Skip to content

Commit 831a306

Browse files
committed
Update safe-attachments-for-spo-odfb-teams-configure.md
Manager to orspodek and *-ActivityAlert (gone) to *-ProtectionAlert
1 parent 5fcdfd8 commit 831a306

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

defender-office-365/safe-attachments-for-spo-odfb-teams-configure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ description: Admins can learn how to turn on Safe Attachments for SharePoint, On
2020
ms.custom:
2121
- seo-marvel-apr2020
2222
ms.service: defender-office-365
23-
ms.date: 4/26/2024
23+
ms.date: 08/05/2025
2424
appliesto:
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2626
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -142,12 +142,12 @@ You can create an alert policy that notifies admins when Safe Attachments for Sh
142142
If you'd rather use PowerShell to create the same alert policy as described in the previous section, [connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) and run the following command:
143143

144144
```powershell
145-
New-ActivityAlert -Name "Malicious Files in Libraries" -Description "Notifies admins when malicious files are detected in SharePoint, OneDrive, or Microsoft Teams" -Category ThreatManagement -Operation FileMalwareDetected -NotifyUser "[email protected]","[email protected]"
145+
New-ProtectionAlert -Name "Malicious Files in Libraries" -Description "Notifies admins when malicious files are detected in SharePoint, OneDrive, or Microsoft Teams" -AggregationType None -Category ThreatManagement -ThreatType Activity -Operation FileMalwareDetected -NotifyUser "[email protected]","[email protected]"
146146
```
147147

148-
**Note**: The default _Severity_ value is Low. To specify Medium or High, include the _Severity_ parameter and value in the command.
148+
The default _Severity_ value is Low. To specify Medium or High, include the _Severity_ parameter and value in the command.
149149

150-
For detailed syntax and parameter information, see [New-ActivityAlert](/powershell/module/exchangepowershell/new-activityalert).
150+
For detailed syntax and parameter information, see [New-ProtectionAlert](/powershell/module/exchangepowershell/new-protectionalert).
151151

152152
### How do you know these procedures worked?
153153

@@ -176,9 +176,9 @@ For detailed syntax and parameter information, see [New-ActivityAlert](/powershe
176176
- In Security & Compliance PowerShell, replace \<AlertPolicyName\> with the name of the alert policy, run the following command, and verify the property values:
177177

178178
```powershell
179-
Get-ActivityAlert -Identity "<AlertPolicyName>"
179+
Get-ProtectionAlert -Identity "<AlertPolicyName>"
180180
```
181181
182-
For detailed syntax and parameter information, see [Get-ActivityAlert](/powershell/module/exchangepowershell/get-activityalert).
182+
For detailed syntax and parameter information, see [Get-ProtectionAlert](/powershell/module/exchangepowershell/get-protectionalert).
183183
184184
- Use the [Threat protection status report](reports-email-security.md#threat-protection-status-report) to view information about detected files in SharePoint, OneDrive, and Microsoft Teams. Specifically, you can use the **View data by: Content \> Malware** view.

0 commit comments

Comments
 (0)