Skip to content

Commit b64feac

Browse files
authored
Merge branch 'main' into patch-5
2 parents d801828 + 6072918 commit b64feac

File tree

3 files changed

+4
-3
lines changed

3 files changed

+4
-3
lines changed

ATPDocs/dashboard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity dashboard
33
description: This article describes how to work with the identity threat detection and response (ITDR) dashboard in Microsoft 365 Defender.
4-
ms.date: 12/27/2023
4+
ms.date: 07/18/2025
55
ms.topic: how-to
66
ms.reviewer: LiorShapiraa
77
---
@@ -42,7 +42,7 @@ Select links in the cards to just to more details, such as documentation, relate
4242

4343
|Name |Description |
4444
|---------|---------|
45-
|**Identities overview (Sheild widget)** |Provides a quick overview of the number of users in hybrid, cloud, and on-premises environments (AD and Microsoft Entra ID). This feature includes direct links to the Advanced Hunting platform, offering detailed user information at your fingertips.|
45+
|**Identities overview (shield widget)** |Provides a quick overview of the number of users in hybrid, cloud, and on-premises environments (AD and Microsoft Entra ID). This feature includes direct links to the Advanced Hunting platform, offering detailed user information at your fingertips.|
4646
|**Top insights** /<br>**Users identified in a risky lateral movement path** | Indicates any sensitive accounts with risky lateral movement paths, which are windows of opportunity for attackers and can expose risks. <br><br>We recommend that you take action on any sensitive accounts found with risky lateral movement paths to minimize your risk. <br><br>For more information, see [Understand and investigate Lateral Movement Paths (LMPs) with Microsoft Defender for Identity](understand-lateral-movement-paths.md).|
4747
|**Top insights** /<br>**Dormant Active Directory users who should be removed from sensitive groups** | Lists accounts that have been left unused for at least 180 days. <br><br>An easy and quiet path deep into your organization is through inactive accounts that are a part of sensitive groups, therefore we recommend removing those users from sensitive groups. <br><br>For more information, see [Security assessment: Riskiest lateral movement paths (LMP)](security-assessment-riskiest-lmp.md).|
4848
|**ITDR deployment health** | Lists any sensor deployment progress, any health alerts, and license availability. |

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ It's important to understand how user allows and blocks, tenant allows and block
105105
- After the filtering stack determines a verdict, only then are tenant policies and their configured actions evaluated.
106106
- If the same email address or domain exists in a user's Safe Senders list and Blocked Senders list, the Safe Senders list takes precedence.
107107
- If the same entity (email address, domain, spoofed sending infrastructure, file, or URL) exists in an allow entry and a block entry in the Tenant Allow/Block List, the block entry takes precedence.
108+
- For malware and high confidence phishing verdicts, you can't create allow entries directly in the Tenant Allow/Block List. Instead, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to submit the **[email](submissions-admin.md#report-good-email-to-microsoft)**, **[email attachment](submissions-admin.md#report-good-email-attachments-to-microsoft)** or **[URL](submissions-admin.md#report-good-urls-to-microsoft)** to Microsoft. After you select **I've confirmed it's clean**, you can then select **Allow this message**, **Allow this file** or **Allow this URL** to create an allow entry for the domains and email addresses, files or URLs.
108109
- If you use a file type in the [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies), allowing the same file in the Tenant Allow/Block list or Exchange mail flow rules (also known as transport rules) doesn't override the verdict.
109110

110111
### User allows and blocks

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ In a supported version of Outlook, select one or more messages, select **Report*
7474
7575
Based on the [User reported settings](submissions-user-reported-messages-custom-mailbox.md) in your organization, the messages are sent to the reporting mailbox, to Microsoft, or both. The following actions are also taken on the reported messages in the mailbox:
7676

77-
- **Reported as junk**: The messages are moved to the Junk Email folder.
77+
- **Reported as junk**: The messages are moved to the Junk Email folder, and the sender is automatically added to the user's Blocked Senders list.
7878
- **Reported as phishing**: The messages are deleted.
7979

8080
### Use the built-in Report button in Outlook to report messages that aren't junk

0 commit comments

Comments
 (0)