Skip to content

Commit 85a3809

Browse files
authored
Merge pull request #3237 from MicrosoftDocs/chrisda
Clarify exclusions for users lacking MDO licenses
2 parents 0429139 + 7e885f8 commit 85a3809

File tree

3 files changed

+80
-76
lines changed

3 files changed

+80
-76
lines changed

defender-office-365/preset-security-policies.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
description: Admins can learn how to apply Standard and Strict policy settings across the protection features of Exchange Online Protection (EOP) and Microsoft Defender for Office 365
1717
ms.service: defender-office-365
1818
search.appverid: met150
19-
ms.date: 01/29/2025
19+
ms.date: 03/21/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -106,14 +106,20 @@ The rest of this article how to configure preset security policies.
106106
> [!NOTE]
107107
> In organizations without Defender for Office 365, selecting **Next** takes you to the **Review** page (Step 9).
108108
109-
4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions).
109+
4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions) or don't apply to (recipient exceptions)
110110

111111
The settings and behavior are exactly like the **Apply Exchange Online Protection** page in the previous step.
112112

113113
You can also select **Previously selected recipients** to use the same recipients that you selected for EOP protection on the previous page.
114114

115115
When you're finished on the **Apply Defender for Office 365 protection** page, select **Next**.
116116

117+
> [!TIP]
118+
> If not all users in your organization have Defender for Office 365 licenses, you can use the following methods to apply Defender for Office 365 protections to eligible users only:
119+
>
120+
> - Use **Specified recipients** to identify the users or groups who **are eligible** for Defender for Office 365 protections.
121+
> - Use **Exclude these recipients** \> **Specified recipients** to identify the users or groups who **aren't eligible** for Defender for Office 365 protections.
122+
117123
5. On the **Impersonation protection** page, select **Next**.
118124

119125
6. On the **Add email addresses to flag when impersonated by attackers** page, add internal and external senders who are protected by [user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
@@ -182,9 +188,9 @@ To disable the **Standard protection** or **Strict protection** preset security
182188
## Use the Microsoft Defender portal to add exclusions to the Built-in protection preset security policy
183189

184190
> [!TIP]
185-
> The **Built-in protection** preset security policy is applied to all users in organizations with any amount of licenses for Defender for Microsoft 365. This application is in the spirit of securing the broadest set of users until admins specifically configure Defender for Office 365 protections. Because **Built-in protection** is enabled by default, customers don't need to worry about violating product licensing terms. However, we recommend purchasing enough Defender for Office 365 licenses to ensure **Built-in protection** continues for all users.
191+
> The **Built-in protection** preset security policy is applied to all users in organizations with any amount of licenses for Defender for Office 365. Application of this protection is in the spirit of securing the broadest set of users until admins specifically configure Defender for Office 365 protections. Because **Built-in protection** is enabled by default, customers don't need to worry about violating product licensing terms. However, we recommend purchasing enough Defender for Office 365 licenses to ensure **Built-in protection** continues for all users.
186192
>
187-
> The **Built-in protection** preset security policy doesn't affect recipients who are defined in the **Standard** or **Strict** preset security policies, or in custom Safe Links or Safe Attachments policies. Therefore, we typically don't recommend exceptions to the **Built-in protection** preset security policy.
193+
> The **Built-in protection** preset security policy doesn't affect recipients who are defined in the **Standard** or **Strict** preset security policies, or in custom Safe Links or Safe Attachments policies. Therefore, we typically don't recommend exceptions to the **Built-in protection** preset security policy, unless you want to exclude users who aren't eligible for Safe Links and Safe Attachments protections (users who lack Defender for Office 365 licenses).
188194
189195
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Preset Security Policies** in the **Templated policies** section. Or, to go directly to the **Preset security policies** page, use <https://security.microsoft.com/presetSecurityPolicies>.
190196

defender-office-365/safe-attachments-policies-configure.md

Lines changed: 41 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
1919
ms.custom: seo-marvel-apr2020
2020
ms.service: defender-office-365
21-
ms.date: 01/29/2025
21+
ms.date: 03/21/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -116,6 +116,9 @@ You configure Safe Attachments policies in the Microsoft Defender portal or in E
116116
- Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
117117
- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
118118

119+
> [!TIP]
120+
> If not all users in your organization have Defender for Office 365 licenses, you can use **User** or **Group** exceptions to exclude users who aren't eligible for Safe Attachments protections.
121+
119122
When you're finished on the **Users and domains** page, select **Next**.
120123

121124
5. On the **Settings** page, configure the following settings:
@@ -181,22 +184,22 @@ Select a policy by clicking anywhere in the row other than the check box next to
181184

182185
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration** \> **Policies & Rules** \> **Threat policies** \> **Safe Attachments** in the **Policies** section. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
183186

