Skip to content

Commit 75da12e

Browse files
committed
Edits
1 parent a4e4857 commit 75da12e

6 files changed

+39
-25
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: chrisda
88
ms.author: chrisda
99
manager: bagol
1010
ms.localizationpriority: medium
11-
ms.date: 08/28/2025
11+
ms.date: 09/12/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,10 +39,16 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42-
## September 2025
42+
## September 2025
4343

44-
- Near real-time URL protection in Teams messages: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
45-
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) from chats, standard, shared and private channels, meeting conversations to Microsoftas non malicious (not security risk) the specified reporting mailbox, or both via [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
44+
- **Near real-time URL protection in Teams messages**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
45+
46+
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) as non-malicious (not a security risk) from the following locations:
47+
- Chats
48+
- Standard, shared, and private channels
49+
- Meeting conversations
50+
51+
[User reported settings](submissions-user-reported-messages-custom-mailbox.md) determine whether reported messages are sent to the specified reporting mailbox, to Microsoft, or both.
4652

4753
## Aug 2025
4854

defender-office-365/mdo-support-teams-about.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,7 @@ Microsoft Defender for Office 365 provides the following extra Teams protection
4646

4747
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
4848

49-
- **Report Teams messages**: Users can report Teams messages as malicious or not malicious. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
50-
49+
- **Report Teams messages**: Users can report Teams messages as malicious or not malicious. Depending on the reported message settings in the organization, reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
5150

5251
- **Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
5352

defender-office-365/mdo-support-teams-quick-configure.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -114,22 +114,26 @@ For complete instructions, see [User reported message settings in Microsoft Team
114114

115115
1. In the Teams admin center, go to the **Settings & policies** page at <https://admin.teams.microsoft.com/one-policy/settings>.
116116

117-
2. Select either the **Global (Org-wide) default** policy for all users or **Custom policies for users & groups** for a specific user.
117+
2. On the **Settings & policies** page, select either the **Global (Org-wide) default settings** tab for all users or **Custom policies for users & groups** for specific users.
118118

119-
3. Verify that the **Messaging** option is selected under that tab. If you selected **Custom policies for users & groups** earlier:
120-
- Select the link in the **Name** column.
121-
- Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
119+
3. On the tab, go to the **Messaging** section and select **Messaging**. If you selected the **Custom policies for users & groups** tab in the previous step, do one of the following steps to edit the specific policy:
120+
- Click on the policy name in the **Name** column.
121+
- Click anywhere in the row other than the **Name** column, and then select the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
122122

123123
4. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
124124

125125
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
126126

127-
5. Select the **Global (Org-wide) default** policy for all users and select the **Messaging** option
127+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
128128

129-
6. In the policy details page that opens, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
129+
5. In the Teams admin center, go to the **Messaging settings** page at <https://admin.teams.microsoft.com/messaging/settings>.
130+
131+
6. On the **Messaging settings** page, go to the **Messaging safety** section, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
130132

131133
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
132134

135+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report incorrect security detections' toggle on the Messaging settings page in the Microsoft Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
136+
133137
7. In the Microsoft Defender portal, go to the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.
134138

135139
8. On the **User reported settings** page, go to the **Microsoft Teams** section, and verify **Monitor reported messages in Microsoft Teams** is selected.
-56.4 KB
Loading
-70.7 KB
Loading

defender-office-365/submissions-teams.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: "Admins can configure whether users can report malicious message in Microsoft Teams."
1818
ms.service: defender-office-365
19-
ms.date: 08/21/2025
19+
ms.date: 09/11/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -28,7 +28,7 @@ appliesto:
2828

2929
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
3030

31-
Users can report messages in Teams from chats, standard, private and shared channels, and meeting conversations. Users can report messages as malicious or non malicious.
31+
Users can report messages in Teams from chats, standard, private and shared channels, and meeting conversations. Users can report messages as malicious or non-malicious.
3232

3333
> [!NOTE]
3434
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).
@@ -39,15 +39,20 @@ Users can report messages in Teams from chats, standard, private and shared chan
3939

