Skip to content

Commit 523d254

Browse files
committed
EOP
1 parent a93d893 commit 523d254

File tree

137 files changed

+977
-1072
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+977
-1072
lines changed

.openpublishing.redirection.defender-office-365.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,11 @@
5959
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
6060
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
6161
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "defender-office-365/tenant-wide-setup-for-increased-security.md",
65+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-overview",
66+
"redirect_document_id": false
6267
}
6368
]
6469
}

defender-office-365/TOC.yml

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
items:
77
- name: Microsoft Defender for Office 365 overview
88
href: mdo-about.md
9-
- name: Exchange Online Protection overview
9+
- name: Overview of default email protections for cloud mailboxes
1010
href: eop-about.md
1111
- name: What's new in Defender for Office 365
1212
href: defender-for-office-365-whats-new.md
@@ -23,7 +23,7 @@
2323
href: secure-by-default.md
2424
- name: Zero Trust for Defender for Office 365
2525
href: zero-trust-with-microsoft-365-defender-office-365.md
26-
- name: Mail flow in EOP
26+
- name: Mail flow in cloud organizations
2727
href: mail-flow-about.md
2828
- name: Defender for Office 365 in Microsoft Teams
2929
href: mdo-support-teams-about.md
@@ -57,11 +57,11 @@
5757
href: email-authentication-dmarc-configure.md
5858
- name: Configure trusted ARC sealers
5959
href: email-authentication-arc-configure.md
60-
- name: Step 2 - Configure protection policies
60+
- name: Step 2 - Configure threat policies
6161
items:
6262
- name: Preset security policies
6363
href: preset-security-policies.md
64-
- name: Recommended settings for configuring EOP and Defender for Office 365 Security
64+
- name: Recommended email and collaboration threat policy settings for cloud organizations
6565
href: recommended-settings-for-eop-and-office365.md
6666
- name: Step 3 - Assign permissions
6767
items:
@@ -127,15 +127,15 @@
127127
href: priority-accounts-security-recommendations.md
128128
- name: Usage card in Defender for Office 365
129129
href: mdo-usage-card-about.md
130-
- name: Protection policies
130+
- name: Threat policies
131131
items:
132132
- name: Preset security policies
133133
href: preset-security-policies.md
134-
- name: Recommended settings for configuring EOP and Defender for Office 365 Security
134+
- name: Recommended email and collaboration threat policy settings for cloud organizations
135135
href: recommended-settings-for-eop-and-office365.md
136-
- name: Configuration analyzer for protection policies
136+
- name: Configuration analyzer for threat policies
137137
href: configuration-analyzer-for-security-policies.md
138-
- name: Anti-malware in EOP
138+
- name: Anti-malware in cloud organizations
139139
items:
140140
- name: Anti-malware protection
141141
href: anti-malware-protection-about.md
@@ -147,7 +147,7 @@
147147
href: zero-hour-auto-purge.md
148148
- name: Virus detection in SharePoint
149149
href: anti-malware-protection-for-spo-odfb-teams-about.md
150-
- name: Anti-spam in EOP
150+
- name: Anti-spam in cloud organizations
151151
items:
152152
- name: Anti-spam protection
153153
href: anti-spam-protection-about.md
@@ -162,32 +162,32 @@
162162
- name: Bulk complaint level (BCL)
163163
href: anti-spam-bulk-complaint-level-bcl-about.md
164164
- name: Bulk senders insight
165-
href: anti-spam-bulk-senders-insight.md
166-
- name: Backscatter in EOP
165+
href: anti-spam-bulk-senders
166+
- name: Backscatter messages cloud organizations
167167
href: anti-spam-backscatter-about.md
168168
- name: Configure junk email settings on Exchange Online mailboxes
169169
href: configure-junk-email-settings-on-exo-mailboxes.md
170170
- name: Anti-spam protection FAQ
171171
href: anti-spam-protection-faq.yml
172172
- name: Zero-hour auto purge (ZAP)
173173
href: zero-hour-auto-purge.md
174-
- name: Configure EOP to deliver spam to Junk Email folders in on-premises Exchange
174+
- name: Configure Microsoft 365 to deliver spam to Junk Email folders in on-premises Exchange
175175
href: /exchange/standalone-eop/configure-eop-spam-protection-hybrid
176-
- name: Anti-phishing in EOP and Defender for Office 365
176+
- name: Anti-phishing for all cloud mailboxes and Defender for Office 365
177177
items:
178178
- name: Anti-phishing protection
179179
href: anti-phishing-protection-about.md
180180
- name: Anti-phishing policies
181181
href: anti-phishing-policies-about.md
182-
- name: Configure anti-phishing policies in EOP
182+
- name: Configure anti-phishing policies for all cloud mailboxes
183183
href: anti-phishing-policies-eop-configure.md
184184
- name: Configure anti-phishing policies in Defender for Office 365
185185
href: anti-phishing-policies-mdo-configure.md
186186
- name: Anti-spoofing protection
187187
href: anti-phishing-protection-spoofing-about.md
188188
- name: Anti-spoofing protection FAQ
189189
href: anti-phishing-protection-spoofing-faq.yml
190-
- name: How EOP validates the From address
190+
- name: How Microsoft 365 validates the From address
191191
href: anti-phishing-from-email-address-validation.md
192192
- name: Tune anti-phishing protection
193193
href: anti-phishing-protection-tuning.md
@@ -211,7 +211,7 @@
211211
href: safe-links-about.md
212212
- name: Set up Safe Links policies in Defender for Office 365
213213
href: safe-links-policies-configure.md
214-
- name: Outbound spam protection in EOP
214+
- name: Outbound spam protection in cloud organizations
215215
items:
216216
- name: Outbound spam protection
217217
href: outbound-spam-protection-about.md
@@ -223,7 +223,7 @@
223223
href: outbound-spam-high-risk-delivery-pool-about.md
224224
- name: Restore restricted users
225225
href: outbound-spam-restore-restricted-users.md
226-
- name: Connection filtering in EOP
226+
- name: Connection filtering in cloud organizations
227227
items:
228228
- name: Configure the connection filtering policy
229229
href: connection-filter-policies-configure.md
@@ -473,7 +473,7 @@
473473
href: air-auto-remediation.md
474474
- name: Detect and address compromised user accounts in AIR
475475
href: address-compromised-users-quickly.md
476-
- name: Integrate AIR with a custom solution or third-party solution
476+
- name: Integrate AIR with a custom solution or non-Microsoft solution
477477
href: air-custom-reporting.md
478478
- name: Email analysis in investigations
479479
href: email-analysis-investigations.md
@@ -558,7 +558,7 @@
558558
href: step-by-step-guides/how-to-run-attack-simulations-for-your-team.md
559559
- name: How to setup automated attacks and training within Attack simulation training
560560
href: step-by-step-guides/how-to-setup-attack-simulation-training-for-automated-attacks-and-training.md
561-
- name: Optimize and correct security policies with configuration analyzer
561+
- name: Optimize and correct threat policies with configuration analyzer
562562
href: step-by-step-guides/optimize-and-correct-security-policies-with-configuration-analyzer.md
563563
- name: Protect your c-suite with priority account protection
564564
href: step-by-step-guides/protect-your-c-suite-with-priority-account-protection.md