184-
2. On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
187+
On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
185188

186-
- Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
187-
- **Enable selected policies**.
188-
- **Disable selected policies**.
189-
- **Delete selected policies**.
189+
- Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
190+
- **Enable selected policies**.
191+
- **Disable selected policies**.
192+
- **Delete selected policies**.
190193

191-
:::image type="content" source="media/safe-attachments-policies-main-page.png" alt-text="The Safe Attachments page with a policy selected and the More actions control expanded." lightbox="media/safe-attachments-policies-main-page.png":::
194+
:::image type="content" source="media/safe-attachments-policies-main-page.png" alt-text="The Safe Attachments page with a policy selected and the More actions control expanded." lightbox="media/safe-attachments-policies-main-page.png":::
192195

193-
- Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
194-
- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
195-
- :::image type="icon" source="media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
196-
- :::image type="icon" source="media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
197-
- :::image type="icon" source="media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
196+
- Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
197+
- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
198+
- :::image type="icon" source="media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn on** or :::image type="icon" source="media/m365-cc-sc-turn-on-off-icon.png" border="false"::: **Turn off** (custom policies only)
199+
- :::image type="icon" source="media/m365-cc-sc-increase-icon.png" border="false"::: **Increase priority** or :::image type="icon" source="media/m365-cc-sc-decrease-icon.png" border="false"::: **Decrease priority** (custom policies only)
200+
- :::image type="icon" source="media/m365-cc-sc-delete-icon.png" border="false"::: **Delete policy** (custom policies only)
198201

199-
:::image type="content" source="media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom Safe Attachments policy." lightbox="media/anti-phishing-policies-details-flyout.png":::
202+
:::image type="content" source="media/anti-phishing-policies-details-flyout.png" alt-text="The details flyout of a custom Safe Attachments policy." lightbox="media/anti-phishing-policies-details-flyout.png":::
200203

201204
The actions are described in the following subsections.
202205

@@ -299,7 +302,7 @@ Creating a Safe Attachments policy in PowerShell is a two-step process:
299302

300303
To create a safe attachment policy, use this syntax:
301304

302-
```PowerShell
305+
```powershell
303306
New-SafeAttachmentPolicy -Name "<PolicyName>" -Enable $true [-AdminDisplayName "<Comments>"] [-Action <Allow | Block | DynamicDelivery>] [-Redirect <$true | $false>] [-RedirectAddress <SMTPEmailAddress>] [-QuarantineTag <QuarantinePolicyName>]
304307
```
305308

@@ -308,7 +311,7 @@ This example creates a safe attachment policy named Contoso All with the followi
308311
- Block messages that are found to contain malware by Safe Documents scanning (we aren't using the _Action_ parameter, and the default value is `Block`).
309312
- The default quarantine policy is used (AdminOnlyAccessPolicy), because we aren't using the _QuarantineTag_ parameter.
310313

311-
```PowerShell
314+
```powershell
312315
New-SafeAttachmentPolicy -Name "Contoso All" -Enable $true
313316
```
314317

@@ -321,7 +324,7 @@ For detailed syntax and parameter information, see [New-SafeAttachmentPolicy](/p
321324

322325
To create a safe attachment rule, use this syntax:
323326

324-
```PowerShell
327+
```powershell
325328
New-SafeAttachmentRule -Name "<RuleName>" -SafeAttachmentPolicy "<PolicyName>" <Recipient filters> [<Recipient filter exceptions>] [-Comments "<OptionalComments>"] [-Enabled <$true | $false>]
326329
```
327330

@@ -342,19 +345,19 @@ For detailed syntax and parameter information, see [New-SafeAttachmentRule](/pow
342345

343346
To view existing safe attachment policies, use the following syntax:
344347

345-
```PowerShell
348+
```powershell
346349
Get-SafeAttachmentPolicy [-Identity "<PolicyIdentity>"] [| <Format-Table | Format-List> <Property1,Property2,...>]
347350
```
348351

349352
This example returns a summary list of all safe attachment policies.
350353

351-
```PowerShell
354+
```powershell
352355
Get-SafeAttachmentPolicy
353356
```
354357

355358
This example returns detailed information for the safe attachment policy named Contoso Executives.
356359

357-
```PowerShell
360+
```powershell
358361
Get-SafeAttachmentPolicy -Identity "Contoso Executives" | Format-List
359362
```
360363

@@ -364,29 +367,29 @@ For detailed syntax and parameter information, see [Get-SafeAttachmentPolicy](/p
364367

365368
To view existing safe attachment rules, use the following syntax:
366369

367-
```PowerShell
370+
```powershell
368371
Get-SafeAttachmentRule [-Identity "<RuleIdentity>"] [-State <Enabled | Disabled>] [| <Format-Table | Format-List> <Property1,Property2,...>]
369372
```
370373

371374
This example returns a summary list of all safe attachment rules.
372375

373-
```PowerShell
376+
```powershell
374377
Get-SafeAttachmentRule
375378
```
376379

