"&gt;The next configuration is for the remediation action,&amp;nbsp;designating&amp;nbsp;soft&amp;nbsp;delete&amp;nbsp;as soft delete is currently the only action supported through AIR.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-contrast="auto"&gt;Auto-remediation of malicious entity clusters configuration found in settings&amp;gt;Email &amp;amp; collaboration&amp;gt;MDO automation settings:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Customers interested in auto-remediation must turn it on through the MDO automation settings page as it will not be on by default.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Auto-Remediation Action Logging&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The Defender portal provides several ways for customers to review remediation actions to stay cognizant of the actions executed. These include within the investigation, action center, email entity as well as threat explorer and advanced hunting. Should customers disagree with the action executed, the ability to move the messages back to mailboxes is available as well based on configuration and timing.&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Auto-remediated messages showing in Threat Explorer Additional actions as Automated Remediation: automated:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM class="lia-align-center"&gt;&lt;SPAN data-contrast="auto"&gt;Auto-remediated messages showing in Advanced Hunting with ActionType as Automated Remediation and ActionTrigger as Automation:&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Learn More &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://forms.office.com/pages/responsepage.aspx?id=v4j5cvGGr0GRqy180BHbR6p1PlvM6dpGp3aHw7pmIutUOFY2WVQ3SzU5Vk01MlBWRzFQWktMRFNGNC4u&amp;amp;route=shorturl" target="_blank" rel="noopener"&gt;Register for the deep dive webinar&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;on&amp;nbsp;Microsoft Defender for Office 365 automated investigation and response (AIR) on June 25, 2025, at 8:00am PDT / 3:00pm UTC. Learn more about the feature enhancements, as well as how AIR can help&amp;nbsp;optimize&amp;nbsp;SOC teams and accelerate threat response.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about the auto-remediation in AIR, please visit &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/air-auto-remediation" target="_blank" rel="noopener"&gt;Automated remediation in AIR - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about investigations in MDO, please visit the following pages: &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/air-about?view=o365-worldwide" target="_blank" rel="noopener"&gt;Automated investigation and response in Microsoft Defender for Office 365 - Office 365 | Microsoft Learn&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/air-view-investigation-results?view=o365-worldwide" target="_blank" rel="noopener"&gt;View the results of an automated investigation in Microsoft 365 - Office 365 | Microsoft Learn&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/air-about-office?view=o365-worldwide#example-a-user-reported-phish-message-launches-an-investigation-playbook" target="_blank" rel="noopener"&gt;How automated investigation and response works in Microsoft Defender for Office 365 - Office 365 | Microsoft Learn&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/air-user-automatic-feedback-response" target="_blank" rel="noopener"&gt;Automatic user notifications for user reported phishing results in AIR - Microsoft Defender for Office 365 | Microsoft Learn&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 29 May 2025 13:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/auto-remediation-of-malicious-messages-in-automated/ba-p/4418047</guid>
      <dc:creator>KellyCrider</dc:creator>
      <dc:date>2025-05-29T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Part 2: Build custom email security reports and dashboards with workbooks in Microsoft Sentinel</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-2-build-custom-email-security-reports-and-dashboards-with/ba-p/4411303</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Security teams in both small and large organizations track key metrics to make critical security decisions&amp;nbsp;and&amp;nbsp;identify&amp;nbsp;meaningful trends in their&amp;nbsp;organizations. Defender for Office 365 has rich, built-in reporting capabilities that provide insights into your security posture&amp;nbsp;to support these needs. However, sometimes security teams require custom reporting solutions to create dedicated views, combine multiple data sources, and get&amp;nbsp;additional&amp;nbsp;insights to meet their needs.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/build-custom-email-security-reports-and-dashboards-with-workbooks-in-microsoft-s/4352242" target="_blank" rel="noopener" data-lia-auto-title="In January of this year" data-lia-auto-title-active="0"&gt;In January of this year&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;we&amp;nbsp;shared an example&amp;nbsp;of&amp;nbsp;how you can use&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks in Microsoft Sentinel&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to build a custom dashboard&amp;nbsp;for Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Today,&amp;nbsp;we&amp;nbsp;are excited to announce the release of&amp;nbsp;an updated version of the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt;&amp;nbsp;–&amp;nbsp;Microsoft Sentinel workbook.