defender-office-365/address-compromised-users-quickly.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.date: 06/09/2023
1717
description: Learn how to speed up the process of detecting and addressing compromised user accounts with automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.
1818
ms.service: defender-office-365
1919
appliesto:
20-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
20+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2323
---

defender-office-365/advanced-delivery-policy-configure.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ description: Admins can learn how to use the advanced delivery policy in Microso
1818
ms.service: defender-office-365
1919
ms.date: 07/02/2025
2020
appliesto:
21-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
21+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2424
---
@@ -115,6 +115,8 @@ Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configur
115115

116116
Back on the **SecOps mailbox** tab, the SecOps mailbox entries that you configured are displayed. If you removed all entries, the list is empty.
117117

118+
<a name='powershell-procedures-for-third-party-phishing-simulations-in-the-advanced-delivery-policy'></a>
119+
118120
## Use the Microsoft Defender portal to configure non-Microsoft phishing simulations in the advanced delivery policy
119121

120122
To configure a non-Microsoft phishing simulation, you need to provide the following information:
@@ -209,6 +211,8 @@ Back on the **Phishing simulation** tab, the non-Microsoft phishing simulation e
209211
- The **Date** column shows when the entry was created.
210212
- To change the list of entries from normal to compact spacing, select :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal**, and then select :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
211213

214+
<a name='use-the-microsoft-defender-portal-to-modify-or-remove-third-party-phishing-simulations-in-the-advanced-delivery-policy'></a>
215+
212216
## Use the Microsoft Defender portal to modify or remove non-Microsoft phishing simulations in the advanced delivery policy
213217

214218
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Advanced delivery** in the **Rules** section. Or, to go directly to the **Advanced delivery** page, use <https://security.microsoft.com/advanceddelivery>.
@@ -367,6 +371,8 @@ In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-
367371

368372
For detailed syntax and parameter information, see [Remove-ExoSecOpsOverrideRule](/powershell/module/exchange/remove-exosecopsoverriderule).
369373

374+
<a name='powershell-procedures-for-third-party-phishing-simulations-in-the-advanced-delivery-policy'></a>
375+
370376
## PowerShell procedures for non-Microsoft phishing simulations in the advanced delivery policy
371377

372378
In PowerShell, the basic elements of non-Microsoft phishing simulations in the advanced delivery policy are:
@@ -385,6 +391,8 @@ This behavior has the following results:
385391
- When you remove a policy from PowerShell, the corresponding rule is also removed.
386392
- When you remove a rule from PowerShell, the corresponding policy isn't removed. You need to remove the corresponding policy manually.
387393

