You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Support phase: **Security and Critical Updates**
110
+
111
+
#### What's new
112
+
113
+
- Enhanced Passive Mode Scanning Behavior
114
+
When Microsoft Defender is in Passive mode, an Antivirus scan will not occur after a signature update , unless specifically set in the policy setting DisableScanOnUpdate.
115
+
116
+
- Improved Tamper Protection Handling
117
+
Optimized the configuration process for Tamper Protection in multi-threaded environments to ensure more reliable behavior.
118
+
119
+
- Digital Signature Verification Performance Boost
120
+
Enhanced the efficiency of digital signature verification to improve overall system performance.
121
+
122
+
- Refined ASR Rule Exclusion Processing
123
+
Refined exclusion processing and resolved false positives for the Attack Surface Reduction (ASR) rule: Block Office applications from injecting code into other processes.
Copy file name to clipboardExpand all lines: defender-office-365/recommended-settings-for-eop-and-office365.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.collection:
19
19
- tier1
20
20
description: What are best practices for email and collaboration security settings in Microsoft 365? What are the current recommendations for standard protection? What should you use to be more strict? And what extras do you get if you also use Microsoft Defender for Office 365?
21
21
ms.service: defender-office-365
22
-
ms.date: 07/10/2025
22
+
ms.date: 08/09/2025
23
23
appliesto:
24
24
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
25
25
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -334,25 +334,25 @@ To configure Safe Links policy settings, see [Set up Safe Links policies in Micr
334
334
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), you use the [New-SafeLinksPolicy](/powershell/module/exchangepowershell/new-safelinkspolicy) and [Set-SafeLinksPolicy](/powershell/module/exchangepowershell/set-safelinkspolicy) cmdlets for Safe Links policy settings.
335
335
336
336
> [!NOTE]
337
-
> The **Default in custom** column refers to the default values in new Safe Links policies that you create. The remaining columns indicate (unless otherwise noted) the values that are configured in the corresponding preset security policies.
337
+
> The **Default in custom** column refers to the default values in new Safe Links policies you create. The remaining columns indicate the values configured in the corresponding preset security policies.
338
338
339
339
|Security feature name|Default in custom|Built-in protection|Standard|Strict|Comment|
340
340
|---|:---:|:---:|:---:|:---:|---|
341
341
|**URL & click protection settings**||||||
342
342
|**Email**|||||The settings in this section affect URL rewriting and time of click protection in email messages.|
343
343
|**On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.** (_EnableSafeLinksForEmail_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
344
-
|**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Selected (`$true`)|Not selected (`$false`)|Selected (`$true`)|Selected (`$true`)||
344
+
|**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
345
345
|**Apply real-time URL scanning for suspicious links and links that point to files** (_ScanUrls_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
346
346
|**Wait for URL scanning to complete before delivering the message** (_DeliverMessageAfterScan_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
347
-
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _DisableURLRewrite_ parameter is `$false`.|
347
+
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new policies created in the Defender portal, this setting is selected by default. In new policies created in PowerShell, the default value is `$false`.|
348
348
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br/><br/> **Note**: Safe Links doesn't scan or wrap entries in the "Don't rewrite the following URLs" list during mail flow. Report the URL as **I've confirmed it's clean** and then select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
349
349
|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
350
350
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** (_EnableSafeLinksForTeams_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
351
351
|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|
352
352
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.** (_EnableSafeLinksForOffice_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Use Safe Links in supported Office 365 desktop and mobile (iOS and Android) apps. For more information, see [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).|
353
353
|**Click protection settings**||||||
354
354
|**Track user clicks** (_TrackClicks_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
355
-
|**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _AllowClickThrough_ parameter is `$false`.|
355
+
|**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new policies created in the Defender portal, this setting is selected by default. In new policies created in PowerShell, the default value is `$false`.|
356
356
|**Display the organization branding on notification and warning pages** (_EnableOrganizationBranding_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|We have no specific recommendation for this setting. <br/><br/> Before you turn on this setting, you need to follow the instructions in [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme) to upload your company logo.|
357
357
|**Notification**||||||
358
358
|**How would you like to notify your users?** (_CustomNotificationText_ and _UseTranslatedNotificationText_)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|We have no specific recommendation for this setting. <br/><br/> You can select **Use custom notification text** (`-CustomNotificationText "<Custom text>"`) to enter and use customized notification text. If you specify custom text, you can also select **Use Microsoft Translator for automatic localization** (`-UseTranslatedNotificationText $true`) to automatically translate the text into the user's language.|
The `CloudStorageAggregatedEvents` table in the [advanced hunting](advanced-hunting-overview.md) contains information about storage activity and related events. Use this reference to construct queries that return information from this table.