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Over the past few months, we have received feedback from numerous security teams, offering a multitude of ideas for new insights, updated visuals, and improved structure for the workbook. We have incorporated these suggestions into this update to enhance the experience for all users of the Microsoft Defender for Office 365 Detections and Insights workbook.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;What’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; new?&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;We have changed the workbook structure and divided visuals and insights related to the same topic to be on their own tab. We have also added many new visuals and updated existing visuals.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Using tabs for easier navigation&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Simply use the tabs now on the top of the workbook to navigate between the various insights' groups.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Notable changes:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;False Positive and False Negative Submissions&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; insights are separated to have their own tab&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;A new tab added for&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Quarantine Insights&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;The complete list of tabs is:&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Detection Overview&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;|&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;STRONG&gt;Email - Malware Detections&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;Email - Phish Detections&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;Email - Spam Detections&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;URL Detections and Clicks&amp;nbsp;&lt;/STRONG&gt;|&amp;nbsp;&lt;STRONG&gt;Email - Top Users/Senders&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;Email - Detection Overrides&lt;/STRONG&gt; |&amp;nbsp;&lt;STRONG&gt;False&amp;nbsp;Negative (FN) Submissions&lt;/STRONG&gt; |&amp;nbsp;&lt;STRONG&gt;False&amp;nbsp;Positive (FP) Submissions&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;File - Malware Detections (SharePoint,&amp;nbsp;Teams&amp;nbsp;and OneDrive)&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;Post Delivery Detections and Admin Actions&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;&lt;STRONG&gt;Quarantine Insights&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Please note&lt;/STRONG&gt;: &lt;EM&gt;The workbook has a total of 12 tabs. If all tabs are not visible, you can access the remaining tabs using the "..." located at the end of the tab list on the right side&lt;/EM&gt;.&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;New insights&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;and visuals&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;We have added new insights and&amp;nbsp;visuals to help security team members better understand&amp;nbsp;their Email security posture.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;Some examples:&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Detection Overview&lt;/STRONG&gt; tab - Bad traffic percentage (%) - Inbound Emails Visualizes bad traffic (% of emails with threats) compared to total inbound emails over time summarizing the data daily.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Email – Malware/Email-Phish detection&lt;/STRONG&gt; tabs - Zero Day detections (URL &amp;amp; Attachment detonation)&amp;nbsp;&lt;BR /&gt;Visualizes total emails with Malware/Phish detections over time summarizing the data daily by detection technologies/controls used for detecting unknown-unique malware and phish (URL detonation, File detonation).&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Email - Phish Detections&lt;/STRONG&gt; tab - Top Domains Outbound with Emails with Threats Inbound (Partner BEC)&amp;nbsp;&lt;BR /&gt;Visualizes top outbound recipient domains by outbound email volume and shows total number of inbound emails with Threats from the same domains (as inbound senders).&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Email – Malware/Phish/Spam Detection&lt;/STRONG&gt; tabs - Detections by delivery location&lt;BR /&gt;Visualizes total emails with Malware/Phish/Spam detections over time summarizing the data daily by Delivery Location. These insights can help security teams drive towards stronger security posture by adopting Quarantine as filter verdict action replacing Move to Junk email folder.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;URL Detections and Clicks&lt;/STRONG&gt; tab – Top malicious URLs clicked by users &lt;BR /&gt;Visualizes top malicious URLs with the number of clicks attempts performed by users.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;False Negative (FN) Submissions&lt;/STRONG&gt; tab – new insights added for user defined filter verdict override configuration impacting the delivery action of the reported email, top 10 inbound P2 senders' domains of reported emails, top subjects of the internal emails reported by users as Phish, number if user reported Phish emails where the email is already in the Junk email folder.&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H6&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Updated Insights&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H6&gt;
