Skip to content

Commit e4e23d7

Browse files
authored
Merge branch 'main' into patch-10
2 parents 8990718 + 54d9c04 commit e4e23d7

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 03/03/2025
11+
ms.date: 05/19/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,23 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## May 2025
43+
44+
- In government cloud environments, :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** replaces the **Message actions** drop down list on the **Email** tab (view) of the details area of the **All email**, **Malware**, or **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
45+
- SecOps personnel can now create tenant-level block entries on URLs and files via the [Tenant Allow/Block List](tenant-allow-block-list-about.md) directly from Threat Explorer.
46+
- For 100 or fewer messages selected in Threat Explorer, SecOps personnel can take multiple actions on the selected messages from the same page. For example:
47+
- Purge email messages or propose email remediation.
48+
- Submit messages to Microsoft.
49+
- Trigger investigations.
50+
- Crate block entries in the Tenant Allow/Block List.
51+
- Actions are contextually based on the latest delivery location of the message, but SecOps personnel can use the **Show all response actions** toggle to allow all available actions.
52+
- For 101 or more messages selected, only email purge and propose remediation options are available.
53+
54+
> [!TIP]
55+
> A new panel allows SecOps personnel to look for indicators of compromise at the tenant level, and the block action is readily available.
56+
57+
For more information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation) and [Remediate Malicious Email: Manual and automated remediation](remediate-malicious-email-delivered-office-365.md#manual-and-automated-remediation).
58+
4259
## March 2025
4360

4461
- **User reported messages by third-party add-ins can be sent to Microsoft for analysis**: In [user reported settings](submissions-user-reported-messages-custom-mailbox.md), admins can select **Monitor reported messages in Outlook** \> **Use a non-Microsoft add-in button**. In the **Reported message destination** section, select **Microsoft and my reporting mailbox**, and then provide the email address of the internal Exchange Online mailbox where user-reported messages by the third-party add-in are routed to. Microsoft analyzea these reported messages and provides result on the **User reported** tab of **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=user>.

0 commit comments

Comments
 (0)