Skip to content

Commit c178323

Browse files
Merge pull request #5031 from MicrosoftDocs/main
[AutoPublish] main to live - 09/12 19:39 PDT | 09/13 08:09 IST
2 parents 7e154ea + 813c829 commit c178323

14 files changed

+103
-57
lines changed

defender-business/get-defender-business.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Defender for Business provides advanced security protection for your company's d
8080
8181
## [Get Microsoft 365 Business Premium](#tab/getpremium)
8282

83-
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Productivity and security for small and medium-sized businesses](/Microsoft-365/business-premium/why-choose-microsoft-365-business-premium).
83+
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Why should I choose Microsoft 365 Business Premium?](/microsoft-365/admin/security-and-compliance/m365bp-security-benefits).
8484

8585
1. Visit the [Microsoft 365 Business Premium product page](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium?activetab=pivot%3aoverviewtab).
8686

@@ -90,10 +90,7 @@ Microsoft 365 Business Premium includes Defender for Business, Microsoft Defende
9090

9191
4. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), where you view and manage security settings and devices for your organization. In the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant.
9292

93-
5. Follow the guidance in [Boost your security protection](/Microsoft-365/business-premium/m365bp-security-overview) to set up your security capabilities.
94-
95-
> [!IMPORTANT]
96-
> Make sure to complete all the steps described in [Microsoft 365 Business Premium – productivity and cybersecurity for small business](/Microsoft-365/business-premium/m365bp-overview).
93+
5. Follow the guidance in [Microsoft 365 for business security best practices](/microsoft-365/admin/security-and-compliance/m365b-security-best-practices) to set up your security capabilities.
9794

9895
---
9996

defender-business/mdb-add-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ One good way to make sure MFA is enabled for all users is by using [security def
6161

6262
> [!NOTE]
6363
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
64-
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
64+
> - [Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
6767
5. Save your changes.

defender-business/mdb-onboard-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 12/12/2024
12+
ms.date: 09/12/2025
1313
ms.reviewer: efratka, nehabha, muktaagarwal
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -187,7 +187,7 @@ When you run the local script on Mac, it creates a trust with Microsoft Entra ID
187187
```bash
188188
/usr/bin/unzip WindowsDefenderATPOnboardingPackage.zip \
189189
&& /bin/chmod +x MicrosoftDefenderATPOnboardingMacOs.sh \
190-
&& /bin/bash -c MicrosoftDefenderATPOnboardingMacOs.sh
190+
&& Sudo bash -x MicrosoftDefenderATPOnboardingMacOs.sh
191191
```
192192

193193
After Mac is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).

defender-business/mdb-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following table lists the basic requirements you need to configure and use D
5353
> - If you don't have a Microsoft 365 subscription before you start your trial, Microsoft Entra ID will be provisioned for you during the activation process.
5454
> - If you do have another Microsoft 365 subscription when you start your Defender for Business trial, you can use your existing Microsoft Entra service.
5555
>
56-
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa).
56+
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365).
5757
5858
## Next steps
5959

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: chrisda
88
ms.author: chrisda
99
manager: bagol
1010
ms.localizationpriority: medium
11-
ms.date: 08/28/2025
11+
ms.date: 09/12/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,13 +39,24 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## September 2025
43+
44+
- **Near real-time URL protection in Teams messages**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
45+
46+
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) as non-malicious (not a security risk) from the following locations:
47+
- Chats
48+
- Standard, shared, and private channels
49+
- Meeting conversations
50+
51+
[User reported settings](submissions-user-reported-messages-custom-mailbox.md) determine whether reported messages are sent to the specified reporting mailbox, to Microsoft, or both.
52+
4253
## Aug 2025
4354

4455
- SecOps can now dispute Microsoft's verdict on previously submitted email or URLs when they believe the result is incorrect. Disputing an item links back to the original submission and triggers a reevaluation with full context and audit history. [Learn more](submissions-admin.md).
4556

4657
## July 2025
4758

48-
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) from chats, standard and private channels, meeting conversations to Microsoft, the specified reporting mailbox, or both via [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
59+
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) from chats, standard, shared, and private channels, meeting conversations to Microsoft as malicious (security risk) the specified reporting mailbox, or both via [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
4960

5061
## June 2025
5162

defender-office-365/mdo-support-teams-about.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 09/03/2025
19+
ms.date: 09/11/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -33,7 +33,7 @@ With the increased use of collaboration tools like Microsoft Teams, the possibil
3333
All licenses of Microsoft Teams in Microsoft 365 include the following built-in protections:
3434

3535
- [Built-in virus protection in SharePoint, SharePoint Embedded, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)
36-
- **Near real-time URL protection in Teams messages (currently in Preview)**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and teams for all URL verdicts (not just malware or high confidence phishing).
36+
- **Near real-time URL protection in Teams messages (currently in Preview)**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and channels for all URL verdicts (not just malware or high confidence phishing).
3737

3838
:::image type="content" source="media/teams-message-url-warning.png" alt-text="Screenshot showing a Microsoft Teams message with a URL warning." lightbox="media/teams-message-url-warning.png":::
3939

@@ -46,7 +46,7 @@ Microsoft Defender for Office 365 provides the following extra Teams protection
4646

4747
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
4848

49-
- **Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
49+
- **Report Teams messages**: Users can report Teams messages as malicious or not malicious. Depending on the reported message settings in the organization, reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
5050

5151
- **Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
5252

defender-office-365/mdo-support-teams-quick-configure.md

Lines changed: 20 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins who aren't using Microsoft Defender for Office 365 can learn how to quickly set up protection in Microsoft Teams.
1818
ms.service: defender-office-365
19-
ms.date: 08/21/2025
19+
ms.date: 09/11/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
---
@@ -112,18 +112,30 @@ For complete instructions, see [Configure ZAP for Teams protection in Defender f
112112