&lt;H6&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="auto"&gt;We have updated existing insights by adding additional information to them or visualizing the raw data in a different way.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Some examples:&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Email – Malware/Phish/Spam Detection&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;tabs - Email Top 10 Domains sending Malware table view now has Total emails sent by the sender domain and bad traffic % from the sender domain.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Grid views are now searchable:&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;False Negative (FN) Submissions/ False Positive (FP) Submissions&lt;/STRONG&gt; are separated now on their own tab, existing insights got updated to understand better what users and security team members are submitting.&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Malware family related visuals&amp;nbsp;on&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Email&amp;nbsp;– Malware detections&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;File - Malware Detections (SharePoint, Teams and OneDrive)&lt;/STRONG&gt; a&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;re&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;using searchable grid now:&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;img /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;How &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;can I&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;get the updated version?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;The latest&amp;nbsp;version of the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt;&amp;nbsp;workbook is available&amp;nbsp;as part of&amp;nbsp;the&amp;nbsp;&lt;STRONG&gt;Microsoft&amp;nbsp;Defender XDR&lt;/STRONG&gt; solution in the Microsoft Sentinel - Content hub. Version&amp;nbsp;&lt;STRONG&gt;3.0.12&lt;/STRONG&gt;&amp;nbsp;of the solution has the updated workbook template.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;If you already have the&amp;nbsp;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt; solution deployed, version 3.0.12 is available now as an update. After you install the update, you will have the new workbook template available to use.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If you install the &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Defender XDR&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;solution for the first time, you are deploying the latest version and will have the updated template ready to use.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;How to share the workbook with others&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="auto"&gt;Leveraging Microsoft Sentinel workbooks for reporting to leadership is a common use case.&amp;nbsp;A common concern is granting recipients access to Microsoft Sentinel or all of the tables within the workspace.&amp;nbsp;Using some different RBAC components, this can be done.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="auto"&gt;For details, see the &lt;/SPAN&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftsentinelblog/manage-access-to-microsoft-sentinel-workbooks-with-lower-scoped-rbac/3906280" target="_blank" rel="noopener" data-lia-auto-title="Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC" data-lia-auto-title-active="0"&gt;Manage Access to Microsoft Sentinel Workbooks with Lower Scoped RBAC&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;on the Microsoft Sentinel Blog.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Can I&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;edit&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;the workbook&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;change t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;he visuals?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&lt;SPAN data-contrast="auto"&gt;Yes, absolutely. The&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Microsoft Defender for Office 365 Detections and Insights&lt;/STRONG&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is a workbook template in Microsoft Sentinel. It is ready to use with a few simple clicks, however when needed you can save and edit the workbook based on your organization’s need.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&lt;SPAN data-contrast="auto"&gt;You can customize each visual easily or review the underlying KQL.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Simply edit the workbook after s&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;aving,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;then&amp;nbsp;adjust the underlying KQL query,&amp;nbsp;change the type of&amp;nbsp;the&amp;nbsp;visual,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;create new insights.