Skip to content

Commit ce593b6

Browse files
Merge pull request #4173 from MicrosoftDocs/main
[AutoPublish] main to live - 06/09 19:57 PDT | 06/10 08:27 IST
2 parents b2de30a + 02038cf commit ce593b6

18 files changed

+45
-45
lines changed

defender-office-365/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@
145145
href: anti-malware-protection-faq.yml
146146
- name: Zero-hour auto purge (ZAP)
147147
href: zero-hour-auto-purge.md
148-
- name: Virus detection in SharePoint Online
148+
- name: Virus detection in SharePoint
149149
href: anti-malware-protection-for-spo-odfb-teams-about.md
150150
- name: Anti-spam in EOP
151151
items:
@@ -538,7 +538,7 @@
538538
href: step-by-step-guides/connect-microsoft-defender-for-office-365-to-microsoft-sentinel.md
539539
- name: How to enable DMARC Reporting for Microsoft Online Email Routing Address (MOERA) and parked Domains
540540
href: step-by-step-guides/how-to-enable-dmarc-reporting-for-microsoft-online-email-routing-address-moera-and-parked-domains.md
541-
- name: Use Microsoft Defender for Office 365 in SharePoint Online
541+
- name: Use Microsoft Defender for Office 365 in SharePoint
542542
href: step-by-step-guides/utilize-microsoft-defender-for-office-365-in-sharepoint-online.md
543543
- name: Tune bulk email filtering
544544
href: step-by-step-guides/tune-bulk-mail-filtering-walkthrough.md

defender-office-365/anti-malware-protection-for-spo-odfb-teams-about.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams
2+
title: Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams
33
f1.keywords:
44
- NOCSH
55
ms.author: chrisda
@@ -16,7 +16,7 @@ ms.assetid: e3c6df61-8513-499d-ad8e-8a91770bff63
1616
ms.collection:
1717
- m365-security
1818
- tier2
19-
description: Learn about how SharePoint Online detects viruses in files that users upload and prevents users from downloading or syncing the files.
19+
description: Learn about how SharePoint detects viruses in files that users upload and prevents users from downloading or syncing the files.
2020
ms.custom: seo-marvel-apr2020
2121
ms.service: defender-office-365
2222
ms.date: 06/09/2023
@@ -25,31 +25,31 @@ appliesto:
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2626
---
2727

28-
# Built-in virus protection in SharePoint Online, OneDrive, and Microsoft Teams
28+
# Built-in virus protection in SharePoint, OneDrive, and Microsoft Teams
2929

3030
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3131

32-
Microsoft 365 uses a common virus detection engine for scanning files that users upload to SharePoint Online, OneDrive, and Microsoft Teams. This protection is included with all subscriptions that include SharePoint Online, OneDrive, and Microsoft Teams.
32+
Microsoft 365 uses a common virus detection engine for scanning files that users upload to SharePoint, OneDrive, and Microsoft Teams. This protection is included with all subscriptions that include SharePoint, OneDrive, and Microsoft Teams.
3333

3434
> [!IMPORTANT]
3535
> The built-in anti-virus capabilities are a way to help contain viruses. They aren't intended as a single point of defense against malware for your environment. We encourage all customers to investigate and implement anti-malware protection at various layers and apply best practices for securing their enterprise infrastructure.
3636
37-
## What happens if an infected file is uploaded to SharePoint Online?
37+
## What happens if an infected file is uploaded to SharePoint?
3838

3939
The Microsoft 365 virus detection engine scans files asynchronously (at some time after upload). If a user tries to download a file in a web browser or from Teams that hasn't been scanned, a scan is triggered before the download is allowed. **All file types are not automatically scanned**. Heuristics determine the files to scan. When a file is found to contain a virus, the file is flagged.
4040

