Skip to content

Commit 4455504

Browse files
authored
Merge pull request #5225 from MicrosoftDocs/chrisda
Removed trailing spaces
2 parents 1ad8d99 + 91848a1 commit 4455504

32 files changed

+82
-83
lines changed

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
href: trial-user-guide-defender-for-office-365.md
4141

4242
- name: Deploy
43-
items:
43+
items:
4444
- name: Pilot and deploy Defender for Office 365
4545
href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-office-365/TOC.json&bc=/defender-office-365/breadcrumb/toc.json
4646
- name: Get started with Microsoft Defender for Office 365

defender-office-365/air-view-investigation-results.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ In Microsoft 365 organizations with [Microsoft Defender for Office 365 Plan 2](m
4242
- The email quantity value shown on the email clusters flyout.
4343

4444
The following email count values reflect email messages that were received after the initial analysis of the investigation:
45-
45+
4646
- The email count shown at the bottom of the **Email** tab of the email clusters flyout.
4747
- The email count shown in Explorer (Threat Explorer)
4848

@@ -232,7 +232,7 @@ The graph pane contains a visual representation of the elements and activities i
232232
- **No threats found** :::image type="icon" source="media/mdo-investigations-result-no-threats-found-icon.png" border="false":::
233233

234234
- **Partially investigated** :::image type="icon" source="media/mdo-investigations-result-partially-investigate-icon.png" border="false":::
235-
235+
236236
Some findings might require review. Use the **Evidence** and **Entities** tabs to manually investigate and remediate any potential issues.
237237

238238
- **Partially remediated** :::image type="icon" source="media/mdo-investigations-result-partially-remediated-icon.png" border="false":::

defender-office-365/anti-phishing-protection-spoofing-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ Mailing lists (also known as discussion lists) are known to have problems with a
158158
For example, Gabriela Laureano (`[email protected]`) is interested in bird watching, so she joins the mailing list `[email protected]`, and sends the following message to the list:
159159

