Skip to content

Commit 586836d

Browse files
Merge pull request #4907 from MicrosoftDocs/main
[AutoPublish] main to live - 09/02 10:29 PDT | 09/02 22:59 IST
2 parents b913cb9 + de61659 commit 586836d

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

defender-office-365/remediate-malicious-email-delivered-office-365.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Open any remediation item to view details about it, including its remediation na
106106

107107
**Delete sender's copy**: Also try to soft delete the message from the sender's Sent Items folder if the sender is the organization.
108108

109-
- **Hard delete**: Purge the deleted message. Admins can recover hard deleted items using single-item recovery. For more information about hard deleted and soft deleted items, see [Soft-deleted and hard-deleted items](/compliance/assurance/assurance-exchange-online-data-deletion#soft-deleted-and-hard-deleted-items). If you use [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac), you also need the **Email & collaboration metadata (read)** permission to hard delete messages.
109+
- **Hard delete**: Purge the deleted message. Admins can recover hard deleted items using single-item recovery. For more information about hard deleted and soft deleted items, see [Soft-deleted and hard-deleted items](/compliance/assurance/assurance-exchange-online-data-deletion#soft-deleted-and-hard-deleted-items). If you use [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac), you also need the **Email & collaboration content (read)** permission to hard delete messages.
110110

111111
> [!NOTE]
112112
> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD) admins can take the actions **Soft delete**, **Move to junk folder**, **Move to deleted items**, **Hard delete**, and **Move to inbox**. The actions **Delete sender's copy** and **Move to inbox** from quarantine folder aren't available. Also, the action logs are available only at <https://security.microsoft.com/threatincidents>, not in the **Action Center** at <https://security.microsoft.com/action-center>.

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Threat Explorer and Real-time detections contain the following elements:
103103
|**Malware**|||Default view for Real-time detections. Information about email messages that contain malware.|
104104
|**Phish**|||Information about email messages that contain phishing threats.|
105105
|**Campaigns**|||Information about malicious email that Defender for Office 365 Plan 2 identified as part of a [coordinated phishing or malware campaign](campaigns.md).|
106-
|**Content malware**|||Information about files detected by the following features: <ul><li>[Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)</li><li>[Safe Attachments for Sharepoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li></ul>|
106+
|**Content malware**|||Information about files processed by the following features: <ul><li>[Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)</li><li>[Safe Attachments for Sharepoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li></ul>|
107107
|**URL clicks**|||Information about user clicks on URLs in email messages, Teams messages, SharePoint files, and OneDrive files.|
108108

109109
These views are described in detail in this article, including the differences between Threat Explorer and Real-time detections.

0 commit comments

Comments
 (0)