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;More information:&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;Visualize your data using workbooks in Microsoft Sentinel | Microsoft Learn&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Why&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;use&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;workbooks in Microsoft Sentinel&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;&amp;nbsp;for email security reports and insights&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80}"&gt;&lt;SPAN data-contrast="auto"&gt;There are many potential benefits to using workbooks if you already use Microsoft Sentinel and already stream the hunting data tables:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can choose to store data for a longer period of time via&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/azure/azure-monitor/logs/data-retention-configure?tabs=portal-3%2Cportal-1%2Cportal-2#configure-table-level-retention" target="_blank" rel="noopener"&gt;configuring longer retention for tables&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;you use for your workbooks. For&amp;nbsp;example,&amp;nbsp;you can store&amp;nbsp;Defender for Office 365&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Email Events table&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;data for 1 year and build visuals over&amp;nbsp;a longer&amp;nbsp;period of time.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can configure auto-refresh for the workbook to keep the data&amp;nbsp;shown&amp;nbsp;up to date.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;You can&amp;nbsp;access&amp;nbsp;ready-to-use&amp;nbsp;workbook templates and customize them if&amp;nbsp;it's&amp;nbsp;needed.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;SPAN data-contrast="auto"&gt;Do you have questions or feedback about Microsoft Defender for Office 365? Engage with the community and Microsoft experts in the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://aka.ms/MDOForum" target="_blank" rel="noopener"&gt;Defender for Office 365 forum&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;. &lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{}"&gt;More information&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/microsoft-365-defender-sentinel-integration?tabs=azure-portal" target="_blank" rel="noopener"&gt;&lt;SPAN data-ccp-props="{}"&gt;Integrate Microsoft Defender XDR with Microsoft Sentinel&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about Microsoft Sentinel &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/sentinel/monitor-your-data?tabs=azure-portal" target="_blank" rel="noopener"&gt;workbooks&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender for Office 365 Detection Details Report&amp;nbsp;–&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://github.com/Azure/Azure-Sentinel/tree/master/Tools/Microsoft%20Defender%20for%20Office%20365" target="_blank" rel="noopener"&gt;Updated Power BI template for Microsoft Sentinel and Log Analytics&lt;/A&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-ccp-props="{}"&gt;Learn more about &lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank" rel="noopener"&gt;Microsoft Defender XDR&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 18:26:45 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/part-2-build-custom-email-security-reports-and-dashboards-with/ba-p/4411303</guid>
      <dc:creator>dmozes</dc:creator>
      <dc:date>2026-01-14T18:26:45Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Office 365's Language AI for Phish: Enhancing Email Security</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-s-language-ai-for-phish/ba-p/4410446</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Email security presents a complex challenge for individuals and organizations alike. Over the years, attackers have evolved from simple spam campaigns to sophisticated threats including ransomware, identity theft schemes, and carefully crafted phishing scams. Now, malicious actors are armed with Generative AI and are advancing at an alarming pace.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&lt;SPAN data-contrast="auto"&gt;In response, Microsoft Defender for Office 365 has dedicated extensive research and development efforts to making email security smarter, more flexible, and more proactive. This dedication led to the introduction of specialized language intelligence to fight Business Email Compromise (BEC) attacks, announced last year at Ignite 2024 (&lt;/SPAN&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-ignite-redefining-email-security-with-llms-to-tackle-a-new-era-of-soci/4302421" target="_blank" rel="noopener" data-lia-auto-title="Microsoft Ignite: Redefining email security with LLMs to tackle a new era of social engineering | Microsoft Community Hub" data-lia-auto-title-active="0"&gt;Microsoft Ignite: Redefining email security with LLMs to tackle a new era of social engineering | Microsoft Community Hub&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;). With that announcement, we offered a significant leap in analyzing suspicious messages using advanced natural language processing, enabling organizations to better detect subtle manipulative emails designed to lure unsuspecting users into revealing confidential data or transferring funds.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The threats, however,&amp;nbsp;have not stopped&amp;nbsp;with BEC.&amp;nbsp;Phishing attacks are&amp;nbsp;constantly evolving&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;leveraging&amp;nbsp;new tactics and forms. As part of&amp;nbsp;Defender for&amp;nbsp;Office’s&amp;nbsp;mission to stay one step ahead of these threats,&amp;nbsp;we’re&amp;nbsp;taking the same robust&amp;nbsp;Language AI&amp;nbsp;approach we used for BEC analysis and applying it to a broader spectrum of phishing attacks.