You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: chrisda
8
8
ms.author: chrisda
9
9
manager: bagol
10
10
ms.localizationpriority: medium
11
-
ms.date: 08/28/2025
11
+
ms.date: 09/12/2025
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -39,10 +39,16 @@ For more information on what's new with other Microsoft Defender security produc
39
39
-[What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
40
40
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
41
41
42
-
## September 2025
42
+
## September 2025
43
43
44
-
- Near real-time URL protection in Teams messages: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
45
-
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) from chats, standard, shared and private channels, meeting conversations to Microsoftas non malicious (not security risk) the specified reporting mailbox, or both via [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
44
+
-**Near real-time URL protection in Teams messages**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
45
+
46
+
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) as non-malicious (not a security risk) from the following locations:
47
+
- Chats
48
+
- Standard, shared, and private channels
49
+
- Meeting conversations
50
+
51
+
[User reported settings](submissions-user-reported-messages-custom-mailbox.md) determine whether reported messages are sent to the specified reporting mailbox, to Microsoft, or both.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-about.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,8 +46,7 @@ Microsoft Defender for Office 365 provides the following extra Teams protection
46
46
47
47
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
48
48
49
-
-**Report Teams messages**: Users can report Teams messages as malicious or not malicious. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
50
-
49
+
-**Report Teams messages**: Users can report Teams messages as malicious or not malicious. Depending on the reported message settings in the organization, reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
51
50
52
51
-**Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-quick-configure.md
+10-6Lines changed: 10 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,22 +114,26 @@ For complete instructions, see [User reported message settings in Microsoft Team
114
114
115
115
1. In the Teams admin center, go to the **Settings & policies** page at <https://admin.teams.microsoft.com/one-policy/settings>.
116
116
117
-
2.Select either the **Global (Org-wide) default**policy for all users or **Custom policies for users & groups** for a specific user.
117
+
2.On the **Settings & policies** page, select either the **Global (Org-wide) default settings**tab for all users or **Custom policies for users & groups** for specific users.
118
118
119
-
3.Verify that the **Messaging**option is selected under that tab. If you selected **Custom policies for users & groups**earlier:
120
-
-Select the link in the **Name** column.
121
-
-Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
119
+
3.On the tab, go to the **Messaging**section and select **Messaging**. If you selected the **Custom policies for users & groups**tab in the previous step, do one of the following steps to edit the specific policy:
120
+
-Click on the policy name in the **Name** column.
121
+
-Click anywhere in the row other than the **Name** column, and then select the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
122
122
123
123
4. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
124
124
125
125
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
126
126
127
-
5. Select the **Global (Org-wide) default** policy for all users and select the **Messaging** option
127
+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
128
128
129
-
6. In the policy details page that opens, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
129
+
5. In the Teams admin center, go to the **Messaging settings** page at <https://admin.teams.microsoft.com/messaging/settings>.
130
+
131
+
6. On the **Messaging settings** page, go to the **Messaging safety** section, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
130
132
131
133
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
132
134
135
+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report incorrect security detections' toggle on the Messaging settings page in the Microsoft Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
136
+
133
137
7. In the Microsoft Defender portal, go to the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.
134
138
135
139
8. On the **User reported settings** page, go to the **Microsoft Teams** section, and verify **Monitor reported messages in Microsoft Teams** is selected.
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
30
30
31
-
Users can report messages in Teams from chats, standard, private and shared channels, and meeting conversations. Users can report messages as malicious or nonmalicious.
31
+
Users can report messages in Teams from chats, standard, private and shared channels, and meeting conversations. Users can report messages as malicious or non-malicious.
32
32
33
33
> [!NOTE]
34
34
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).
@@ -39,15 +39,20 @@ Users can report messages in Teams from chats, standard, private and shared chan
39
39
40
40
User reporting of messages in Teams is made of two separate settings:
41
41
42
-
-**In the Teams admin center**: On by default and controls whether users are able to report messages from Teams. When these two setting is turned off, users can't report messages within Teams, so the corresponding setting in the Microsoft Defender portal is irrelevant.
