Skip to content

Commit 06130a0

Browse files
Merge branch 'main' into patch-2
2 parents afd8826 + 61b4118 commit 06130a0

10 files changed

+49
-24
lines changed

ATPDocs/deploy/activate-sensor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can choose to activate eligible domain controllers either automatically, whe
2525
|---------|---------|
2626
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
2727
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
28-
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
28+
|OS upgrade is required |This domain controller is running an unsupported operating system version for the new sensor. Upgrade the OS version to the latest version. |
2929

3030
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
3131

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,35 @@ A user who starts a session in Edge with a profile other than his work profile,
114114

115115
If the URL points to a resource within the secured application, the user will be directed to the application's homepage in Edge.
116116

117+
### Outdated session policy enforcement with Edge
118+
When a session policy is enforced using Edge in-browser protection and the user is later removed from the corresponding Conditional Access (CA) policy, the original session enforcement may still persist.
119+
120+
Example Scenario:
121+
122+
A user was originally assigned a CA policy for the Salesforce application, along with an Defender for Cloud apps session policy that blocked file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123+
124+
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125+
126+
Mitigation Options:
127+
128+
Option 1: Automatic cleanup
129+
1. Reassign the user/app to the CA policy.
130+
2. Remove the corresponding Defender for Cloud Apps session policy.
131+
3. Have the user access the application using Edge, this will trigger the policy removal automatically.
132+
4. Remove the CA policy again.
133+
134+
Option 2: Manual cleanup
135+
1. Delete the cached policy file
136+
- Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
137+
- Delete the file: mda_store.txt
138+
139+
2. Remove the work profile in Edge
140+
- Open Microsoft Edge.
141+
- Navigate to Profile Settings.
142+
- Delete the work profile associated with the outdated session policy.
143+
144+
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
145+
117146
## Related content
118147

119148
- [Conditional Access app control in Microsoft Defender for Cloud Apps](proxy-intro-aad.md)
2.06 KB
Loading
12.1 KB
Loading
7.68 KB
Loading
58.9 KB
Loading

defender-office-365/reports-mdo-email-collaboration-dashboard.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
description: Admins can learn about the information on the Microsoft Defender for Office 365 Overview dashboard in the Microsoft Defender portal.
1919
ms.custom:
2020
ms.service: defender-office-365
21-
ms.date: 6/27/2025
21+
ms.date: 07/14/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -38,7 +38,7 @@ The information on the **Overview** page is organized into the following areas:
3838

3939
For the permissions required to view the dashboard and reports, see [What permissions are needed to view these reports?](reports-email-security.md#what-permissions-are-needed-to-view-these-reports).
4040

41-
By default, the data on the page is shown for the last 30 days. But, you can show data for the last 60 days or the last 90 days by selecting the **Last 30 days** drop down at the top of the page.
41+
By default, the data on the page is shown for the last 30 days.
4242

4343
:::image type="content" source="media/email-collab-overview.png" alt-text="Screenshot of the Email and collaboration overview report page in the Microsoft Defender portal." lightbox="media/email-collab-overview.png":::
4444

@@ -56,17 +56,17 @@ The graph on the **Phish / Malware Efficacy** card visually represents the prote
5656

5757
- **Pre-delivery**: Items detected before they reach the recipient's mailbox.
5858
- **Post-delivery**: Items removed after the item was delivered to the recipient's mailbox via [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).
59-
- **Uncaught**: Delivered items that ZAP identified but couldn't remove. For example:
59+
- **Uncaught**: Delivered items that ZAP identified but didn't remove due to them already being remediated. For example:
6060
- Admin deletions or remediations.
6161
- [Admin submissions](submissions-admin.md) to Microsoft identifying the message as malware or phishing.
6262
- User deletions.
6363
- Non-Microsoft security provider deletions.
6464

65-
The percentage value is the number of messages in each category divided by the total number of malicious malware and phishing email during the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
65+
The percentage value is the number of messages in each category divided by the total number of malicious malware and phishing email during the review period selected.
6666

6767
Hover over a category in the chart to see the number of messages in each category for the review period. Hover over the percentage to see the total number of messages
6868

69-
:::image type="content" source="media/email-collab-overview-mdo-efficacy.png" alt-text="Screenshot of the Efficacy card in the Defender for Office 365 section of the Email & collaboration overview report page." lightbox="media/email-collab-overview-mdo-efficacy.png":::
69+
:::image type="content" source="media/email-collab-overview-mdo-efficacy.png" alt-text="Screenshot of the Phish / Malware Efficacy card in the Defender for Office 365 section of the Email & collaboration overview report page." lightbox="media/email-collab-overview-mdo-efficacy.png":::
7070