4141
Here's what happens:
4242

43-
1. A user uploads a file to SharePoint Online.
44-
2. SharePoint Online, as part of its virus scanning processes, later determines if the file meets the criteria for a scan.
43+
1. A user uploads a file to SharePoint.
44+
2. SharePoint, as part of its virus scanning processes, later determines if the file meets the criteria for a scan.
4545
3. If the file meets the criteria for a scan, the virus detection engine scans the file.
4646
4. If a virus is found within the scanned file, the virus engine sets a property on the file that indicates the file is infected.
4747

4848
## What happens when a user tries to download an infected file by using the browser?
4949

50-
By default, users can download infected files from SharePoint Online. Here's what happens:
50+
By default, users can download infected files from SharePoint. Here's what happens:
5151

52-
1. In a web browser, a user tries to download a file from SharePoint Online that happens to be infected.
52+
1. In a web browser, a user tries to download a file from SharePoint that happens to be infected.
5353
2. The user is shown a warning that a virus was detected in the file. The user is given the option to proceed with the download and attempt to clean it using anti-virus software on their device.
5454

5555
To change this behavior so users can't download infected files, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.

defender-office-365/app-guard-for-office-install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ Application Guard for Office is integrated with Microsoft Defender for Endpoint
190190
191191
- Active content like macros and ActiveX controls are disabled in Application Guard for Office. To enable active content, the Application Guard protection must be removed.
192192

193-
- Untrusted files from network shares or files shared from OneDrive, OneDrive for Business, or SharePoint Online open as read-only in Application Guard. Users can save a local copy of such files to continue working in the container or remove protection to directly work with the original file.
193+
- Untrusted files from network shares or files shared from OneDrive or SharePoint open as read-only in Application Guard. Users can save a local copy of such files to continue working in the container or remove protection to directly work with the original file.
194194

195195
- Files that are protected by Information Rights Management (IRM) are blocked by default. If users want to open such files in Protected View, an administrator must configure policy settings for unsupported file types for the organization.
196196

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ The following social engineering techniques are available:
109109

110110
- **Link in Attachment**: This technique is a hybrid of a credential harvest. An attacker sends the recipient a message that contains a link inside of an attachment. When the recipient opens the attachment and clicks on the link, they're taken to a website that typically shows a dialog box that asks the user for their username and password. Typically, the destination page is themed to represent a well-known website in order to build trust in the user.
111111

112-
- **Link to Malware**<sup>\*</sup>: An attacker sends the recipient a message that contains a link to an attachment on a well-known file sharing site (for example, SharePoint Online or Dropbox). When the recipient clicks on the link, the attachment opens, and arbitrary code (for example, a macro) runs on the user's device to help the attacker install additional code or further entrench themselves.
112+
- **Link to Malware**<sup>\*</sup>: An attacker sends the recipient a message that contains a link to an attachment on a well-known file sharing site (for example, SharePoint or Dropbox). When the recipient clicks on the link, the attachment opens, and arbitrary code (for example, a macro) runs on the user's device to help the attacker install additional code or further entrench themselves.
113113

114114
- **Drive-by-url**<sup>\*</sup>: An attacker sends the recipient a message that contains a link. When the recipient clicks on the link, they're taken to a website that tries to run background code. This background code attempts to gather information about the recipient or deploy arbitrary code on their device. Typically, the destination website is a well-known website that has been compromised or a clone of a well-known website. Familiarity with the website helps convince the user that the link is safe to click. This technique is also known as a _watering hole attack_.
115115

defender-office-365/mdo-deployment-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ But, the intent of this step is to configure other admins to help you manage the
236236

237237
When it comes to assigning permissions for tasks in EOP and Defender for Office 365, the following options are available:
238238