42
+
-**In the Teams admin center**: On by default and controls whether users are able to report messages from Teams. When these two setting are turned off, users can't report messages within Teams, so the corresponding setting in the Microsoft Defender portal is irrelevant.
43
43
44
44
-**In the Microsoft Defender portal**: On by default for new tenants. Existing tenants need to enable it. If user reporting of messages is turned on in the Teams admin center, it also needs to be turned on the Defender portal for user reported messages to show up correctly on the **User reported** tab on the **Submissions** page.
45
45
46
46
> [!IMPORTANT]
47
47
>
48
-
> When a user reports a Teams message to Microsoft, everything associated with the message is copied to include in the continual algorithm reviews. This copy includes the all the data associated with the message, including: message content, headers, any attachments, related data about routing and all other data directly associated with the submission.
48
+
> - When a user reports a Teams message to Microsoft, everything associated with the message is copied for inclusion in the continual algorithm reviews. This copy contains all data associated with the message, including:
49
+
> - Message content.
50
+
> - Headers.
51
+
> - Any attachments.
52
+
> - Related data about routing.
53
+
> - All other data directly associated with the submission.
49
54
>
50
-
> Microsoft treats your feedback as your organization's permission to analyze all the information to fine tune the submission hygiene algorithms. Your message is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and files, which is normally not permitted for Teams messages in Microsoft 365. However, your message is still treated as confidential between you and Microsoft, and your message or file isn't shared with any other party as part of the review process. Microsoft might also use AI to evaluate and create responses tailored to your submissions.
55
+
> -Microsoft treats your feedback as your organization's permission to analyze all information to fine tune the submission hygiene algorithms. Your message is held in secured and audited data centers in the United States. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and files, which is normally not permitted for Teams messages in Microsoft 365. However, your message is still treated as confidential between you and Microsoft, and your message or file isn't shared with any other party as part of the review process. Microsoft might also use AI to evaluate and create responses tailored to your submissions.
51
56
52
57
### Turn off or turn on user reporting in the Teams admin center
53
58
@@ -58,25 +63,25 @@ To view or configure this setting, you need to be a member of the **Global Admin
58
63
59
64
1. In the Teams admin center, go to the **Settings & policies** page at <https://admin.teams.microsoft.com/one-policy/settings>.
60
65
61
-
2.Select either the **Global (Org-wide) default**policy for all users or **Custom policies for users & groups** for a specific user.
66
+
2.On the **Settings & policies** page, select either the **Global (Org-wide) default settings**tab for all users or **Custom policies for users & groups** for specific users.
62
67
63
-
3.Verify that the **Messaging**option is selected under that tab. If you selected **Custom policies for users & groups**earlier:
64
-
-Select the link in the **Name** column.
65
-
-Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
68
+
3.On the tab, go to the **Messaging**section and select **Messaging**. If you selected the **Custom policies for users & groups**tab in the previous step, do one of the following steps to edit the specific policy:
69
+
-Click on the policy name in the **Name** column.
70
+
-Click anywhere in the row other than the **Name** column, and then select the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
66
71
67
72
4. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
68
73
69
74
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
70
75
71
-
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
76
+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
72
77
73
-
5.Select the **Global (Org-wide) default** policy for all users and select the **Messaging**option
78
+
5.In the Teams admin center, go to the **Messaging settings**page at <https://admin.teams.microsoft.com/messaging/settings>.
74
79
75
-
6.In the policy details page that opens, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
80
+
6.On the **Messaging settings** page, go to the **Messaging safety** section, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
76
81
77
82
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
78
83
79
-
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report a not security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
84
+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report incorrect security detections' toggle on the Messaging settings page in the Microsoft Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
80
85
81
86
For more information about messaging policies in Teams, see [Manage messaging policies in Teams](/microsoftteams/messaging-policies-in-teams).
0 commit comments