4040
User reporting of messages in Teams is made of two separate settings:
4141

42-
- **In the Teams admin center**: On by default and controls whether users are able to report messages from Teams. When these two setting is turned off, users can't report messages within Teams, so the corresponding setting in the Microsoft Defender portal is irrelevant.
42+
- **In the Teams admin center**: On by default and controls whether users are able to report messages from Teams. When these two setting are turned off, users can't report messages within Teams, so the corresponding setting in the Microsoft Defender portal is irrelevant.
4343

4444
- **In the Microsoft Defender portal**: On by default for new tenants. Existing tenants need to enable it. If user reporting of messages is turned on in the Teams admin center, it also needs to be turned on the Defender portal for user reported messages to show up correctly on the **User reported** tab on the **Submissions** page.
4545

4646
> [!IMPORTANT]
4747
>
48-
> When a user reports a Teams message to Microsoft, everything associated with the message is copied to include in the continual algorithm reviews. This copy includes the all the data associated with the message, including: message content, headers, any attachments, related data about routing and all other data directly associated with the submission.
48+
> - When a user reports a Teams message to Microsoft, everything associated with the message is copied for inclusion in the continual algorithm reviews. This copy contains all data associated with the message, including:
49+
> - Message content.
50+
> - Headers.
51+
> - Any attachments.
52+
> - Related data about routing.
53+
> - All other data directly associated with the submission.
4954
>
50-
> Microsoft treats your feedback as your organization's permission to analyze all the information to fine tune the submission hygiene algorithms. Your message is held in secured and audited data centers in the USA. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and files, which is normally not permitted for Teams messages in Microsoft 365. However, your message is still treated as confidential between you and Microsoft, and your message or file isn't shared with any other party as part of the review process. Microsoft might also use AI to evaluate and create responses tailored to your submissions.
55+
> - Microsoft treats your feedback as your organization's permission to analyze all information to fine tune the submission hygiene algorithms. Your message is held in secured and audited data centers in the United States. The submission is deleted as soon as it's no longer required. Microsoft personnel might read your submitted messages and files, which is normally not permitted for Teams messages in Microsoft 365. However, your message is still treated as confidential between you and Microsoft, and your message or file isn't shared with any other party as part of the review process. Microsoft might also use AI to evaluate and create responses tailored to your submissions.
5156
5257
### Turn off or turn on user reporting in the Teams admin center
5358

@@ -58,25 +63,25 @@ To view or configure this setting, you need to be a member of the **Global Admin
5863
5964
1. In the Teams admin center, go to the **Settings & policies** page at <https://admin.teams.microsoft.com/one-policy/settings>.
6065

61-
2. Select either the **Global (Org-wide) default** policy for all users or **Custom policies for users & groups** for a specific user.
66+
2. On the **Settings & policies** page, select either the **Global (Org-wide) default settings** tab for all users or **Custom policies for users & groups** for specific users.
6267

63-
3. Verify that the **Messaging** option is selected under that tab. If you selected **Custom policies for users & groups** earlier:
64-
- Select the link in the **Name** column.
65-
- Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
68+
3. On the tab, go to the **Messaging** section and select **Messaging**. If you selected the **Custom policies for users & groups** tab in the previous step, do one of the following steps to edit the specific policy:
69+
- Click on the policy name in the **Name** column.
70+
- Click anywhere in the row other than the **Name** column, and then select the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
6671

6772
4. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
6873

6974
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
7075

71-
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
76+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
7277

73-
5. Select the **Global (Org-wide) default** policy for all users and select the **Messaging** option
78+
5. In the Teams admin center, go to the **Messaging settings** page at <https://admin.teams.microsoft.com/messaging/settings>.
7479

75-
6. In the policy details page that opens, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
80+
6. On the **Messaging settings** page, go to the **Messaging safety** section, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
7681

7782
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
7883

79-
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report a not security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
84+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report incorrect security detections' toggle on the Messaging settings page in the Microsoft Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
8085

8186
For more information about messaging policies in Teams, see [Manage messaging policies in Teams](/microsoftteams/messaging-policies-in-teams).
8287

0 commit comments

Comments
 (0)