Skip to content

Commit 4f65bad

Browse files
authored
Merge pull request #9472 from chrisda/chrisda
Chrisda to Main
2 parents aaab486 + 7cac7cd commit 4f65bad

File tree

4 files changed

+161
-0
lines changed

4 files changed

+161
-0
lines changed

SharePoint/SharePointOnline/onlinetoc/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -207,6 +207,8 @@
207207
href: ../search/search-results-dont-appear-for-group-owners.md
208208
- name: Security
209209
items:
210+
- name: Resolve false positive malware detections
211+
href: ../security/false-positive-malware-detections.md
210212
- name: Handling ransomware in SharePoint Online
211213
href: ../security/handling-ransomware-in-sharepoint-online.md
212214
- name: Migrated accounts aren't resolved
Lines changed: 159 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,159 @@
1+
---
2+
title: Resolve False Positive Malware Detections
3+
ms.author: meerak
4+
author: cloud-writer
5+
manager: dcscontentpm
6+
ms.date: 08/13/2025
7+
audience: ITPro
8+
ms.topic: troubleshooting
9+
search.appverid:
10+
- SPO160
11+
- MET150
12+
appliesto:
13+
- SharePoint Online
14+
ms.custom:
15+
- CSSTroubleshoot
16+
- CI 7100
17+
- sap: Items and Files
18+
ms.reviewer: mithr, prbalusu, alehud, chrisda
19+
description: Provides guidance to identify and resolve false positive malware detections in SharePoint.
20+
---
21+
22+
# Resolve false positive malware detections
23+
24+
False positive detections of malware in Microsoft SharePoint occur when a safe file is mistakenly identified as malware by Microsoft scanning engines. This article explains how to identify which feature flagged the file, how to report it for analysis, and how to unblock the file, if it's necessary. Although the information in this article focuses on files in SharePoint, it applies also to files that are stored on OneDrive and in Microsoft Teams.
25+
26+
> [!TIP]
27+
>
28+
> - Admins or security operations (SecOps) personnel who have [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) permissions in organizations that use cloud mailboxes have access files on the following pages in the Microsoft Defender portal:
29+
> - The **Files** tab of the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>
30+
> - The **Email Attachments** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>
31+
> - The **Files** tab of the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=FileHash>
32+
>
33+
> However, the **Files** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions> is available only to organizations that have **Microsoft Defender XDR** or **Microsoft Defender for Endpoint Plan 2**.
34+
> - For permissions and the most current information about the SharePoint Online Management Shell, see [Intro to SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell).
35+
36+
## Malware detection in SharePoint
37+
38+
SharePoint uses two main malware scanning engines:
39+
40+
- **Microsoft Defender for Office 365**: Files are tested in a cloud virtual environment (also known as a **sandbox**). For more information, see [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/defender-office-365/safe-attachments-for-spo-odfb-teams-about).
41+
- **Microsoft Defender for Endpoint**: Built-in virus protection that uses frequently updated **signature-based** detections.
42+
43+
File scanning isn't always immediate. Scanning occurs **asynchronously** based on such factors as file type and sharing status. If a file is detected as malware, access to the file is blocked, and a warning message appears.
44+
45+
:::image type="content" source="media/sharepoint-malware-false-positives-blocked-file-sharepoint.png" alt-text="Screenshot of a blocked file in SharePoint." lightbox="media/sharepoint-malware-false-positives-blocked-file-sharepoint.png":::
46+
47+
## Handle and prevent false positives
48+
49+
Use the steps in this section to resolve false positives in SharePoint.
50+
51+
### Step 1: Identify the engine that flagged the file
52+
53+
Use any of the following methods:
54+
55+
- **Simple**: Use either of the following methods in the Defender portal:
56+
- **Quarantine**: On the **Files** tab of the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>, the **Detected by** property contains one of the following values in Defender for Office 365:
57+
- **AV** for the signature detection
58+
- **MDO** for Safe Attachments detection
59+
60+
For more information, see [Use the Microsoft Defender portal to manage quarantined files in Defender for Office 365](/defender-office-365/quarantine-admin-manage-messages-files#use-the-microsoft-defender-portal-to-manage-quarantined-files-in-defender-for-office-365).
61+
62+
- **Threat Explorer (Explorer) or Real-time detections**: The **Content malware** view on one of the following pages:
63+
- **Explorer** (Defender for Office 365 Plan 2): <https://security.microsoft.com/threatexplorerv3>
64+
- **Real-time Detections** (Defender for Office 365 Plan 1): <https://security.microsoft.com/realtimereportsv3>
65+
66+
The **Detection technology** field in the filterable properties contains one of the following values:
67+
- **Antimalware protection** for signature detection
68+
- **File detonation** or **File reputation** for Safe Attachments detection
69+
70+
For more information, see [Content malware view in Threat Explorer and Real-time detections](/defender-office-365/threat-explorer-real-time-detections-about#content-malware-view-in-threat-explorer-and-real-time-detections).
71+
72+
- **Advanced**: Use either of the following methods:
73+
- **Microsoft Purview Audit**: Review the audit log for **FileMalwareDetected** operations. By default, the log holds information for 180 days.
74+
- The **AuditData** column contains the **VirusVendor** field:
75+