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&lt;SPAN data-contrast="auto"&gt;Today we’re excited to announce&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender for Office 365’s new Language AI for Phish model&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;. This&amp;nbsp;model&amp;nbsp;progressively learns from thousands&amp;nbsp;of&amp;nbsp;real-world phishing&amp;nbsp;attempts&amp;nbsp;and analyzes all messages classified as phish.&amp;nbsp;Furthermore, it incorporates&amp;nbsp;advanced Machine Learning and&amp;nbsp;Natural Language Processing (NLP) techniques to read, process, and understand email content the way a human analyst might, yet in a fraction of the time and at an immense scale.&amp;nbsp;&lt;SPAN data-contrast="none"&gt;Our&amp;nbsp;model&amp;nbsp;has been operational&amp;nbsp;since April 2025, achieving&amp;nbsp;over&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;99.99% accuracy&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;and&amp;nbsp;blocking&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;1 million phishing&amp;nbsp;emails daily&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;Statistics: 99.9998% accuracy in identifying malicious phishing messages / 1 million phishing emails blocked daily&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By advancing our language AI and rigorously training it on phishing email threats, we are further strengthening the comprehensive protections established by our BEC-focused innovations. These enhanced capabilities create an integrated security framework designed to proactively address evolving risks and accelerate response times to emerging threats. Through Microsoft Defender for Office 365’s commitment to continuous improvement, this expanded approach empowers organizations and individuals to maintain a strong security posture in the face of ever-changing cyber challenges.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&lt;SPAN data-contrast="auto"&gt;Learn More:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true}"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Defender for Office 365’s Language AI capabilities, please read more &lt;/SPAN&gt;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/microsoft-ignite-redefining-email-security-with-llms-to-tackle-a-new-era-of-soci/4302421" target="_blank" rel="noopener" data-lia-auto-title="here" data-lia-auto-title-active="0"&gt;here&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;or visit our &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-office-365" target="_blank" rel="noopener"&gt;website&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2025 19:30:09 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/microsoft-defender-for-office-365-s-language-ai-for-phish/ba-p/4410446</guid>
      <dc:creator>Melanie_Cohen</dc:creator>
      <dc:date>2025-05-19T19:30:09Z</dc:date>
    </item>
    <item>
      <title>SafeLinks Protection for Links Generated by M365 Copilot Chat and Office Apps</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/safelinks-protection-for-links-generated-by-m365-copilot-chat/ba-p/4396828</link>
      <description>&lt;P&gt;The world is experiencing rapid changes, with artificial intelligence (AI) significantly transforming businesses and lifestyles. Additionally, it is impacting cybersecurity, as attackers leverage AI to refine their techniques. Microsoft is committed to ensuring that its AI-powered tools are secure and reliable for business applications. The security of AI remains a primary focus.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;M365 Copilot Chat&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Copilot serves as the user interface for AI, beginning with Copilot Chat. It is the chat experience utilized daily, powered by extensive knowledge from the web and designed to ensure safety and security for business applications. This platform signifies a fundamental change in our work methods, allowing individuals to operate more intelligently, efficiently, and collaboratively.&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;While &lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/microsoft-365/copilot/chat" target="_blank" rel="noopener"&gt;Copilot Chat&lt;/A&gt; is a powerful new on-ramp for everyone in your organization to build the AI habit,&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/microsoft-365/copilot/enterprise" target="_blank" rel="noopener"&gt;Microsoft 365 Copilot&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;remains&amp;nbsp;our best-in-class personal AI assistant for work. It includes everything in Copilot Chat and more.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;M365 Copilot Chat&lt;/img&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-contrast="auto"&gt;Enhancing Security&amp;nbsp;of M365 Copilot Chat&amp;nbsp;with&amp;nbsp;SafeLinks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;We are excited to announce some important updates to M365 Copilot Chat that will enhance security and user experience:&lt;/P&gt;