113113
For complete instructions, see [User reported message settings in Microsoft Teams](submissions-teams.md).
114114

115-
1. In the Teams admin center, go to the **Messaging policies** page at <https://admin.teams.microsoft.com/policies/messaging>.
115+
1. In the Teams admin center, go to the **Settings & policies** page at <https://admin.teams.microsoft.com/one-policy/settings>.
116116

117-
2. On the **Manage policies** tab of the **Messaging policies** page, verify that the **Manage policies** tab is selected, and do either of the following actions to edit the appropriate policy (the **Global (Org-wide) default** policy for all users or a custom policy for specific users):
118-
- Select the link in the **Name** column.
119-
- Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
117+
2. On the **Settings & policies** page, select either the **Global (Org-wide) default settings** tab for all users or **Custom policies for users & groups** for specific users.
120118

121-
3. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
119+
3. On the tab, go to the **Messaging** section and select **Messaging**. If you selected the **Custom policies for users & groups** tab in the previous step, do one of the following steps to edit the specific policy:
120+
- Click on the policy name in the **Name** column.
121+
- Click anywhere in the row other than the **Name** column, and then select the :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit** action that appears.
122+
123+
4. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
122124

123125
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
124126

125-
4. In the Microsoft Defender portal, go to the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.
127+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-security-risk.png" alt-text="Screenshot of the 'Report a security concern' toggle in Messaging policies in the Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-security-risk.png":::
128+
129+
5. In the Teams admin center, go to the **Messaging settings** page at <https://admin.teams.microsoft.com/messaging/settings>.
130+
131+
6. On the **Messaging settings** page, go to the **Messaging safety** section, find the **Report incorrect security detections** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
132+
133+
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
134+
135+
:::image type="content" source="media/submissions-teams-turn-on-off-tac-not-security-risk.png" alt-text="Screenshot of the 'Report incorrect security detections' toggle on the Messaging settings page in the Microsoft Teams admin center." lightbox="media/submissions-teams-turn-on-off-tac-not-security-risk.png":::
136+
137+
7. In the Microsoft Defender portal, go to the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.
126138

127-
5. On the **User reported settings** page, go to the **Microsoft Teams** section, and verify **Monitor reported messages in Microsoft Teams** is selected.
139+
8. On the **User reported settings** page, go to the **Microsoft Teams** section, and verify **Monitor reported messages in Microsoft Teams** is selected.
128140

129141
If it's not selected, select the check box, and then select **Save**.

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 07/28/2025
19+
ms.date: 09/11/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -33,14 +33,14 @@ Another important step is to ensure SecOps team members have the appropriate per
3333

3434
## Integrate user reported Teams messages into SecOps incident response
3535

36-
When users report Teams messages as potentially malicious, the reported messages are sent to Microsoft and/or the reporting mailbox as defined by the [user reported settings in Defender for Office 365](submissions-user-reported-messages-custom-mailbox.md).
36+
When users report Teams messages as potentially malicious or non malicious, the reported messages are sent to Microsoft and/or the reporting mailbox as defined by the [user reported settings in Defender for Office 365](submissions-user-reported-messages-custom-mailbox.md).
3737

38-
The **Teams message reported by user as security risk** alert is automatically generated and correlated to Defender XDR Incidents.
38+
The **Teams message reported by user as security risk** and **Teams message reported by user as not security risk** alerts are automatically generated and correlated to Defender XDR Incidents for malicious and non malicious user report respectively.
3939

4040
We strongly recommend that SecOps team members start triage and investigation from the [Defender XDR incidents queue in the Microsoft Defender portal](/defender-office-365/mdo-sec-ops-manage-incidents-and-alerts) or SIEM/SOAR integration.
4141

4242
> [!TIP]
43-
> Currently, **Teams message reported by user as security risk** alerts don't generate automated investigation and response (AIR) investigations.
43+
> Currently, **Teams message reported by user as security risk** and **Teams message reported by user as not security risk** alerts don't generate automated investigation and response (AIR) investigations.
4444
4545
SecOps team members can review submitted Teams message details in the following locations in the Defender portal:
4646

@@ -67,9 +67,12 @@ SecOps team members can use threat hunting or information from external threat i
6767
6868
## Enable SecOps to manage false positives in Microsoft Teams
6969

70-
SecOps team members can triage and respond to false positive Teams messages (good messages blocked) on the **Quarantine** page in Defender for Office 365 at <https://security.microsoft.com/quarantine>.
70+
SecOps team members can triage and respond to false positive Teams messages (good messages blocked) on the **Quarantine** page in Defender for Office 365 at <https://security.microsoft.com/quarantine>. Teams messages detected by zero-hour auto protection (ZAP) are available on the **Teams messages** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-teams-messages) on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.
7171

72-
Teams messages detected by zero-hour auto protection (ZAP) are available on the **Teams messages** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-teams-messages) on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.
72+
SecOps team members can also use allow entries in the Tenant Allow/Block List to allow the misclassified indicators:
73+
74+
- URLs misidentified by Defender for Office 365. URL allows entries are enforced at time of click in Teams when [Teams integration in Safe Links policies is turned on](mdo-support-teams-quick-configure.md#step-2-verify-safe-links-integration-for-microsoft-teams).
75+
- Files by using the SHA256 hash value.
7376

7477
> [!TIP]
7578
> Teams messages released from quarantine are available to senders and recipients in the original location in Teams chats and channel posts.
152 KB
Loading
141 KB
Loading

0 commit comments

Comments
 (0)