Skip to content

Commit 7b22203

Browse files
Merge pull request #4223 from MicrosoftDocs/main
[AutoPublish] main to live - 06/13 10:30 PDT | 06/13 23:00 IST
2 parents e194185 + 1ae3649 commit 7b22203

File tree

2 files changed

+26
-12
lines changed

2 files changed

+26
-12
lines changed

defender-office-365/submissions-result-definitions.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins and end-users can learn about the results of submitting entities to Microsoft for analysis.
1818
ms.service: defender-office-365
19-
ms.date: 07/26/2024
19+
ms.date: 06/13/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -37,12 +37,28 @@ When admins or users submit items to Microsoft for analysis, we do the following
3737
[Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
3838

3939
> [!NOTE]
40-
> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit items to Microsoft for analysis, but the items are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
40+
>
41+
> - In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit items to Microsoft for analysis, but the items are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
42+
> - AI-powered Submissions Response capability introduces generative AI explanations for email submissions to Microsoft. These explanations aim to provide enterprise admins with clear, detailed, human-readable explanations for why messages were classified. Currently, this feature is scoped to email submissions only, and AI-generated explanations aren't used for the following types of submissions:
43+
> - Files
44+
> - URLs
45+
> - Microsoft Teams messages
46+
> - User submissions
47+
>
48+
> AI-generated explanations are available for the following verdicts:
49+
>
50+
> - Spam
51+
> - Bulk
52+
> - Threats found
53+
> - No threats found
54+
> - Unknown
55+
>
56+
> If the AI-generated explanation is unavailable, the system falls back to the existing explanation as described in the following table.
4157
4258
The following table describes the results of submissions to Microsoft:
4359

4460
- **Status** indicates whether the previously described checks have been completed.
45-
- **Result** indicates the details that were generated during the analysis using the previously described checks
61+
- **Result** indicates the details that were generated during the analysis using the previously described checks.
4662

4763
|Status|Result|Description|
4864
|---|---|---|

defender-office-365/user-tags-about.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 06/09/2025
8+
ms.date: 06/13/2025
99
audience: ITPro
1010
ms.topic: how-to
1111
ms.localizationpriority: medium
@@ -31,14 +31,12 @@ _User tags_ are identifiers for specific groups of users in [Microsoft Defender
3131
- **System tags**: Currently, [Priority account](/microsoft-365/admin/setup/priority-accounts) is the only type of system tag.
3232
- **Custom tags**: You create these types of tags.
3333

34-
If your organization has Defender for Office 365 (included in your subscription or as an add-on), you can create custom user tags in addition to using the Priority account tag.
34+
If your organization has Defender for Office 365 (included in your subscription or as an add-on), you can create custom user tags in addition to using the Priority account tag:
3535

36-
> [!NOTE]
37-
> Currently, you can only apply user tags to mailbox users.
38-
>
39-
> Your organization can tag a maximum of 250 users using the Priority account system tag.
40-
>
41-
> Each custom tag has a maximum of 999 users per tag and your organization can create up to 500 custom tags.
36+
- You can assign the Priority account tag to a maximum of 250 users.
37+
- You can create a maximum of 500 custom user tags.
38+
- You can assign a custom tag to a maximum of 10000 individual users.
39+
- If you assign a custom user tag to a group, the tag is applied to the first 999 group members (users).
4240

4341
This article explains how to configure user tags in the Microsoft Defender portal. You can also apply or remove the Priority account tag using the _VIP_ parameter on the [Set-User](/powershell/module/exchange/set-user) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). No PowerShell cmdlets are available to manage custom user tags.
4442

@@ -83,7 +81,7 @@ To see how user tags are part of the strategy to help protect high-impact user a
8381

8482
- Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add members**. In the **Add members** flyout that opens, do any of the following steps to add individual users or groups in the **Search users and groups to add** box:
8583
- Click in the box and scroll through the list to select a user or group.
86-
- Click in the box, start typing a name to filter the list, and then select the value below the box. select a user or group.
84+
- Or, start typing a name to filter the list, and then select the value below the box.
8785

8886
To add more members, click in an empty area in the box and repeat the previous step.
8987

0 commit comments

Comments
 (0)