Skip to content

Commit 1117172

Browse files
committed
Learn Editor: Update tune-microsoft-defender-for-office-365.md
1 parent ab6c28b commit 1117172

File tree

1 file changed

+7
-6
lines changed

1 file changed

+7
-6
lines changed

defender-office-365/step-by-step-guides/tune-microsoft-defender-for-office-365.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,20 +23,21 @@ ms.date: 04/14/2025
2323
*Applies to: Microsoft Defender for Office 365 Plan 1 and Plan 2*
2424

2525
In this article
26-
·         [Configuring Security Controls](#Configuring-Security-Controls)
2726

28-
·         [Complex Routing and Dual Filtering Scenarios](#Complex-Routing-and-Dual-Filtering-Scenarios)
27+
·         [Configuring Security Controls](#configuring-security-controls)
2928

30-
·         [Security Control Thresholds](#Security-Control-Thresholds)
29+
·         [Complex Routing and Dual Filtering Scenarios](#complex-routing-and-dual-filtering-scenarios)
3130

32-
·         [Customer Configured Allows and Blocks](#Customer-Configured-Allows-and-Blocks)
31+
·         [Security Control Thresholds](#security-control-thresholds)
3332

34-
·         [Submissions and System Learning](#Submissions-and-System-Learning)
33+
·         [Customer Configured Allows and Blocks](#customer-configured-allows-and-blocks)
34+
35+
·         [Submissions and System Learning](#submissions-and-system-learning)
3536

3637

3738
While Microsoft Defender for Office 365 will start protecting collaboration across Exchange Online, Teams, SharePoint, One Drive for Business, and M365 applications by default when a license containing Microsoft Defender for Office 365 is enabled, some “tuning” can help get the maximum benefit.
3839

39-
“Tuning” is a term that is often used to mean different things.  It can refer to [Configuring Security Controls](#Configuring-Security-Controls) or configuring connectors [for Complex Routing and Dual Filtering Scenarios](#Complex-Routing-and-Dual-Filtering-Scenarios) as part of initial setup.  It can refer to setting [Security Control Thresholds](#Security-Control-Thresholds) on security controls like the bulk email slider and advanced filtering slider to determine how aggressively email will be blocked.  It can refer to adding and managing [Customer configured allows and blocks](#Customer-Configured-Allows-and-Blocks). Allows are a powerful tool for managing email deliverability but can let malicious or unwanted emails be delivered if not correctly managed.  Blocks will ensure unwanted emails are never delivered but can lead to user productivity loss.  Sometimes, it can even refer to [Submissions and System Learning](#Submissions-and-System-Learning), or how the filtering stack self corrects based on the false positive and false negative emails being submitted.
40+
“Tuning” is a term that is often used to mean different things.  It can refer to [Configuring Security Controls](#configuring-security-controls) or configuring connectors [for Complex Routing and Dual Filtering Scenarios](#complex-routing-and-dual-filtering-scenarios) as part of initial setup.  It can refer to setting [Security Control Thresholds](#security-control-thresholds) on security controls like the bulk email slider and advanced filtering slider to determine how aggressively email will be blocked.  It can refer to adding and managing [Customer configured allows and blocks](#customer-configured-allows-and-blocks). Allows are a powerful tool for managing email deliverability but can let malicious or unwanted emails be delivered if not correctly managed.  Blocks will ensure unwanted emails are never delivered but can lead to user productivity loss.  Sometimes, it can even refer to [Submissions and System Learning](#submissions-and-system-learning), or how the filtering stack self corrects based on the false positive and false negative emails being submitted.
4041

4142
### Configuring Security Controls
4243

0 commit comments

Comments
 (0)