Skip to content

Commit a4e4857

Browse files
authored
Clarify URL misidentification in SecOps guide
1 parent 8b5bbf1 commit a4e4857

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,9 @@ SecOps team members can use threat hunting or information from external threat i
7070
SecOps team members can triage and respond to false positive Teams messages (good messages blocked) on the **Quarantine** page in Defender for Office 365 at <https://security.microsoft.com/quarantine>. Teams messages detected by zero-hour auto protection (ZAP) are available on the **Teams messages** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-teams-messages) on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.
7171

7272
SecOps team members can also use allow entries in the Tenant Allow/Block List to allow the misclassified indicators:
73-
- URLs mis-identified by Defender for Office 365. URL allows entries are enforced at time of click in Teams when [Teams integration in Safe Links policies is turned on](mdo-support-teams-quick-configure.md#step-2-verify-safe-links-integration-for-microsoft-teams).
74-
- Files by using the SHA256 hash value.
75-
7673

74+
- URLs misidentified by Defender for Office 365. URL allows entries are enforced at time of click in Teams when [Teams integration in Safe Links policies is turned on](mdo-support-teams-quick-configure.md#step-2-verify-safe-links-integration-for-microsoft-teams).
75+
- Files by using the SHA256 hash value.
7776

7877
> [!TIP]
7978
> Teams messages released from quarantine are available to senders and recipients in the original location in Teams chats and channel posts.

0 commit comments

Comments
 (0)