7171
> [!TIP]
7272
>
@@ -80,7 +80,7 @@ Hover over a category in the chart to see the number of messages in each categor
8080

8181
<!--- https://go.microsoft.com/fwlink/?linkid=2323912 --->
8282

83-
The graph on the **Threat detections** card shows the number of messages detected by the following technologies during the review period you selected at the top of the page (30 days (default), 60 days, or 90 days):
83+
The graph on the **Threat detections** card shows the number of messages detected by the following technologies during the review period selected.
8484

8585
- **Malware**: The breakdown of detection technologies is available in the **Threat protection status** report under [View data by Email \> Malware and Chart breakdown by Detection Technology](reports-email-security.md#view-data-by-email--malware-and-chart-breakdown-by-detection-technology).
8686

@@ -131,12 +131,8 @@ Hover over a category in the chart to see the number of **Onboarded** priority a
131131

132132
The graph on the **Policy recommendations** card shows the number of users directly protected by [Safe Links](safe-links-about.md) and [Safe Attachments](safe-attachments-about.md) policies as a percentage of the total number of users (the value 100% means everyone is protected). The numbers are taken from whether the following recommended actions in [Microsoft Secure Score](/defender-xdr/microsoft-secure-score) have the **Status** value `Completed`:
133133

134-
- <u>Safe Links</u>:
135-
- **Ensure Safe Links for Office applications is enabled**
136-
- **Create Safe Links policies for email messages**
137-
- <u>Safe Attachments</u>:
138-
- **Turn on Safe Attachments in block mode**
139-
- **Ensure Safe Attachments policy is enabled**
134+
- <u>Safe Links</u>: **Create Safe Links policies for email messages**
135+
- <u>Safe Attachments</u>: **Ensure Safe Attachments policy is enabled**
140136

141137
Hover over a category in the chart to see the number of **Impacted users** (the total number of users in the organization) and **Protected users** (users protected by Safe Links or Safe Attachment policies as defined by the recommended actions in Microsoft Secure Score).
142138

@@ -173,7 +169,7 @@ The **Tenant allow types** card shows a table with the types of allow entries in
173169
- [File hash](tenant-allow-block-list-files-configure.md#create-allow-entries-for-files)
174170
- [Sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-domains-and-email-addresses)
175171
- [IP allow](tenant-allow-block-list-ip-addresses-configure.md#create-allow-entries-for-ipv6-addresses)
176-
- **Messages allowed** column: The number of messages allowed for the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
172+
- **Messages allowed** column: The number of messages allowed for the review period selected.
177173

178174
:::image type="content" source="media/email-collab-overview-risky-allows-tenant-allow-types.png" alt-text="Screenshot of the Tenant allow types card in the Risky allows section of the Email & collaboration overview report page." lightbox="media/email-collab-overview-risky-allows-tenant-allow-types.png":::
179175

@@ -184,7 +180,7 @@ The **Tenant allow types** card shows a table with the types of allow entries in
184180
The **Exchange transport rules** card shows the mail flow rules (also known as transport rules) that allowed messages that would otherwise be blocked:
185181

186182
- **Rule ID**
187-
- **Messages allowed**: The number of messages allowed during the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
183+
- **Messages allowed**: The number of messages allowed during the review period selected.
188184

189185
Select **Review rules** to go to the **Rules** page in the Exchange admin center (EAC) at <https://admin.cloud.microsoft/exchange#/transportrules>.
190186

@@ -205,7 +201,7 @@ The graph on the **Email detections** shows Microsoft and non-Microsoft detectio
205201
- **Non-Microsoft post-delivery detections**
206202
- **Duplicate detections Duplicate post-delivery detections**
207203

208-
Hover over a category in the chart to see the number of messages in each category for the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
204+
Hover over a category in the chart to see the number of messages in each category for the review period selected.
209205

210206
:::image type="content" source="media/email-collab-overview-compare-solutions-email-detections.png" alt-text="Screenshot of the Email detections card in the Compare solutions section of the Email & collaboration overview report page." lightbox="media/email-collab-overview-compare-solutions-email-detections.png":::
211207

