Skip to content

Commit 3492787

Browse files
authored
Merge pull request #982 from MicrosoftDocs/chrisda
TABL/Submissions consistency updates
2 parents e2f7538 + ee6dfca commit 3492787

10 files changed

+64
-67
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 07/17/2024
11+
ms.date: 07/18/2024
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## July 2024
4343

44-
- **45 days after last used date**: You can now set 'remove 45 days after the last used date' on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **Last used** date is updated when the entity is encountered and identified as bad during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't used again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
44+
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't submitted again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
4545

4646
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
4747

defender-office-365/recommended-settings-for-eop-and-office365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -335,7 +335,7 @@ In PowerShell, you use the [New-SafeLinksPolicy](/powershell/module/exchange/new
335335
|**Apply real-time URL scanning for suspicious links and links that point to files** (_ScanUrls_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
336336
|**Wait for URL scanning to complete before delivering the message** (_DeliverMessageAfterScan_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
337337
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _DisableURLRewrite_ parameter is `$false`.|
338-
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Don't rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow. Report the URL as **Should not have been blocked (False positive)** and select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
338+
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Don't rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow. Report the URL as **I've confirmed it's clean** and then select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
339339
|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
340340
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** (_EnableSafeLinksForTeams_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
341341
|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|

defender-office-365/safe-links-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
f1_keywords:
1111
- '197503'
12-
ms.date: 06/19/2024
12+
ms.date: 07/18/2024
1313
ms.localizationpriority: medium
1414
ms.collection:
1515
- Strat_O365_IP
@@ -255,7 +255,7 @@ For more information about the order of precedence and how multiple policies are
255255
## "Do not rewrite the following URLs" lists in Safe Links policies
256256

257257
> [!NOTE]
258-
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
258+
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **I've confirmed it's clean** and then select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
259259
260260
Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that aren't rewritten by Safe Links scanning. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
261261

defender-office-365/safe-links-policies-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
ms.custom:
1919
description: Admins can learn how to view, create, modify, and delete Safe Links policies in Microsoft Defender for Office 365.
2020
ms.service: defender-office-365
21-
ms.date: 4/8/2024
21+
ms.date: 07/18/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -120,7 +120,7 @@ You configure Safe Links policies in the Microsoft Defender portal or in Exchang
120120
- **Do not rewrite the following URLs in email** section: Select the **Manage (nn) URLs** link to allow access to specific URLs that would otherwise be blocked by Safe Links.
121121

122122
> [!NOTE]
123-
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
123+
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **I've confirmed it's clean** and then select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
124124
125125
1. In the **Manage URLs to not rewrite** flyout that opens, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add URLs**.
126126
2. In the **Add URLs** flyout that opens, click in the **URL** box, enter a value, and then press the ENTER key or select the complete value that's displayed below the box. Repeat this step as many times as necessary.

defender-office-365/submissions-admin.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom: seo-marvel-apr2020
1717
description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."
1818
ms.service: defender-office-365
19-
ms.date: 4/19/2024
19+
ms.date: 07/18/2024
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -280,14 +280,16 @@ After a few moments, the block entry is available on the **URL** tab on the **Te
280280

281281
After you select this option, the following settings are available:
282282

283-
- **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
283+
- **Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
284284
- **1 day**
285285
- **7 days**
286286
- **30 days**
287287
- **Specific date**: The maximum value is 30 days from today.
288288

289289
For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
290290

291+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
292+
291293
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
292294

293295
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
@@ -340,12 +342,15 @@ After a few moments, the associated allow entries appear on the **Domains & addr
340342

341343
After you select this option, the following settings are available:
342344

343-
- **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
345+
- **Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
344346
- **1 day**
345347
- **7 days**
346348
- **30 days**
347349
- **Specific date**: The maximum value is 30 days from today.
348-
- **Block entry note (optional)**: Enter optional information about why you're blocking this item.
350+
351+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email attachment is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email attachment is clean, and if the email attachment isn't submitted again.
352+
353+
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item.
349354

350355
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
351356

@@ -395,11 +400,14 @@ For URLs reported as false positives, we allow subsequent messages that contain
395400

396401
After you select this option, the following settings are available:
397402

398-
- **Remove block entry after**: The default value is **30 days**, but you can select from the following values:
403+
- **Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
399404
- **1 day**
400405
- **7 days**
401406
- **30 days**
402407
- **Specific date**: The maximum value is 30 days from today.
408+
409+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious URL is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the URL is clean, and if the URL isn't submitted again.
410+
403411
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item.
404412

405413
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
@@ -1062,7 +1070,7 @@ These actions are described in the following subsections.
10621070

10631071
After you select the message on the **User reported** tab, use either of the following methods to submit the message to Microsoft:
10641072

1065-
- **On the User reported tab**: Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.
1073+
- **On the User reported tab**: Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
10661074

10671075
- **In the details flyout of the selected message**: Select **Submit to Microsoft for analysis** or :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options** \> **Submit to Microsoft for analysis** at the top of the flyout.
10681076

@@ -1086,12 +1094,14 @@ In the **Submit to Microsoft for analysis** flyout that opens, do the following
10861094

10871095
After you select this option, the following settings are available:
10881096

1089-
- **Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
1097+
- **Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
10901098
- **1 day**
10911099
- **7 days**
10921100
- **30 days**
10931101
- **Specific date**: The maximum value is 30 days from today.
10941102

1103+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
1104+
10951105
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
10961106

10971107
When you're finished in the flyout, select **Submit**, and then select **Done**.
@@ -1143,7 +1153,7 @@ After you submit a user reported message to Microsoft from the **User reported**
11431153

11441154
#### Trigger an investigation in Defender for Office 365 Plan 2
11451155

1146-
- **On the User reported tab**, select **Trigger investigation** in the dropdown list on :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.
1156+
- **On the User reported tab**, select **Trigger investigation** in the dropdown list on :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
11471157

11481158
:::image type="content" source="media/admin-submission-user-reported-submit-button-options.png" alt-text="The Trigger investigation action in the Submit to Microsoft for analysis dropdown list." lightbox="media/admin-submission-user-reported-submit-button-options.png":::
11491159

0 commit comments

Comments
 (0)