You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
8
8
author: chrisda
9
9
manager: deniseb
10
10
ms.localizationpriority: medium
11
-
ms.date: 07/17/2024
11
+
ms.date: 07/18/2024
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
41
41
42
42
## July 2024
43
43
44
-
-**45 days after last used date**: You can now set 'remove 45 days after the last used date' on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **Last used**date is updated when the entity is encountered and identified as bad during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't used again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
44
+
-**45 days after last used date**: The value **Remove allow entry after**\>**45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate**property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't submitted again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
45
45
46
46
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
Copy file name to clipboardExpand all lines: defender-office-365/recommended-settings-for-eop-and-office365.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -335,7 +335,7 @@ In PowerShell, you use the [New-SafeLinksPolicy](/powershell/module/exchange/new
335
335
|**Apply real-time URL scanning for suspicious links and links that point to files** (_ScanUrls_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
336
336
|**Wait for URL scanning to complete before delivering the message** (_DeliverMessageAfterScan_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
337
337
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _DisableURLRewrite_ parameter is `$false`.|
338
-
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Don't rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow. Report the URL as **Should not have been blocked (False positive)** and select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
338
+
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br><br> **Note**: Entries in the "Don't rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow. Report the URL as **I've confirmed it's clean** and then select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
339
339
|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
340
340
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** (_EnableSafeLinksForTeams_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
341
341
|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|
Copy file name to clipboardExpand all lines: defender-office-365/safe-links-about.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: overview
10
10
f1_keywords:
11
11
- '197503'
12
-
ms.date: 06/19/2024
12
+
ms.date: 07/18/2024
13
13
ms.localizationpriority: medium
14
14
ms.collection:
15
15
- Strat_O365_IP
@@ -255,7 +255,7 @@ For more information about the order of precedence and how multiple policies are
255
255
## "Do not rewrite the following URLs" lists in Safe Links policies
256
256
257
257
> [!NOTE]
258
-
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
258
+
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **I've confirmed it's clean** and then select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
259
259
260
260
Each Safe Links policy contains a **Do not rewrite the following URLs** list that you can use to specify URLs that aren't rewritten by Safe Links scanning. You can configure different lists in different Safe Links policies. Policy processing stops after the first (likely, the highest priority) policy is applied to the user. So, only one **Do not rewrite the following URLs** list is applied to a user who is included in multiple active Safe Links policies.
Copy file name to clipboardExpand all lines: defender-office-365/safe-links-policies-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection:
18
18
ms.custom:
19
19
description: Admins can learn how to view, create, modify, and delete Safe Links policies in Microsoft Defender for Office 365.
20
20
ms.service: defender-office-365
21
-
ms.date: 4/8/2024
21
+
ms.date: 07/18/2024
22
22
appliesto:
23
23
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -120,7 +120,7 @@ You configure Safe Links policies in the Microsoft Defender portal or in Exchang
120
120
-**Do not rewrite the following URLs in email** section: Select the **Manage (nn) URLs** link to allow access to specific URLs that would otherwise be blocked by Safe Links.
121
121
122
122
> [!NOTE]
123
-
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **Should not have been blocked (False positive)** and select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
123
+
> Entries in the "Do not rewrite the following URLs" list aren't scanned or wrapped by Safe Links during mail flow, but might still be blocked at time of click. Report the URL as **I've confirmed it's clean** and then select **Alow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).
124
124
125
125
1. In the **Manage URLs to not rewrite** flyout that opens, select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add URLs**.
126
126
2. In the **Add URLs** flyout that opens, click in the **URL** box, enter a value, and then press the ENTER key or select the complete value that's displayed below the box. Repeat this step as many times as necessary.
Copy file name to clipboardExpand all lines: defender-office-365/submissions-admin.md
+18-8Lines changed: 18 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
ms.custom: seo-marvel-apr2020
17
17
description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -280,14 +280,16 @@ After a few moments, the block entry is available on the **URL** tab on the **Te
280
280
281
281
After you select this option, the following settings are available:
282
282
283
-
-**Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
283
+
-**Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
284
284
-**1 day**
285
285
-**7 days**
286
286
-**30 days**
287
287
-**Specific date**: The maximum value is 30 days from today.
288
288
289
289
For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
290
290
291
+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
292
+
291
293
-**Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
292
294
293
295
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
@@ -340,12 +342,15 @@ After a few moments, the associated allow entries appear on the **Domains & addr
340
342
341
343
After you select this option, the following settings are available:
342
344
343
-
-**Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
345
+
-**Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
344
346
-**1 day**
345
347
-**7 days**
346
348
-**30 days**
347
349
-**Specific date**: The maximum value is 30 days from today.
348
-
-**Block entry note (optional)**: Enter optional information about why you're blocking this item.
350
+
351
+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email attachment is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email attachment is clean, and if the email attachment isn't submitted again.
352
+
353
+
-**Allow entry note (optional)**: Enter optional information about why you're allowing this item.
349
354
350
355
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
351
356
@@ -395,11 +400,14 @@ For URLs reported as false positives, we allow subsequent messages that contain
395
400
396
401
After you select this option, the following settings are available:
397
402
398
-
-**Remove block entry after**: The default value is **30 days**, but you can select from the following values:
403
+
-**Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
399
404
-**1 day**
400
405
-**7 days**
401
406
-**30 days**
402
407
-**Specific date**: The maximum value is 30 days from today.
408
+
409
+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious URL is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the URL is clean, and if the URL isn't submitted again.
410
+
403
411
-**Allow entry note (optional)**: Enter optional information about why you're allowing this item.
404
412
405
413
When you're finished on the second page of the **Submit to Microsoft for analysis** flyout, select **Submit**.
@@ -1062,7 +1070,7 @@ These actions are described in the following subsections.
1062
1070
1063
1071
After you select the message on the **User reported** tab, use either of the following methods to submit the message to Microsoft:
1064
1072
1065
-
-**On the User reported tab**: Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.
1073
+
-**On the User reported tab**: Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
1066
1074
1067
1075
-**In the details flyout of the selected message**: Select **Submit to Microsoft for analysis** or :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More options**\>**Submit to Microsoft for analysis** at the top of the flyout.
1068
1076
@@ -1086,12 +1094,14 @@ In the **Submit to Microsoft for analysis** flyout that opens, do the following
1086
1094
1087
1095
After you select this option, the following settings are available:
1088
1096
1089
-
-**Remove allow entry after**: The default value is **30 days**, but you can select from the following values:
1097
+
-**Remove allow entry after**: The default value is **45 days after last used date**, but you can select from the following values:
1090
1098
-**1 day**
1091
1099
-**7 days**
1092
1100
-**30 days**
1093
1101
-**Specific date**: The maximum value is 30 days from today.
1094
1102
1103
+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
1104
+
1095
1105
-**Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
1096
1106
1097
1107
When you're finished in the flyout, select **Submit**, and then select **Done**.
@@ -1143,7 +1153,7 @@ After you submit a user reported message to Microsoft from the **User reported**
1143
1153
1144
1154
#### Trigger an investigation in Defender for Office 365 Plan 2
1145
1155
1146
-
-**On the User reported tab**, select **Trigger investigation** in the dropdown list on :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis***.
1156
+
-**On the User reported tab**, select **Trigger investigation** in the dropdown list on :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Submit to Microsoft for analysis**.
1147
1157
1148
1158
:::image type="content" source="media/admin-submission-user-reported-submit-button-options.png" alt-text="The Trigger investigation action in the Submit to Microsoft for analysis dropdown list." lightbox="media/admin-submission-user-reported-submit-button-options.png":::
0 commit comments