@@ -220,7 +216,7 @@ The graphs on the **Non-Microsoft detections** show the following information fo
220216
- **Phish**
221217
- **Spam**
222218

223-
Hover over a category in the chart to see the number of messages in each category for the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
219+
Hover over a category in the chart to see the number of messages in each category for the review selected.
224220

225221
- **Efficacy** graph: Shows the unique detections by the non-Microsoft service as a percentage of the total detections by Defender for Office 365.
226222

@@ -232,7 +228,7 @@ The information in the **Insights** section is described in the following subsec
232228

233229
### Top trending attacks card
234230

235-
The graph on the **Top trending attacks** card shows the most encountered phishing attack types by volume for the review period you selected at the top of the page (30 days (default), 60 days, or 90 days).
231+
The graph on the **Top trending attacks** card shows the most encountered phishing attack types by volume for the review period selected.
236232

237233
Threat classification in Defender for Office 365 uses advanced technologies such as large language models (LLMs), small language models (SLMs), and machine learning (ML) models to automatically detect and classify email-based threats.
238234

@@ -248,7 +244,7 @@ The **Emerging threats** card shows any notable campaigns observed by Microsoft
248244

249245
<!--- https://go.microsoft.com/fwlink/?linkid=2324014 --->
250246

251-
The graph on the **Microsoft 365 Secure Email Gateway performance** card compares the effectiveness of Defender for Office 365 against other secure email gateways. To ensure fairness, the number of missed messages is normalized per 1,000 active users.
247+
The graph on the **Microsoft 365 Secure Email Gateway performance** card compares the effectiveness of Defender for Office 365 against other secure email gateways. To ensure fairness, the number of missed phish and malware messages is normalized per 1,000 active users.
252248

253249
:::image type="content" source="media/email-collab-overview-insights-m365-secure-email-gateway.png" alt-text="Screenshot of the Microsoft 365 Secure Email Gateway performance card in the Insights section of the Email & collaboration overview report page." lightbox="media/email-collab-overview-insights-m365-secure-email-gateway.png":::
254250

defender-office-365/submissions-admin-review-user-reported-messages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Admins can mark messages and notify users of review results only if the user [re
4242
- **Payload reputation/detonation**: Up-to-date examination of any URLs and attachments in the message.
4343
- **Grader analysis**: Review done by human graders to confirm whether or not messages are malicious.
4444

45-
[Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
45+
For more information, see [Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
4646

4747
So, submitting or resubmitting messages to Microsoft is useful to admins only for messages that have never been submitted to Microsoft, or when you disagree with the original verdict.
4848

defender-office-365/submissions-admin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -824,12 +824,12 @@ The analysis results of the reported item are shown in the details flyout that o
824824
- Current detonation results to see if the URLs or files in the message were malicious or not.
825825
- Feedback from graders.
826826

827-
[Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
827+
For more information about how Microsoft processes submissions, see [Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
828828

829829
If an override or policy configuration was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override or policy, the detonation and feedback from graders could take up to a day.
830830

831831
> [!NOTE]
832-
> **Currently in Preview**, AI-powered Submissions Response capability introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
832+
> AI-powered Submissions Response capability introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
833833
834834
### Actions for admin submissions in Defender for Office 365
835835

defender-office-365/submissions-result-definitions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,12 +34,12 @@ When admins or users submit items to Microsoft for analysis, we do the following
3434
- **Payload reputation/detonation**: Up-to-date examination of any URLs and attachments in the message.
3535
- **Grader analysis**: Review done by human graders to confirm whether messages are malicious.
3636

37-
[Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
37+
For more information, see [Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
3838

3939
> [!NOTE]
4040
>
4141
> - In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit items to Microsoft for analysis, but the items are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
42-
> - **Currently in Preview**, AI-powered Submissions Response capability introduces generative AI explanations for email submissions to Microsoft. These explanations aim to provide enterprise admins with clear, detailed, human-readable explanations for why messages were classified. Currently, this feature is scoped to email submissions only, and AI-generated explanations aren't used for the following types of submissions:
42+
> - AI-powered Submissions Response introduces generative AI explanations for email submissions to Microsoft. These explanations aim to provide enterprise admins with clear, detailed, human-readable explanations for why messages were classified. Currently, this feature is scoped to email submissions only, and AI-generated explanations aren't used for the following types of submissions:
4343
> - Files
4444
> - URLs
4545
> - Microsoft Teams messages

0 commit comments

Comments
 (0)