394+
<a name='use-powershell-to-configure-third-party-phishing-simulations'></a>
395+
388396
### Use PowerShell to configure non-Microsoft phishing simulations
389397

390398
Configuring a non-Microsoft phishing simulation in PowerShell is a multi-step process:

defender-office-365/air-custom-reporting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ search.appverid:
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
description: Learn how to integrate automated investigation and response with a custom or third-party reporting solution.
17+
description: Learn how to integrate automated investigation and response with a custom or non-Microsoft reporting solution.
1818
ms.date: 07/10/2024
1919
ms.custom:
2020
- air
@@ -24,13 +24,13 @@ appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2525
---
2626

27-
# Custom or third-party reporting solutions for Microsoft Defender for Office 365 Plan 2
27+
# Custom or non-Microsoft reporting solutions for Microsoft Defender for Office 365 Plan 2
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

3131
Automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2 returns detailed information about the results. For more information, see [Details and results of automated investigation and response (AIR) in Microsoft Defender for Office 365 Plan 2](air-view-investigation-results.md).
3232

33-
However, some Microsoft 365 organizations use custom or third-party reporting solutions. Those organizations can use the **Office 365 Management Activity APIs** to integrate information from AIR into other reporting solutions.
33+
However, some Microsoft 365 organizations use custom or non-Microsoft reporting solutions. Those organizations can use the **Office 365 Management Activity APIs** to integrate information from AIR into other reporting solutions.
3434

3535
|Resource|Description|
3636
|:---|:---|

defender-office-365/air-user-automatic-feedback-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,6 @@ Whether the message was automatically or manually sent to Microsoft for review,
9494
To learn more about submissions and investigations in Defender for Microsoft 365, see the following articles:
9595

9696
- [Automated investigation and response in Microsoft Defender for Office 365](air-about.md)
97-
- [View the results of an automated investigation in Microsoft 365](air-view-investigation-results.md)
97+
- [View the results of an automated investigation in Microsoft Defender for 365](air-view-investigation-results.md)
9898
- [Admin review for reported messages](submissions-admin-review-user-reported-messages.md)
9999
- [Automated investigation and response (AIR) examples in Microsoft Defender for Office 365 Plan 2](air-examples.md)

defender-office-365/alert-policies-defender-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ appliesto:
2727

2828
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2929

30-
In Microsoft 365 organizations with mailboxes in Exchange Online, alert policies generate alerts in the alert dashboard when users take actions that match the conditions of the policy. There are many default alert policies that help you monitor activities. For example, assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and external sharing.
30+
In organizations with cloud mailboxes, alert policies generate alerts in the alert dashboard when users take actions that match the conditions of the policy. There are many default alert policies that help you monitor activities. For example, assigning admin privileges in Exchange Online, malware attacks, phishing campaigns, and unusual levels of file deletions and external sharing.
3131

3232
## What do you need to know before you begin?
3333

defender-office-365/anti-malware-policies-configure.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,28 +14,28 @@ ms.assetid: b0cfc21f-e3c6-41b6-8670-feb2b2e252e5
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
description: Admins can learn how to view, create, modify, and remove anti-malware policies for email in Microsoft 365.
17+
description: Admins can learn how to view, create, modify, and remove anti-malware policies for cloud mailboxes.
1818
ms.custom:
1919
ms.service: defender-office-365
2020
ms.date: 07/02/2025
2121
appliesto:
22-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
22+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2525
---
2626

27-
# Configure anti-malware policies for email in Microsoft 365
27+
# Configure anti-malware policies for cloud mailboxes
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

31-
In Microsoft 365 organizations cloud mailboxes, email messages are automatically protected against malware. Microsoft 365 uses anti-malware policies for malware protection settings related to email. For more information, see [Anti-malware protection in Microsoft 365](anti-malware-protection-about.md).
31+
In all organizations with cloud mailboxes, email messages are automatically protected against malware. Microsoft uses anti-malware policies for malware protection settings related to email. For more information, see [Anti-malware protection](anti-malware-protection-about.md).
3232

3333
The default anti-malware policy automatically applies to all recipients. For greater granularity, you can also create custom anti-malware policies that apply to specific users, groups, or domains in your organization.
3434

3535
> [!TIP]
3636
> The default anti-malware policy applies to inbound and outbound email. Custom anti-malware policies apply to inbound email only.
3737
>
38-
> Instead of creating and managing custom anti-malware policies, we typically recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure protection policies](mdo-deployment-guide.md#step-2-configure-protection-policies).
38+
> Instead of creating and managing custom anti-malware policies, we typically recommend turning on and adding all users to the Standard and/or Strict preset security policies. For more information, see [Configure threat policies](mdo-deployment-guide.md#step-2-configure-threat-policies).
3939
>
4040
> To understand how threat protection works in Microsoft Defender for Office 365, see [Step-by-step threat protection in Microsoft Defender for Office 365](protection-stack-microsoft-defender-for-office365.md).
4141

0 commit comments

Comments
 (0)