&lt;P&gt;1. &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;SafeLinks&amp;nbsp;protection&amp;nbsp;at Time-of-Click of URL&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/safe-links-about?view=o365-worldwide" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365's SafeLinks protection&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; has been successfully released &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;worldwide for Copilot Chat on Desktop, Web, Outlook Mobile, Teams Mobile and &lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://www.microsoft.com/en-us/microsoft-365/mobile" target="_blank" rel="noopener"&gt;Microsoft 365 Copilot Mobile app&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (iOS and Android)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;!&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:360,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;M365 Copilot Chat&amp;nbsp;has&amp;nbsp;integrated&amp;nbsp;with&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-office-365/safe-links-about?view=o365-worldwide" target="_blank" rel="noopener"&gt;SafeLinks in Defender for Office 365&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;to provide time-of-click URL protection for the hyperlinks included in its chat responses.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;User with MDO license clicks on a malicious link in Copilot Chat&lt;/SPAN&gt;&lt;/img&gt;&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;User with MDO license clicks on a malicious link in Copilot Chat on Mobile&lt;/SPAN&gt;&lt;BR /&gt;&lt;/img&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;This functionality applies to users with Microsoft Defender for Office 365 Plan 1 or Plan 2 service plans. No policy configuration is needed within the SafeLinks policy.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;Within Microsoft Defender for Office 365 Security Center,&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/reports-defender-for-office-365#url-protection-report" target="_blank" rel="noopener"&gt;the URL protection report&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; will show the relevant summary and trend views for threats detected and actions taken on URL clicks generated from within M365 Copilot Chat.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;URL threat protection report showing clicks on a malicious link from Copilot Chat&lt;/img&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-contrast="auto"&gt;Moreover, Security Operations Center analysts will be able to see the source of the originating URL clicks in the&amp;nbsp;&lt;/SPAN&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/threat-explorer-threat-hunting" target="_blank" rel="noopener"&gt;investigation and hunting experiences&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;within Microsoft Defender for Office 365.&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;Advanced Hunting showing click events on a malicious link from Copilot Chat on different clients&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;2.&amp;nbsp;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Native Time-of-Click URL Reputation Check&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;&lt;SPAN data-contrast="auto"&gt;For users without SafeLinks protection (which is available as part of Microsoft Defender for Office 365), M365 Copilot Chat will natively enable time-of-click URL reputation check for the hyperlinks returned in its chat responses.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;User without MDO license clicks on a malicious link in Copilot Chat&lt;/img&gt;&lt;img&gt;User without MDO license clicks on a malicious link in Copilot Chat on Mobile&lt;/img&gt;
&lt;P&gt;3. &lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Hyperlink&amp;nbsp;Display&amp;nbsp;Changes&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN data-contrast="auto"&gt;M365 Copilot Chat no longer redacts&amp;nbsp;hyperlinks in its chat responses if they are found in the grounding data used to generate the responses.&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;These updates ensure that M365 Copilot Chat&amp;nbsp;remains&amp;nbsp;a secure and reliable tool for your organization, helping you navigate the complexities of modern cybersecurity.&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;What’s Next?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;Following this release,&amp;nbsp;SafeLinks&amp;nbsp;protection will be available to Copilot App Chats for Word,&amp;nbsp;PowerPoint&amp;nbsp;and Excel.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;Conclusion&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;As AI continues to evolve, so do the threats that come with it. At Microsoft, we are dedicated to staying ahead of these threats and providing our customers with the tools they need to stay secure. With the integration of&amp;nbsp;SafeLinks, M365 Copilot Chat is poised to be&amp;nbsp;a game-changer&amp;nbsp;in the world of business AI.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;Note: This blog post is associated with Message Center post&amp;nbsp;MC1013453.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Learn more&amp;nbsp;&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&lt;SPAN data-ccp-props="{}"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-office-365/safe-links-about" target="_blank" rel="noopener"&gt;Microsoft Defender for Office 365 SafeLinks protection&lt;/A&gt;&lt;BR /&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/copilot/manage" target="_blank" rel="noopener"&gt;M365 Copilot Chat&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 May 2025 17:09:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/safelinks-protection-for-links-generated-by-m365-copilot-chat/ba-p/4396828</guid>
      <dc:creator>UrjaGandhi</dc:creator>
      <dc:date>2025-05-30T17:09:40Z</dc:date>
    </item>
  </channel>
</rss>

