Skip to content

Commit 18ae1fa

Browse files
authored
Update defender-for-office-365-whats-new.md
Added what if insights to what new section
1 parent 824bfec commit 18ae1fa

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ For more information on what's new with other Microsoft Defender security produc
4848
- With one click, SecOps personnel can take a quarantine release action directly from Explorer (Threat Explorer) or the Email entity page (no need to go to the Quarantine page in the Defender portal). For more information, see [Remediate malicious email delivered in Office 365](remediate-malicious-email-delivered-office-365.md).
4949
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Mac v16.89 (24090815) or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
5050
- We're updating the end user experience for allow and block list management of their email messages. With one click, users can block email from unwanted senders and prevent those messages from appearing in their default quarantine view and in quarantine notifications. Users can also allow email from trusted and prevent future messages from those senders from being quarantined (if there are no admin overrides). Users also have visibility into any admin overrides that led to a quarantined email message. For more information, see [View quarantined email](quarantine-admin-manage-messages-files.md#view-quarantined-email).
51+
- Admins can know see [Policy](anti-spam-policies-configure.md#use-the-microsoft-defender-portal-to-modify-anti-spam-policies) what-if insights for Bulk threshold, spoof & impersonation settings which lets them understand the implication of a setting change based on historical data. This will let admins confidently tune their settings without fearing about possible repurcussions on users.
5152

5253
## August 2024
5354

0 commit comments

Comments
 (0)