239-
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): These permissions apply to all workloads in Microsoft 365 (Exchange Online, SharePoint Online, Microsoft Teams, etc.).
239+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): These permissions apply to all workloads in Microsoft 365 (Exchange Online, SharePoint, Microsoft Teams, etc.).
240240
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Most tasks in EOP and Defender for Office 365 are available using Exchange Online permissions. Assigning permissions only in Exchange Online prevents administrative access in other Microsoft 365 workloads.
241241
- [Email & collaboration permissions in the Microsoft Defender portal](scc-permissions.md): Administration of some security features in EOP and Defender for Office 365 is available with Email & collaboration permissions. For example:
242242
- [Configuration analyzer](configuration-analyzer-for-security-policies.md)

defender-office-365/office-365-ti.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ appliesto:
3131
Threat investigation and response capabilities in [Microsoft Defender for Office 365](mdo-about.md) help security analysts and administrators protect their organization's Microsoft 365 for business users by:
3232

3333
- Making it easy to identify, monitor, and understand cyberattacks.
34-
- Helping to quickly address threats in Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams.
34+
- Helping to quickly address threats in Exchange Online, SharePoint, OneDrive and Microsoft Teams.
3535
- Providing insights and knowledge to help security operations prevent cyberattacks against their organization.
3636
- Employing [automated investigation and response in Office 365](air-about.md) for critical email-based threats.
3737

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
ms.custom:
1818
- seo-marvel-apr2020
19-
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
19+
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint, OneDrive, and Microsoft Teams.
2020
ms.service: defender-office-365
2121
ms.date: 05/21/2025
2222
appliesto:
@@ -616,7 +616,7 @@ In the details flyout that opens, the following information is available:
616616

617617
- **File details** section:
618618
- **File Name**
619-
- **File URL**: URL that defines the location of the file (for example, in SharePoint Online).
619+
- **File URL**: URL that defines the location of the file (for example, in SharePoint).
620620
- **Malicious content detected on** The date/time the file was quarantined.
621621
- **Expires**: The date when the file will be deleted from quarantine.
622622
- **Detected by**

defender-office-365/safe-attachments-for-spo-odfb-teams-about.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ ms.collection:
1919
ms.custom:
2020
- seo-marvel-apr2020
2121
- seo-marvel-jun2020
22-
description: Learn about Microsoft Defender for Office 365 for files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
22+
description: Learn about Microsoft Defender for Office 365 for files in SharePoint, OneDrive, and Microsoft Teams.
2323
ms.service: defender-office-365
24-
ms.date: 6/19/2023
24+
ms.date: 06/09/2025
2525
appliesto:
2626
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2727
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -39,21 +39,21 @@ Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled by def
3939

4040
When Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled and identifies a file as malicious, the file is locked using direct integration with the file stores. The following image shows an example of a malicious file detected in a library.
4141

42-
:::image type="content" source="media/2bba71cc-7ad1-4799-8b9d-d56f923db3a7.png" alt-text="The files in OneDrive for Business with one detected as malicious" lightbox="media/2bba71cc-7ad1-4799-8b9d-d56f923db3a7.png":::
42+
:::image type="content" source="media/2bba71cc-7ad1-4799-8b9d-d56f923db3a7.png" alt-text="Screenshot of files in OneDrive with one file detected as malicious." lightbox="media/2bba71cc-7ad1-4799-8b9d-d56f923db3a7.png":::
4343

4444
Although the blocked file is still listed in the document library and in web, mobile, or desktop applications, people can't open, copy, move, or share the file. But, they can delete the blocked file.
4545

4646
Here's an example of what a blocked file looks like on a mobile device:
4747

48-
:::image type="content" source="media/cb1c1705-fd0a-45b8-9a26-c22503011d54.png" alt-text="The option to delete a blocked file from OneDrive for Business from the OneDrive mobile app" lightbox="media/cb1c1705-fd0a-45b8-9a26-c22503011d54.png":::
48+
:::image type="content" source="media/cb1c1705-fd0a-45b8-9a26-c22503011d54.png" alt-text="Screenshot of the option to delete a blocked file from OneDrive in the OneDrive mobile app." lightbox="media/cb1c1705-fd0a-45b8-9a26-c22503011d54.png":::
4949

5050
By default, people can download a blocked file. Here's what downloading a blocked file looks like on a mobile device:
5151