31
+
The `CloudStorageAggregatedEvents` table in the [advanced hunting](advanced-hunting-overview.md)schema contains information about storage activity and related events. Use this reference to construct queries that return information from this table.
32
32
33
33
> [!IMPORTANT]
34
34
> Some information relates to prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
Copy file name to clipboardExpand all lines: defender-xdr/phishing-triage-agent.md
+22-8Lines changed: 22 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,8 @@ description: Learn about the Security Copilot Phishing Triage Agent, including r
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
7
-
ms.author: diannegali
8
-
author: diannegali
7
+
ms.author: guywild
8
+
author: guywi-ms
9
9
ms.localizationpriority: medium
10
10
manager: deniseb
11
11
audience: ITPro
@@ -18,7 +18,7 @@ ms.topic: how-to
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 06/13/2025
21
+
ms.date: 08/07/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Defender for Office 365 Plan 2
@@ -51,6 +51,17 @@ The Phishing Triage Agent is a [Security Copilot agent](/copilot/security/agents
51
51
-**Transparent rationale:** The agent provides a transparent rationale for its classification verdicts in natural language, detailing the reasoning behind its conclusions and the evidence used to reach them. Additionally, it presents a visual representation of its reasoning process.
52
52
-**Learning based on feedback:** The agent continuously improves based on feedback provided by analysts. Over time, this feedback loop fine-tunes the agent’s behavior, aligning it more closely with organizational nuances and reducing the need for manual verification.
| Set up, pause, remove or the agent |**Security Administrator** in Microsoft Entra ID |
59
+
| View and manage agent settings and activity |**Security Copilot (read)** and **Security data basics (read)** under the **Security operations** permissions group in the Defender portal |
60
+
| View and manage feedback |**Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** under the **Security operations** permissions group in the Defender portal|
61
+
|Reject feedback|**Security Administrator** in Microsoft Entra ID|
62
+
63
+
For more information about unified RBAC in the Defender portal, see [Microsoft Defender XDR Unified role-based access control (RBAC)](/defender-xdr/manage-rbac).
64
+
54
65
## Prerequisites
55
66
56
67
The following are organizational requirements to run Phishing Triage Agent in your environment:
@@ -86,7 +97,7 @@ The Phishing Triage Agent addresses phishing incidents that include alerts with
86
97
## Set up the Phishing Triage Agent
87
98
88
99
> [!NOTE]
89
-
> Setting up of the Phishing Triage Agent is only available to users with the **Security Administrator** role. Ensure that all [prerequisites](#prerequisites) are met before setting up the agent.
100
+
> To set up the Phishing Triage Agent, you need the **Security Administrator** role in Microsoft Entra ID. Ensure that all [prerequisites](#prerequisites) are met before setting up the agent.
90
101
91
102
### Create the agent’s identity and assign permissions
92
103
@@ -157,6 +168,9 @@ You can access the Phishing Triage Agent setup in two ways:
157
168
158
169
:::image type="content" source="/defender/media/agents-in-defender/phishing-triage/phishing-triage-setup.png" alt-text="Screenshot of the Overview page for the Phishing Triage set up" lightbox="/defender/media/agents-in-defender/phishing-triage/phishing-triage-setup.png":::
159
170
171
+
> [!NOTE]
172
+
> To view and manage setting in the Defender portal, you need **Security Copilot (read)** and **Security data basics (read)** permissions. If you don't have these permissions, you can't intiate setup from the **Settings** page, but you can still set up the agent from the incident queue if you have the **Security Administrator** role.
173
+
160
174
Follow the steps in the setup wizard, which includes:
161
175
162
176
1. Select the [identity](#identity) type to assign to the agent.
@@ -273,7 +287,7 @@ Here are examples of how you can write your feedback to the agent.
