You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/preset-security-policies.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.custom:
16
16
description: Admins can learn how to apply Standard and Strict policy settings across the protection features of Exchange Online Protection (EOP) and Microsoft Defender for Office 365
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -106,14 +106,20 @@ The rest of this article how to configure preset security policies.
106
106
> [!NOTE]
107
107
> In organizations without Defender for Office 365, selecting **Next** takes you to the **Review** page (Step 9).
108
108
109
-
4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions).
109
+
4. On the **Apply Defender for Office 365 protection** page, identify the internal recipients that the [Defender for Office 365 protections](#policies-in-preset-security-policies) apply to (recipient conditions) or don't apply to (recipient exceptions)
110
110
111
111
The settings and behavior are exactly like the **Apply Exchange Online Protection** page in the previous step.
112
112
113
113
You can also select **Previously selected recipients** to use the same recipients that you selected for EOP protection on the previous page.
114
114
115
115
When you're finished on the **Apply Defender for Office 365 protection** page, select **Next**.
116
116
117
+
> [!TIP]
118
+
> If not all users in your organization have Defender for Office 365 licenses, you can use the following methods to apply Defender for Office 365 protections to eligible users only:
119
+
>
120
+
> - Use **Specified recipients** to identify the users or groups who **are eligible** for Defender for Office 365 protections.
121
+
> - Use **Exclude these recipients**\>**Specified recipients** to identify the users or groups who **aren't eligible** for Defender for Office 365 protections.
122
+
117
123
5. On the **Impersonation protection** page, select **Next**.
118
124
119
125
6. On the **Add email addresses to flag when impersonated by attackers** page, add internal and external senders who are protected by [user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
@@ -182,9 +188,9 @@ To disable the **Standard protection** or **Strict protection** preset security
182
188
## Use the Microsoft Defender portal to add exclusions to the Built-in protection preset security policy
183
189
184
190
> [!TIP]
185
-
> The **Built-in protection** preset security policy is applied to all users in organizations with any amount of licenses for Defender for Microsoft 365. This application is in the spirit of securing the broadest set of users until admins specifically configure Defender for Office 365 protections. Because **Built-in protection** is enabled by default, customers don't need to worry about violating product licensing terms. However, we recommend purchasing enough Defender for Office 365 licenses to ensure **Built-in protection** continues for all users.
191
+
> The **Built-in protection** preset security policy is applied to all users in organizations with any amount of licenses for Defender for Office 365. Application of this protection is in the spirit of securing the broadest set of users until admins specifically configure Defender for Office 365 protections. Because **Built-in protection** is enabled by default, customers don't need to worry about violating product licensing terms. However, we recommend purchasing enough Defender for Office 365 licenses to ensure **Built-in protection** continues for all users.
186
192
>
187
-
> The **Built-in protection** preset security policy doesn't affect recipients who are defined in the **Standard** or **Strict** preset security policies, or in custom Safe Links or Safe Attachments policies. Therefore, we typically don't recommend exceptions to the **Built-in protection** preset security policy.
193
+
> The **Built-in protection** preset security policy doesn't affect recipients who are defined in the **Standard** or **Strict** preset security policies, or in custom Safe Links or Safe Attachments policies. Therefore, we typically don't recommend exceptions to the **Built-in protection** preset security policy, unless you want to exclude users who aren't eligible for Safe Links and Safe Attachments protections (users who lack Defender for Office 365 licenses).
188
194
189
195
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Preset Security Policies** in the **Templated policies** section. Or, to go directly to the **Preset security policies** page, use <https://security.microsoft.com/presetSecurityPolicies>.
Copy file name to clipboardExpand all lines: defender-office-365/safe-attachments-policies-configure.md
+41-42Lines changed: 41 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection:
18
18
description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
19
19
ms.custom: seo-marvel-apr2020
20
20
ms.service: defender-office-365
21
-
ms.date: 01/29/2025
21
+
ms.date: 03/21/2025
22
22
appliesto:
23
23
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -116,6 +116,9 @@ You configure Safe Attachments policies in the Microsoft Defender portal or in E
116
116
- Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
117
117
- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
118
118
119
+
> [!TIP]
120
+
> If not all users in your organization have Defender for Office 365 licenses, you can use **User** or **Group** exceptions to exclude users who aren't eligible for Safe Attachments protections.
121
+
119
122
When you're finished on the **Users and domains** page, select **Next**.
120
123
121
124
5. On the **Settings** page, configure the following settings:
@@ -181,22 +184,22 @@ Select a policy by clicking anywhere in the row other than the check box next to
181
184
182
185
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & Collaboration**\>**Policies & Rules**\>**Threat policies**\>**Safe Attachments** in the **Policies** section. To go directly to the **Safe Attachments** page, use <https://security.microsoft.com/safeattachmentv2>.
183
186
184
-
2.On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
187
+
On the **Safe Attachments** page, select the Safe Attachments policy by using either of the following methods:
185
188
186
-
- Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
187
-
-**Enable selected policies**.
188
-
-**Disable selected policies**.
189
-
-**Delete selected policies**.
189
+
- Select the policy from the list by selecting the check box next to the name. The following actions are available in the :::image type="icon" source="media/m365-cc-sc-more-actions-icon.png" border="false"::: **More actions** dropdown list that appears:
190
+
-**Enable selected policies**.
191
+
-**Disable selected policies**.
192
+
-**Delete selected policies**.
190
193
191
-
:::image type="content" source="media/safe-attachments-policies-main-page.png" alt-text="The Safe Attachments page with a policy selected and the More actions control expanded." lightbox="media/safe-attachments-policies-main-page.png":::
194
+
:::image type="content" source="media/safe-attachments-policies-main-page.png" alt-text="The Safe Attachments page with a policy selected and the More actions control expanded." lightbox="media/safe-attachments-policies-main-page.png":::
192
195
193
-
- Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
194
-
- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
- Select the policy from the list by clicking anywhere in the row other than the check box next to the name. Some or all following actions are available in the details flyout that opens:
197
+
- Modify policy settings by clicking **Edit** in each section (custom policies or the default policy)
@@ -308,7 +311,7 @@ This example creates a safe attachment policy named Contoso All with the followi
308
311
- Block messages that are found to contain malware by Safe Documents scanning (we aren't using the _Action_ parameter, and the default value is `Block`).
309
312
- The default quarantine policy is used (AdminOnlyAccessPolicy), because we aren't using the _QuarantineTag_ parameter.
This example sets the priority of the rule named Marketing Department to 2. All existing rules that have a priority less than or equal to 2 are decreased by 1 (their priority numbers are increased by 1).
@@ -509,14 +512,10 @@ To verify that you've successfully created, modified, or removed Safe Attachment
509
512
510
513
- On the **Safe Attachments** page in the Microsoft Defender portal at <https://security.microsoft.com/safeattachmentv2>, verify the list of policies, their **Status** values, and their **Priority** values. To view more details, select the policy from the list by clicking on the name, and view the details in the fly out.
511
514
512
-
- In Exchange Online PowerShell, replace \<Name\> with the name of the policy or rule, run the following command, and verify the settings:
- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).
0 commit comments