377380
To filter the list by enabled or disabled rules, run the following commands:
378381

379-
```PowerShell
382+
```powershell
380383
Get-SafeAttachmentRule -State Disabled
381384
```
382385

383-
```PowerShell
386+
```powershell
384387
Get-SafeAttachmentRule -State Enabled
385388
```
386389

387390
This example returns detailed information for the safe attachment rule named Contoso Executives.
388391

389-
```PowerShell
392+
```powershell
390393
Get-SafeAttachmentRule -Identity "Contoso Executives" | Format-List
391394
```
392395

@@ -400,7 +403,7 @@ Otherwise, the same settings are available when you create a safe attachment pol
400403

401404
To modify a safe attachment policy, use this syntax:
402405

403-
```PowerShell
406+
```powershell
404407
Set-SafeAttachmentPolicy -Identity "<PolicyName>" <Settings>
405408
```
406409

@@ -417,7 +420,7 @@ Otherwise, the same settings are available when you create a rule as described i
417420

418421
To modify a safe attachment rule, use this syntax:
419422

420-
```PowerShell
423+
```powershell
421424
Set-SafeAttachmentRule -Identity "<RuleName>" <Settings>
422425
```
423426

@@ -429,19 +432,19 @@ Enabling or disabling a safe attachment rule in PowerShell enables or disables t
429432

430433
To enable or disable a safe attachment rule in PowerShell, use this syntax:
431434

432-
```PowerShell
435+
```powershell
433436
<Enable-SafeAttachmentRule | Disable-SafeAttachmentRule> -Identity "<RuleName>"
434437
```
435438

436439
This example disables the safe attachment rule named Marketing Department.
437440

438-
```PowerShell
441+
```powershell
439442
Disable-SafeAttachmentRule -Identity "Marketing Department"
440443
```
441444

442445
This example enables same rule.
443446

444-
```PowerShell
447+
```powershell
445448
Enable-SafeAttachmentRule -Identity "Marketing Department"
446449
```
447450

@@ -453,13 +456,13 @@ The highest priority value you can set on a rule is 0. The lowest value you can
453456

454457
To set the priority of a safe attachment rule in PowerShell, use the following syntax:
455458

456-
```PowerShell
459+
```powershell
457460
Set-SafeAttachmentRule -Identity "<RuleName>" -Priority <Number>
458461
```
459462

460463
This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
461464

462-
```PowerShell
465+
```powershell
463466
Set-SafeAttachmentRule -Identity "Marketing Department" -Priority 2
464467
```
465468

@@ -473,13 +476,13 @@ When you use PowerShell to remove a safe attachment policy, the corresponding sa
473476

474477
To remove a safe attachment policy in PowerShell, use this syntax:
475478

476-
```PowerShell
479+
```powershell
477480
Remove-SafeAttachmentPolicy -Identity "<PolicyName>"
478481
```
479482

480483
This example removes the safe attachment policy named Marketing Department.
481484

482-
```PowerShell
485+
```powershell
483486
Remove-SafeAttachmentPolicy -Identity "Marketing Department"
484487
```
485488

@@ -491,13 +494,13 @@ When you use PowerShell to remove a safe attachment rule, the corresponding safe
491494

492495
To remove a safe attachment rule in PowerShell, use this syntax:
493496

494-
```PowerShell
497+
```powershell
495498
Remove-SafeAttachmentRule -Identity "<PolicyName>"
496499
```
497500

498501
This example removes the safe attachment rule named Marketing Department.
499502

500-
```PowerShell
503+
```powershell
501504
Remove-SafeAttachmentRule -Identity "Marketing Department"
502505
```
503506

@@ -509,14 +512,10 @@ To verify that you've successfully created, modified, or removed Safe Attachment
509512

510513
- On the **Safe Attachments** page in the Microsoft Defender portal at <https://security.microsoft.com/safeattachmentv2>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list by clicking on the name, and view the details in the fly out.
511514

512-
- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, run the following command, and verify the settings:
513-
514-
```PowerShell
515-
Get-SafeAttachmentPolicy -Identity "<Name>" | Format-List
516-
```
515+
- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, run the following commands, and verify the settings:
517516

518-
```PowerShell
519-
Get-SafeAttachmentRule -Identity "<Name>" | Format-List
517+
```powershell
518+
Get-SafeAttachmentPolicy -Identity "<Name>" | Format-List; Get-SafeAttachmentRule -Identity "<Name>" | Format-List
520519
```
521520

522521
- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).

0 commit comments

Comments
 (0)