- **Default** for signature-based detection
76+
- **Advanced Threat Protection** for Safe Attachments detection
77+
- The **VirusInfo** field contains the full name of the malware variant.
78+
79+
For more information, see [Search the audit log](/purview/audit-search).
80+
81+
- **SharePoint Online PowerShell**: Use the [Get-SPOMalwareFile](/powershell/module/sharepoint-online/get-spomalwarefile) for details about the detection. The **MalwareInfo** field indicates the detection type. For example, `Win32/CryptInject!MSR` or `Trojan_PDF_LinkedUrlCookie_A`.
82+
- Signature detection malware variants include forward slashes ('/').
83+
- Safe Attachments detection malware variants include underscores ('\_') or the text, _Malicious Payload_.
84+
85+
For example:
86+
87+
```powershell
88+
PS C:\WINDOWS\system32\> Get-SPOMalwareFile -FileUri 'https://contoso.sharepoint.com/sites/Everyone/Shared Documents/eic_order.log'
89+
90+
File : Microsoft.SharePoint.Client.File
91+
FilePath : Microsoft.SharePoint.Client.ResourcePath
92+
MalwareInfo : DOS/EICAR_Test_File
93+
MalwareStatus : Infected
94+
SiteURL : <https://contoso.sharepoint.com/sites/Everyone>
95+
Context : Microsoft.Online.SharePoint.PowerShell.CmdLetContext
96+
Tag :
97+
Path : Microsoft.SharePoint.Client.ObjectPathMethod
98+
ObjectVersion :
99+
ServerObjectIsNull : False
100+
TypedObject : Microsoft.Online.SharePoint.TenantAdministration.SPOMalwareFile
101+
```
102+
103+
### Step 2: Submit files to Microsoft for analysis
104+
105+
If multiple files are flagged, submit all affected files by using the following steps.
106+
107+
1. Download the files by using one of the following methods:
108+
109+
> [!CAUTION]
110+
> Downloading files that contain malware poses risks. Always adhere to your organization's security guidelines before you proceed.
111+
112+
- **Defender portal**: On the **Files** tab of **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>, select the file, and then select **Download**. For more information, see [Download quarantined files from quarantine](/defender-office-365/quarantine-admin-manage-messages-files#download-quarantined-files-from-quarantine).
113+
114+
- **SharePoint Online PowerShell**: Use the [Get-SPOMalwareFileContent](/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefilecontent) cmdlet.
115+
116+
2. Submit the files by using one of the following methods, based on how the file was detected:
117+
- **Safe Attachments detection**: Use the **Email attachments** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. For instructions, see [Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
118+
119+
- **Defender for Endpoint signature detection** (Microsoft Defender XDR or Microsoft Defender for Endpoint Plan 2): Submit a file for malware analysis by using the **Files** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions>. For instructions, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde). Or, submit the file through the **Microsoft Security Intelligence** portal at <https://www.microsoft.com/wdsi/filesubmission>.
120+
121+
### Step 3: Verify the outcome
122+
123+
If Microsoft identifies a false positive and updates the definitions, the file shouldn't be flagged again. If the file continues to be flagged, contact Microsoft Support, and specify whether the issue involves a single file or multiple files.
124+
125+
## Unblock files
126+
127+
> [!IMPORTANT]
128+
> Only unblock files that you're confident are safe.
129+
130+
Use any of the following methods:
131+
132+
- Admins can release files from [quarantine](https://security.microsoft.com/quarantine) within 30 days. For more information, see [Release quarantined files from quarantine](/defender-office-365/quarantine-admin-manage-messages-files#release-quarantined-files-from-quarantine).
133+
134+
- To submit a blocked file for Safe Attachments malware detection, admins can use the **Email attachments** tab (that also applies to Sharepoint files) on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. After you select **I've confirmed it's clean**, you can then select **Allow this file** to create an allow entry for the file on the **Files** tab of the **Tenant Allow/Block List**. For instructions, see [Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
135+
136+
> [!TIP]
137+
>
138+
> - Uploading a file again might restore access, but the file might also be flagged again unless the definitions are updated.
139+
> - For files that are blocked for more than 30 days, contact Microsoft Support and provide the following information:
140+
> - Evidence that the file is safe
141+
> - The detection type
142+
> - The file path from the relevant source:
143+
> - The SharePoint library details
144+
> - Output from the [Get-SPOMalwareFile](/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefile) cmdlet
145+
>
146+
> Here's an example path from the SharePoint library details:
147+
> <https://contoso.sharepoint.com/sites/Everyone/Shared%20Documents/General/MyDoc1.docx>
148+
>
149+
> :::image type="content" source="media/sharepoint-malware-false-positives-copy-path.png" alt-text="Screenshot of how to copy the path of a file in SharePoint" lightbox="media/sharepoint-malware-false-positives-copy-path.png":::
150+
151+
## More information
152+
153+
[Manage quarantined messages and files as an admin](/defender-office-365/quarantine-admin-manage-messages-files)
154+
155+
[Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](/defender-office-365/anti-malware-protection-for-spo-odfb-teams-about)
156+
157+
[Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/defender-office-365/safe-attachments-for-spo-odfb-teams-about)
158+
159+
[Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft)
67.3 KB
Loading
71.7 KB
Loading

0 commit comments

Comments
 (0)