52-
:::image type="content" source="media/be288a82-bdd8-4371-93d8-1783db3b61bc.png" alt-text="The option to download a blocked file in OneDrive for Business" lightbox="media/be288a82-bdd8-4371-93d8-1783db3b61bc.png":::
52+
:::image type="content" source="media/be288a82-bdd8-4371-93d8-1783db3b61bc.png" alt-text="Screenshot of the option to download a blocked file in OneDrive." lightbox="media/be288a82-bdd8-4371-93d8-1783db3b61bc.png":::
5353

54-
SharePoint Online admins can prevent people from downloading malicious files. For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
54+
SharePoint admins can prevent people from downloading malicious files. For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
5555

56-
To learn more about the user experience when a file has been detected as malicious, see [What to do when a malicious file is found in SharePoint Online, OneDrive, or Microsoft Teams](https://support.microsoft.com/office/01e902ad-a903-4e0f-b093-1e1ac0c37ad2).
56+
To learn more about the user experience when a file has been detected as malicious, see [What to do when a malicious file is found in SharePoint, OneDrive, or Microsoft Teams](https://support.microsoft.com/office/01e902ad-a903-4e0f-b093-1e1ac0c37ad2).
5757

5858
## View information about malicious files detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams
5959

@@ -63,7 +63,7 @@ When a file is identified as malicious by Safe Attachments for SharePoint, OneDr
6363

6464
## Keep these points in mind
6565

66-
- Defender for Office 365 doesn't scan every single file in SharePoint Online, OneDrive for Business, or Microsoft Teams. This behavior is by design. Files are scanned asynchronously. The process uses sharing and guest activity events along with smart heuristics and threat signals to identify malicious files.
66+
- Defender for Office 365 doesn't scan every single file in SharePoint, OneDrive, or Microsoft Teams. This behavior is by design. Files are scanned asynchronously. The process uses sharing and guest activity events along with smart heuristics and threat signals to identify malicious files.
6767

6868
- Make sure your SharePoint sites are configured to use the [Modern experience](/sharepoint/guide-to-sharepoint-modern-experience). Visual indicators that a file is blocked are available only in the Modern experience.
6969

defender-office-365/safe-attachments-for-spo-odfb-teams-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ You can create an alert policy that notifies admins when Safe Attachments for Sh
107107

108108
3. On the **Name your alert, categorize it, and choose a severity** page, configure the following settings:
109109
- **Name**: Type a unique and descriptive name. For example, **Malicious Files in Libraries**.
110-
- **Description**: Type an optional description. For example, **Notifies admins when malicious files are detected in SharePoint Online, OneDrive, or Microsoft Teams**.
110+
- **Description**: Type an optional description. For example, **Notifies admins when malicious files are detected in SharePoint, OneDrive, or Microsoft Teams**.
111111
- **Severity**: Select **Low**, **Medium**, or **High** from the dropdown list.
112112
- **Category**: Select **Threat management** from the dropdown list.
113113

@@ -142,7 +142,7 @@ You can create an alert policy that notifies admins when Safe Attachments for Sh
142142
If you'd rather use PowerShell to create the same alert policy as described in the previous section, [connect to Security & Compliance PowerShell](/powershell/exchange/connect-to-scc-powershell) and run the following command:
143143

144144
```powershell
145-
New-ActivityAlert -Name "Malicious Files in Libraries" -Description "Notifies admins when malicious files are detected in SharePoint Online, OneDrive, or Microsoft Teams" -Category ThreatManagement -Operation FileMalwareDetected -NotifyUser "[email protected]","[email protected]"
145+
New-ActivityAlert -Name "Malicious Files in Libraries" -Description "Notifies admins when malicious files are detected in SharePoint, OneDrive, or Microsoft Teams" -Category ThreatManagement -Operation FileMalwareDetected -NotifyUser "[email protected]","[email protected]"
146146
```
147147

148148
**Note**: The default _Severity_ value is Low. To specify Medium or High, include the _Severity_ parameter and value in the command.

0 commit comments

Comments
 (0)