Skip to content

Commit ca8a5ee

Browse files
authored
Merge branch 'main' into WI408102-Entra-PIM-integration-MDI-release-note
2 parents 07c27cb + 7fb0cbf commit ca8a5ee

8 files changed

+264
-3
lines changed

ATPDocs/health-alerts.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,15 @@ The Microsoft Defender for Identity **Health issues** page lets you know when th
3232

3333
:::image type="content" source="media/health-issues/close-suppress.png" alt-text="Screenshot of a health issue details pane." lightbox="media/health-issues/close-suppress.png":::
3434

35+
## Health issue status
36+
37+
Health issues in Microsoft Defender for Identity can have different statuses depending on their state and how they're handled.
38+
39+
- **Open:**: The health issue is marked as open.
40+
- **Closed:** A health issue is automatically marked as **Closed** when Microsoft Defender for Identity detects that the underlying issue is resolved. If you have [Azure ATP (workspace name) Administrator](/defender-for-identity/role-groups#defender-for-identity-security-groups) you can also manually close a health issue.
41+
- **Suppressed:** If you have Azure ATP (workspace name) Administrators permissions, you can suppress the health alert for seven days. Suppress a health alert if you're aware of an expected temporary known issue, for example, taking down a machine for maintenance.
42+
43+
For example, if a domain controller is taken offline for maintenance, a "Sensor stopped communicating" alert might be triggered. You can use the API to change the alert status from Open to Suppressed. Once the domain controller is back online, revert the status to Open and let Microsoft Defender for Identity close the alert automatically when the issue is resolved.
3544

3645
## Health issues
3746

@@ -43,7 +52,7 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
4352

4453
|Alert|Description|Resolution|Severity|Displayed in|
4554
|----|----|----|----|----|
46-
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
55+
|The virtual machines that the listed Defender for Identity sensors is installed on has a network configuration mismatch. This issue might affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
4756

4857
### A domain controller is unreachable by a sensor
4958

defender-office-365/TOC.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,9 @@
101101
items:
102102
- name: Defender for Office 365 SecOps guide
103103
href: mdo-sec-ops-guide.md
104+
- name: Quickly configure Microsoft Teams protection
105+
href: mdo-support-teams-quick-configure.md
106+
104107
- name: Migrate
105108
items:
106109
- name: Migrate to Defender for Office 365
@@ -116,6 +119,8 @@
116119
items:
117120
- name: Defender for Office 365 SecOps Guide
118121
href: mdo-sec-ops-guide.md
122+
- name: SecOps guide for Teams protection in Defender for Office 365
123+
href: mdo-support-teams-sec-ops-guide.md
119124
- name: Threat classification
120125
href: mdo-threat-classification.md
121126
- name: Security recommendations for priority accounts
@@ -363,6 +368,8 @@
363368
href: office-365-ti.md
364369
- name: Defender for Office 365 SecOps Guide
365370
href: mdo-sec-ops-guide.md
371+
- name: SecOps guide for Teams protection in Defender for Office 365
372+
href: mdo-support-teams-sec-ops-guide.md
366373
- name: Analyze and classify
367374
items:
368375
- name: Campaign Views

defender-office-365/mdo-deployment-guide.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,13 @@ In new Microsoft 365 organizations with Microsoft Defender for Office 365 (inclu
3030

3131
Although your Microsoft 365 organization includes a default level of protection from the moment you create it (or add Defender for Office 365 to it), the steps in this article give you an actionable plan to unleash the full protection capabilities of EOP and Defender for Office 365. After you complete the steps, you can also use this article to show management that you're maximizing your investment in Microsoft 365.
3232

33+
> [!TIP]
34+
> For information about configuring protection for Microsoft Teams, see the following articles:
35+
>
36+
> - [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](mdo-support-teams-about.md)
37+
> - [Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2](mdo-support-teams-quick-configure.md)
38+
> - [Security Operations Guide for Teams protection in Microsoft Defender for Office 365](mdo-support-teams-sec-ops-guide.md)
39+
3340
The steps to configure EOP and Defender for Office 365 are described in the following diagram:
3441