273
287
| Feedback about the sender and email body | Emails offering file sharing or document access should only come from our authorized provider Contoso.com. | Emails offering file sharing or document access should only come from our authorized providers. | Well-written feedback clearly states specific requirements (for example, sender domain), while vague references (for example “authorized providers”) do not contain actionable information. |
274
288
| Feedback about email subject | Any email that its subject contains a request for billing transaction is not allowed in our organization and is considered as phishing. | If the subject has a positive natural sentiment, it’s legitimate. | Feedback that is descriptive and specific can be effectively validated, while subjective feedback may lead to unintended outcomes. |
275
289
| Feedback about the email body | Emails requesting credential verification should include a reference to the specific account or service. Any generic 'verify your account' request without details should be treated as phishing. | This email should be treated as phishing. | Feedback that includes detailed information is more likely to be clearly understood, while feedback lacking detail may be interpreted in various ways and could lead to unpredictable outcomes. |
276
-
| Feedback about a recipient and email body | This email was sent to multiple employees, and the body instructs recipients to download an 'important attachment' without describing its contents—legitimate emails always specify attachment details. | Mass internal emails with attachments are phishing. | Feedback that highlights specific missing details commonly found in legitimate emails is more effective. Feedback that contains broad generalizations (mass emails) or vague terms (such as “internal”) may lead to an excessive amount of true positives. |
290
+
| Feedback about a recipient and email body | This email was sent to multiple employees, and the body instructs recipients to download an 'important attachment' without describing its contents—legitimate emails always specify attachment details. | Mass internal emails with attachments are phishing. | Feedback that highlights specific missing details commonly found in legitimate emails is more effective. Feedback that contains broad generalizations (mass emails) or vague terms (such as “internal”) may lead to an excessive number of true positives. |
277
291
| Feedback about a recipient and a domain | New contractor onboarding emails should only be sent to email addresses starting with 'v-' to ensure they are directed to the correct recipients. | Contractor emails look different from usual, so they might be phishing. | Well-written feedback clearly defines the expected recipient format, while feedback that is indecisive (“might be”) and lacks clear identification criteria (“looks different from usual” without specifying what is different), makes detection unreliable. |
278
292
279
293
@@ -297,7 +311,7 @@ Once the agent is taught and equipped with organizational knowledge, it begins t
297
311
## Manage the Phishing Triage Agent
298
312
299
313
> [!NOTE]
300
-
> Viewing and managing the Phishing Triage Agent settings is only available to users with the**Security Copilot (read)** and **Security data basics (read)** permissions.
314
+
> To view and manage Phishing Triage Agent settings, you need**Security Copilot (read)** and **Security data basics (read)** permissions.
301
315
302
316
You can manage the Phishing Triage Agent’s settings, review its activity, and review user interaction with the agent. To do so, select **Manage agent** in the card above the incident queue. Alternatively, you can navigate to **Settings > Microsoft Defender XDR > Agents**.
303
317
@@ -311,7 +325,7 @@ To view all previous runs by the agent:
311
325
### View and manage feedback to the agent
312
326
313
327
> [!NOTE]
314
-
> Managing feedback is only available to users with the**Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** permissions.
328
+
> To manage feedback, you need**Security Copilot (read)**, **Security data basics (read)**, and **Email & collaboration metadata (read)** permissions.
315
329
316
330
The Phishing Triage Agent uses feedback to improve its performance over time. It stores applicable feedback in its memory as lessons. You can view and manage user-submitted feedback for the Phishing Triage Agent by navigating to the Feedback management page.
317
331
@@ -342,7 +356,7 @@ To review the details of a specific feedback, select an entry from the feedback
342
356
:::image type="content" source="/defender/media/agents-in-defender/phishing-triage/review-feedback-pane.png" alt-text="Screenshot of the Review feedback pane" lightbox="/defender/media/agents-in-defender/phishing-triage/review-feedback-pane.png":::
343
357
344
358
> [!NOTE]
345
-
> Rejecting feedback provided to the agent is only available to users with the **Security Administrator** role.
359
+
> To reject feedback provided, you need the **Security Administrator** role in Microsoft Entra ID.
346
360
347
361
To reject specific feedback, open the Review feedback pane and select **Reject feedback**. When you do so, the agent records it as rejected and stops using it in future triage decisions.
0 commit comments