Skip to content

Commit ab353bc

Browse files
Merge pull request #5046 from MicrosoftDocs/main
[AutoPublish] main to live - 09/15 10:29 PDT | 09/15 22:59 IST
2 parents a857d72 + b95e86a commit ab353bc

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

defender-office-365/submissions-users-report-message-add-in-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ appliesto:
3030
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3131

3232
> [!IMPORTANT]
33-
> The Microsoft Report Message and Report Phishing add-ins are now in maintenance mode and will eventually be deprecated. We recommend transitioning from the add-ins to the built-in **Report** button. The **Report** button is supported in virtuall all consumer and entrprise Outlook clients. For more information, see the [Frequently asked questions](#frequently-asked-questions) section in this article.
33+
> The Microsoft Report Message and Report Phishing add-ins are now in maintenance mode and will eventually be deprecated. We recommend transitioning from the add-ins to the built-in **Report** button. The **Report** button is supported in virtually all consumer and enterprise Outlook clients. For more information, see the [Frequently asked questions](#frequently-asked-questions) section in this article.
3434
3535
The built-in **Report** button in [supported versions of Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook) makes it easy for users to report false positives and false negatives to Microsoft for analysis. False positives are good email that was blocked or sent to the Junk Email folder. False negatives are unwanted email or phishing that was delivered to the Inbox.
3636

@@ -178,7 +178,7 @@ We recommend that you try the built-in **Report** button. If you're still facing
178178

179179
### Q: I can't scope the built-in Report button, which prevents me from rolling it out. What can I do?
180180

181-
A: This behavior is by design. We think the built-in **Report** button provides a base level of protection for all users, including shared and delegate mailboxes. Scoping the built-in **Report** button to a limited number of users can result in forgetting about those users, which leavs a security gap that can be exploited by attackers. Many customers totaling more than a million users migrated smoothly to the the built-in **Report** button smoothly without scoping ability. Instead, they scoped non-Microsoft add-in buttons or the Microsoft add-ins as they rolled out the built-in **Report** button across the organization.
181+
A: This behavior is by design. We think the built-in **Report** button provides a base level of protection for all users, including shared and delegate mailboxes. Scoping the built-in **Report** button to a limited number of users can result in forgetting about those users, which leaves a security gap that can be exploited by attackers. Many customers totaling more than a million users migrated smoothly to the built-in **Report** button without scoping ability. Instead, they scoped non-Microsoft add-in buttons or the Microsoft add-ins as they rolled out the built-in **Report** button across the organization.
182182

183183
If you're looking to scope the functionality for experimentation, we recommend using a test environment.
184184

@@ -192,7 +192,7 @@ A: No. Unfortunately, due to the previously stated reasons, the add-ins will be
192192

193193
### Q: What is the recommendation for moving from the add-ins to a non-Microsoft reporting add-in?
194194

195-
A: After you, remove the add-in from the integrated apps from the **Deployed apps** tab of the **Integrated apps** page as previously described, install the non-Microsoft add-in as per their instructions.
195+
A: After you remove the add-in from the **Deployed apps** tab of the **Integrated apps** page as previously described, install the non-Microsoft add-in according to their instructions.
196196

197197
On the [User reported settings page](submissions-user-reported-messages-custom-mailbox.md) in the Defender portal, you need to do the following steps:
198198

exposure-management/enterprise-exposure-map.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,19 +37,19 @@ The exposure map gives you visibility into asset connections.
3737
- **Hovering**: Hover over nodes and edges to get additional information.
3838
- **Explore assets and their edges**. To explore assets and edge, select the plus sign. Or select the option to explore connected assets from the contextual menu.
3939
- **Asset details**: To view details, select the asset icon.
40-
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focuses on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
40+
- **Focus on asset**: Provides a way to refocus the graph visualization on the specific node you want to explore, similar to the **Graph** view when selecting an individual [attack path](review-attack-paths.md). The Cloud attack paths focus on real, externally-driven and exploitable threats rather than broad potential attack path scenarios.
4141
- **Search**: Helps you to discover items by node type. By selecting **all results**, search the particular type for specific results. You can also filter your search by devices, identity, or cloud assets from the initial screen.
4242
- **Discovery source**: Use the layer option to show or hide the origin of the data directly on the attack surface map.
4343

44-
:::image type="content" source="media/value-data-connectors/attack map data connectors.png" alt-text="Screenshot of the attack surface exposure map." lightbox="media/value-data-connectors/attack map data connectors.png":::
44+
:::image type="content" source="media/value-data-connectors/attack map data connectors.png" alt-text="Screenshot of the attack surface exposure map." lightbox="media/value-data-connectors/attack map data connectors.png":::
4545

4646
1. Open the side panel to view asset details.
4747
- **General**: View general information about the asset, including **Type**, **IDs**, and **Discovery source**.
4848
- **All data**: View all data about the asset, including **Categories**, **Node Properties**, **Metadata**, and **IDs**.
4949
- **Top Vulnerabilities**: View up to the top 100 CVEs (by severity) on the asset.
5050
- **Findings**: View all the security findings on the asset.
5151

52-
:::image type="content" source="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png" alt-text="Screenshot of attack surface map side pane" lightbox="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png":::
52+
:::image type="content" source="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png" alt-text="Screenshot of attack surface map side pane." lightbox="media/enterprise-exposure-map/attack-surface-exposure-map-sidepane.png":::
5353

5454
## Next steps
5555

0 commit comments

Comments
 (0)