3542
:::image type="content" source="media/mdo-deployment-guide.png" alt-text="A conceptual diagram showing the steps to configure Defender for Office 365." lightbox="media/mdo-deployment-guide.png":::
Lines changed: 111 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,111 @@
1+
---
2+
title: Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2
3+
f1.keywords:
4+
- NOCSH
5+
ms.author: chrisda
6+
author: chrisda
7+
manager: deniseb
8+
audience: Admin
9+
ms.topic: overview
10+
ms.localizationpriority: medium
11+
search.appverid:
12+
- MET150
13+
- MOE150
14+
ms.collection:
15+
- m365-security
16+
- tier1
17+
description: Admins who aren't using Microsoft Defender for Office 365 can learn how to quickly set up protection in Microsoft Teams.
18+
ms.service: defender-office-365
19+
ms.date: 04/15/2025
20+
appliesto:
21+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
22+
---
23+
24+
# Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2
25+
26+
Even if you aren't using Microsoft Defender for Office 365 Plan 2 for email protection, you can still use it for Microsoft Teams protection.
27+
28+
This article contains the quick steps to turn on and configure Defender for Office 365 protection for Microsoft Teams.
29+
30+
## What do you need to know before you begin?
31+
32+
- You open the Microsoft Defender portal at <https://security.microsoft.com>.
33+
34+
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
35+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Core Security settings (manage)**.
36+
- [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) and [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
37+
- Membership in the **Organization Management** or **Security Administrator** role groups in Email & collaboration permissions <u>and</u> membership in the **Organization Management** role group in Exchange Online permissions.
38+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup> or **Security Administrator** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
39+
40+
> [!IMPORTANT]
41+
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
42+
43+
- Allow up to 30 minutes for a new or updated policy to be applied.
44+
45+
- For more information about licensing requirements, see [Licensing terms](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#licensing-terms).
46+
47+
- Teams integration deployment is part of the overall deployment process of Defender for Office 365. For more information, see [Pilot and deploy Defender for Office 365](/defender-xdr/pilot-deploy-defender-office-365?toc=%2Fdefender-office-365%2FTOC.json&bc=%2Fdefender-office-365%2Fbreadcrumb%2Ftoc.json).
48+
49+
## Step 1: Verify Safe Attachments integration for Microsoft Teams
50+
51+
For complete instructions, see [Turn on Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-configure.md).
52+
53+
1. In the Microsoft Defender portal, go to the **Safe Attachments** page at <https://security.microsoft.com/safeattachmentv2>.
54+
2. On the **Safe Attachments** page, select :::image type="icon" source="media/m365-cc-sc-gear-icon.png" border="false"::: **Global settings**.
55+
3. In the **Global settings** flyout that opens, go to the **Protect files in SharePoint, OneDrive, and Microsoft Teams** section to verify **Turn on Defender for Office 365 for SharePoint, OneDrive, and Microsoft Teams** is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
56+
57+
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
58+
59+
> [!TIP]
60+
>
61+
> - You can't restrict Safe Attachments for SharePoint, OneDrive, and Microsoft Teams to Microsoft Teams only.
62+
> - You can't scope Safe Attachments for SharePoint, OneDrive, and Microsoft Teams to specific users. It's on or off for everyone.
63+
64+
## Step 2: Verify Safe Links integration for Microsoft Teams
65+
66+
For complete instructions, see [Use the Microsoft Defender portal to modify custom Safe Links policies](safe-links-policies-configure.md#use-the-microsoft-defender-portal-to-modify-custom-safe-links-policies).
67+
68+
1. In the Microsoft Defender portal, go to the **Safe Links** page at <https://security.microsoft.com/safelinksv2>.
69+
2. On the **Safe Links** page, verify Teams integration is turned on in any custom policies (policies with a numerical **Priority** value) by doing the following steps:
70+
1. Select the policy by clicking anywhere in the row other than the check box next to the first column.
71+
2. In the **Teams** section of the **Protection settings** section in the details flyout that opens, verify the value is **On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten**.
72+
73+
If the value is **Off**, select **Edit protection settings** at the bottom of the **Protection settings** section. In the **URL & click protection settings** flyout that opens, select the check box in the **Teams** section, select **Save**, and then select **Close**.
74+
75+
Repeat these steps on every custom Safe Links policy.
76+
77+
> [!TIP]
78+
> Teams integration is on in the [Built-in protection preset security policy](preset-security-policies.md), but any other Safe Links policies [take precedence](preset-security-policies.md#order-of-precedence-for-preset-security-policies-and-other-policies) over the Built-in protection preset security policy (as shown in the order they're listed on the **Safe Links** page).
79+
80+
## Step 3: Configure Zero-hour auto purge (ZAP) for Microsoft Teams
81+
82+
For complete instructions, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
83+
84+
1. In the Microsoft Defender portal, go to the **Microsoft Teams protection** page at <https://security.microsoft.com/securitysettings/teamsProtectionPolicy>.
85+
86+
2. On the **Microsoft Teams protection** page, verify the toggle in the **Zero-hour auto purge (ZAP)** section is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
87+
88+
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
89+
90+
> [!TIP]
91+
> When ZAP for Microsoft Teams is turned on, you can use **Exclude these participants** on the **Microsoft Teams protection** page to exclude users from Teams protection. For more information, see [Configure ZAP for Teams protection in Defender for Office 365 Plan 2](mdo-support-teams-about.md#configure-zap-for-teams-protection-in-defender-for-office-365-plan-2).
92+
93+
## Step 4: Configure user reported settings for Microsoft Teams
94+
95+
For complete instructions, see [User reported message settings in Microsoft Teams](submissions-teams.md).
96+
97+
1. In the Teams admin center, go to the **Messaging policies** page at <https://admin.teams.microsoft.com/policies/messaging>.
98+
99+
2. On the **Manage policies** tab of the **Messaging policies** page, verify that the **Manage policies** tab is selected, and do either of the following actions to edit the appropriate policy (the **Global (Org-wide) default** policy for all users or a custom policy for specific users):
100+
- Select the link in the **Name** column.
101+
- Select the policy by clicking anywhere in the row other than the **Name** column, and then select :::image type="icon" source="media/m365-cc-sc-edit-icon.png" border="false"::: **Edit**.
102+
103+
3. In the policy details page that opens, find the **Report a security concern** toggle, and verify the value is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**.
104+
105+
If the value is :::image type="icon" source="media/scc-toggle-off.png" border="false"::: **Off**, move the toggle to :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **On**, and then select **Save**.
106+
107+
4. In the Microsoft Defender portal, go to the **User reported settings** page at <https://security.microsoft.com/securitysettings/userSubmission>.
108+
109+
5. On the **User reported settings** page, go to the **Microsoft Teams** section, and verify **Monitor reported messages in Microsoft Teams** is selected.
110+
111+
If it's not selected, select the check box, and then select **Save**.

0 commit comments

Comments
 (0)