160160
```text
161-
From: "Gabriela Laureano" <[email protected]>
161+
From: "Gabriela Laureano" <[email protected]>
162162
To: Birdwatcher's Discussion List <[email protected]>
163163
Subject: Great viewing of blue jays at the top of Mt. Rainier this week
164164

defender-office-365/anti-spam-bulk-senders-insight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ The bulk senders insight is available in the following locations:
101101
- On the **Email & collaboration reports and insights** page:
102102

103103
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Reports** \> **Email & collaboration** section \> **Email & collaboration reports and insights**. Or, to go directly to the **Email & collaboration reports and insights** page, use <https://security.microsoft.com/emailandcollabreport>.
104-
104+
105105
2. On the **Email & collaboration reports and insights** page, go to the **Email & collaboration insights** section and find the **Bulk senders insight**.
106106

107107
:::image type="content" source="media/insights-page-bulk-senders-insight.png" alt-text="The bulk senders insight on the Email & collaboration reports and insights page in the Microsoft Defender portal." lightbox="media/insights-page-bulk-senders-insight.png":::

defender-office-365/attack-simulation-training-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ By default, Outlook is configured to block automatic image downloads in messages
9999

100100
### I see clicks or compromise events from users who insist they didn't click the link in the simulation message OR I see clicks within a few seconds of delivery for many users (false positives). What's going on?
101101

102-
These events can occur when other security devices or applications inspect simulation messages. For example (but not limited to):
102+
These events can occur when other security devices or applications inspect simulation messages. For example (but not limited to):
103103

104104
- Applications or plugins within Outlook that inspect or intercept the message.
105105
- Email security applications.

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Watch this short video to learn more about Attack simulation training.
8585
> [!NOTE]
8686
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.
8787
88-
- Attack simulation training is available in Microsoft 365 GCC, GCC High and DoD environments, but certain advanced features aren't available in GCC High and DoD (for example, payload automation, recommended payloads, the predicted compromised rate). If your organization has Microsoft 365 G5, Office 365 G5 or Microsoft Defender for Office 365 (Plan 2) for Government, you can use Attack simulation training as described in this article.
88+
- Attack simulation training is available in Microsoft 365 GCC, GCC High and DoD environments, but certain advanced features aren't available in GCC High and DoD (for example, payload automation, recommended payloads, the predicted compromised rate). If your organization has Microsoft 365 G5, Office 365 G5 or Microsoft Defender for Office 365 (Plan 2) for Government, you can use Attack simulation training as described in this article.
8989

9090
> [!NOTE]
9191
> Attack simulation training offers a subset of capabilities to E3 customers as a trial. The trial offering contains the ability to use a Credential Harvest payload and the ability to select 'ISA Phishing' or 'Mass Market Phishing' training experiences. No other capabilities are part of the E3 trial offering.

defender-office-365/attack-simulation-training-simulation-automations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -574,12 +574,12 @@ When you're finished, select **Next**.
574574
What you see on the **Schedule details** page depends on whether you selected **Randomized** or **Fixed** for the simulation schedule on the previous page.
575575

576576
- **Randomized** simulation schedule: The following settings are available:
577-
- **Automation start** section: Use **Select the date you want the automation to start from** to select the start date for the simulations. You can select any future date of up to a year.
577+
- **Automation start** section: Use **Select the date you want the automation to start from** to select the start date for the simulations. You can select any future date of up to a year.
578578

579579
- **Automation scoping** section: Configure the following settings:
580580
- **Select the days of the week that simulations are allowed to start on**: Select one or more days of the week.
581581
- **Enter the maximum number of simulations that can be started between the start and end dates**: Enter a value from 1 to 10. This number will also determine the number of payloads to be used. If you choose more payloads than simulations, e.g., 12 payloads for 10 simulations, any 10 of the 12 payloads will be used. If you choose fewer payloads than simulations, e.g., 5 payloads for 8 simulations, some payloads will repeat to cover all the simulations, unless you have chosen **Use unique payloads across simulations within an automation** in the **Launch details**.
582-
- **Randomize the time of day that simulation emails can be sent for delivery**: Select **Randomize send times** to randomize the send times. This will stagger email delivery over a 12 hour window.
582+
- **Randomize the time of day that simulation emails can be sent for delivery**: Select **Randomize send times** to randomize the send times. This will stagger email delivery over a 12 hour window.
583583

584584
- **Automation end** section: Use **Select the date you want the automations to end** to select the end date for the simulations. You can select any future date of upto a year.
585585

@@ -605,7 +605,7 @@ When you're finished on the **Schedule details** page, select **Next**.
605605

606606
On the **Launch details** page, configure the following additional settings for the automation:
607607

608-
- **Use unique payloads across simulations within an automation** section: By default, **Unique payloads** isn't selected. Make sure you have chosen enough payloads for the number of simulations you want to run. If you have fewer payloads than simulations you want to run, only a fraction of users will be targeted (calculated as ratio of number of payloads by the number of simulations).
608+
- **Use unique payloads across simulations within an automation** section: By default, **Unique payloads** isn't selected. Make sure you have chosen enough payloads for the number of simulations you want to run. If you have fewer payloads than simulations you want to run, only a fraction of users will be targeted (calculated as ratio of number of payloads by the number of simulations).
609609

610610
- **Target all selected users in every simulation run** section: By default, the target users are divided across different simulations. If you select this option, all chosen target users will be included in every simulation run. Make sure you have chosen as many payloads as the number of simulations you want to run; otherwise, the payloads will start repeating.
611611

@@ -664,7 +664,7 @@ For simulation automations with the **Status** value **Active** or **Inactive**,
664664
665665
## View reports of automated simulations
666666

667-
You can view the simulation reports for automated campaigns in the **Simulations** tab. Click on the name of the simulation, having a prefix of **AutomatedSimulation_** and automation name available under the column **Created by**. To view the report click anywhere in the simulation row other than the check box next to the name.
667+
You can view the simulation reports for automated campaigns in the **Simulations** tab. Click on the name of the simulation, having a prefix of **AutomatedSimulation_** and automation name available under the column **Created by**. To view the report click anywhere in the simulation row other than the check box next to the name.
668668

669669
## Frequently asked questions (FAQ) for simulations automations
670670

defender-office-365/attack-simulation-training-training-campaigns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ On the **Target users** page, select who receives the Training campaign. Use the
108108
- :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add users**: In the **Add users** flyout that opens, you find and select users and groups to include in the Training campaign. The following group types are supported:
109109
- Microsoft 365 Groups (static and dynamic)
110110
- Distribution groups (static only)
111-
- Mail-enabled security groups (static only)
111+
- Mail-enabled security groups (static only)
112112

113113
The following search tools are available:
114114

defender-office-365/breadcrumb/toc.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,3 @@
88
- name: 'Microsoft Defender for Office 365'
99
tocHref: /defender-xdr/
1010
topicHref: /defender-xdr/pilot-deploy-defender-endpoint
11-

defender-office-365/connection-filter-policies-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ For example, the source email server 192.168.1.25 sends email from the domains c
193193

194194
### Scenarios where messages from sources in the IP Allow List are still filtered
195195

196-
> [!NOTE]
196+
> [!NOTE]
197197
> These scenarios apply to all environments: standalone, hybrid, multi-geo, and cross-forest. Filtering behavior is based on security checks (for example, malware detection, phishing protection, or mail flow rules, not on the deployment model.
198198
199199
Messages from an email server in your IP Allow List are still subject to spam filtering in the following scenarios:

0 commit comments

Comments
 (0)