Skip to content

Commit 5f2bb80

Browse files
committed
EOP updates
1 parent b08afb7 commit 5f2bb80

File tree

6 files changed

+11
-8
lines changed

6 files changed

+11
-8
lines changed

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@
171171
href: anti-spam-protection-faq.yml
172172
- name: Zero-hour auto purge (ZAP)
173173
href: zero-hour-auto-purge.md
174-
- name: Configure Microsoft 365 to deliver spam to Junk Email folders in on-premises Exchange
174+
- name: Deliver cloud-detected spam to the Junk Email folder in on-premises mailboxes
175175
href: /exchange/standalone-eop/configure-eop-spam-protection-hybrid
176176
- name: Anti-phishing for all cloud mailboxes and Defender for Office 365
177177
items:

defender-office-365/advanced-delivery-policy-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ Back on the **Phishing simulation** tab, the non-Microsoft phishing simulation e
233233

234234
In addition to the two scenarios that the advanced delivery policy can help you with, there are other scenarios where you might need to bypass filtering for messages:
235235

236-
- **Non-Microsoft filters**: If your domain's MX record _doesn't_ point to Office 365 (messages are routed somewhere else first), [secure by default](secure-by-default.md) _isn't available_. If you'd like to add protection, you need to enable Enhanced Filtering for Connectors (also known as _skip listing_). For more information, see [Manage mail flow using a non-Microsoft cloud service with Exchange Online](/exchange/mail-flow-best-practices/manage-mail-flow-using-non-Microsoft-cloud). If you don't want Enhanced Filtering for Connectors, use mail flow rules (also known as transport rules) to bypass Microsoft filtering for messages that the non-Microsoft filtering service already evaluated. For more information, see [Use mail flow rules to set the SCL in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
236+
- **Non-Microsoft filters**: If your domain's MX record _doesn't_ point to Office 365 (messages are routed somewhere else first), [secure by default](secure-by-default.md) _isn't available_. If you'd like to add protection, you need to enable Enhanced Filtering for Connectors (also known as _skip listing_). For more information, see [Manage mail flow using a non-Microsoft cloud service with Exchange Online](/exchange/mail-flow-best-practices/manage-mail-flow-using-third-party-cloud). If you don't want Enhanced Filtering for Connectors, use mail flow rules (also known as transport rules) to bypass Microsoft filtering for messages that the non-Microsoft filtering service already evaluated. For more information, see [Use mail flow rules to set the SCL in messages](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-set-scl).
237237
- **False positives under review**: You might want to _temporarily_ allow good messages incorrectly identified as bad (false positives) that you reported via [admin submissions](submissions-admin.md) to Microsoft, and those messages are sill being analyzed. As with all overrides, we _**highly recommended**_ that these allowances are temporary.
238238

239239
## PowerShell procedures for SecOps mailboxes in the advanced delivery policy

defender-office-365/anti-spam-protection-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ sections:
5252
For more information, see [Configure anti-spam policies](anti-spam-policies-configure.md) and [Recommended anti-spam policy settings](recommended-settings-for-eop-and-office365.md#anti-spam-policy-settings).
5353
5454
> [!IMPORTANT]
55-
> In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Configure Microsoft 365 to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
55+
> In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Deliver cloud-detected spam to the Junk Email folder in on-premises mailboxes](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
5656
>
5757
> After you manually create the rule in Microsoft 365 to match the rule in on-premises Exchange, the rule replicates in hybrid environments.
5858

defender-office-365/configure-junk-email-settings-on-exo-mailboxes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Admins can use Exchange Online PowerShell to configure entries in the safelist c
5050

5151
- You need to be assigned permissions in Exchange Online before you can do the procedures in this article. Specifically, you need the **Mail Recipients** role (which is assigned to the **Organization Management**, **Recipient Management**, and **Custom Mail Recipients** role groups by default) or the **User Options** role (which is assigned to the **Organization Management** and **Help Desk** role groups by default). To add users to role groups in Exchange Online, see [Modify role groups in Exchange Online](/Exchange/permissions-exo/role-groups#modify-role-groups). Users with default permissions can do these same procedures on their own mailboxes, as long as they have [access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell).
5252

53-
- In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Configure Microsoft 365 to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
53+
- In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Deliver cloud-detected spam to the Junk Email folder in on-premises mailboxes](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
5454

5555
After you manually create the rule in Microsoft 365 to match the rule in on-premises Exchange, the rule replicates in hybrid environments.
5656

defender-office-365/eop-about.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 06/30/2025
8+
ms.date: 07/21/2025
99
audience: ITPro
1010
ms.topic: overview
1111
ms.collection:
@@ -28,9 +28,9 @@ appliesto:
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

31-
The default email protections for cloud mailboxes protect your Microsoft 365 organization from spam, malware, phishing and other email threats. These protections are included in all organizations with cloud mailboxes.
31+
The default email protections in Microsoft 365 protect your organization from spam, malware, phishing and other email threats. These protections are included in all organizations with cloud mailboxes.
3232

33-
The default email protections for cloud mailboxes are on by default via the default threat policies for:
33+
These protections are on by default via the default threat policies for:
3434

3535
- [Anti-malware protection](anti-malware-protection-about.md)
3636
- [Anti-spam protection](anti-spam-protection-about.md)
@@ -42,6 +42,9 @@ You can customize the security settings in the default threat policies, create c
4242

4343
The rest of this article explains how the default email protections for cloud mailboxes work and the features they contain.
4444

45+
> [!TIP]
46+
> The default email protections for cloud mailboxes are also available as a separate subscription to protect on-premises email environments (not just Microsoft Exchange). For more information, see [Exchange Online Protection for on-premises organizations](/exchange/standalone-eop/standalone-eop).
47+
4548
## How the default email protections for cloud mailboxes work
4649

4750
The following diagram shows how the default email protections for cloud mailboxes work.

defender-office-365/mail-flow-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Microsoft 365 offers flexibility in how your messages are routed. The following
4444

4545
- [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) describes how to configure connectors if your internet mail is routed to a service or device before delivery to Microsoft 365.
4646

47-
- In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Configure Microsoft 365 to deliver spam to the Junk Email folder in hybrid environments](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
47+
- In hybrid environments where Microsoft 365 protects on-premises Exchange mailboxes, you need to configure two mail flow rules (also known as transport rules) in your on-premises Exchange organization to recognize the Microsoft 365 spam headers added to messages. For details, see [Deliver cloud-detected spam to the Junk Email folder in on-premises mailboxes](/exchange/standalone-eop/configure-eop-spam-protection-hybrid).
4848

4949
After you manually create the rule in Microsoft 365 to match the rule in on-premises Exchange, the rule replicates in hybrid environments.
5050

0 commit comments

Comments
 (0)