Skip to content

Commit e8de5a8

Browse files
committed
EOP debrand
1 parent 8d4b01f commit e8de5a8

File tree

99 files changed

+562
-525
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

99 files changed

+562
-525
lines changed

defender-office-365/address-compromised-users-quickly.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.date: 06/09/2023
1717
description: Learn how to speed up the process of detecting and addressing compromised user accounts with automated investigation and response capabilities in Microsoft Defender for Office 365 Plan 2.
1818
ms.service: defender-office-365
1919
appliesto:
20-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
20+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2323
---

defender-office-365/advanced-delivery-policy-configure.md

Lines changed: 30 additions & 30 deletions
Large diffs are not rendered by default.

defender-office-365/anti-malware-policies-configure.md

Lines changed: 31 additions & 27 deletions
Large diffs are not rendered by default.

defender-office-365/anti-malware-protection-about.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Anti-malware protection
2+
title: Anti-malware protection for email In Microsoft 365
33
f1.keywords:
44
- NOCSH
55
ms.author: chrisda
@@ -14,33 +14,33 @@ ms.assetid: 0e39a0ce-ab8b-4820-8b5e-93fbe1cc11e8
1414
ms.collection:
1515
- m365-security
1616
- tier2
17-
description: Admins can learn about anti-malware protection and anti-malware policies that protect against viruses, spyware, and ransomware in Exchange Online Protection (EOP).
17+
description: Admins can learn about anti-malware email protection and anti-malware policies that protect against viruses, spyware, and ransomware in Microsoft 365.
1818
ms.custom: seo-marvel-apr2020
1919
ms.service: defender-office-365
2020
ms.date: 06/24/2025
2121
appliesto:
22-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
22+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2525
---
2626

27-
# Anti-malware protection in EOP
27+
# Anti-malware protection for email in Microsoft 365
2828

2929
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3030

31-
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, email messages are automatically protected against malware by EOP. Some of the major categories of malware are:
31+
In Microsoft 365 organizations with cloud mailboxes, anti-malware protection for email is on by default. Some of the major categories of malware are:
3232

3333
- **Viruses** that infect other programs and data, and spread through your computer or network looking for programs to infect.
3434
- **Spyware** that gathers your personal information, such as sign-in information and personal data, and sends it back to its author.
3535
- **Ransomware** that encrypts your data and demands payment to decrypt it. Anti-malware software doesn't help you decrypt encrypted files, but it can detect the malware payload that's associated with the ransomware.
3636

37-
EOP offers multi-layered malware protection that's designed to catch all known malware in Windows, Linux, and Mac that travels into or out of your organization. The following options help provide anti-malware protection:
37+
Anti-malware protection for email in Microsoft 365 is multi-layered and designed to catch all known malware that travels into or out of your organization. The following options help provide anti-malware protection:
3838

39-
- **Layered defenses against malware**: Anti-malware scans help protect against both known and unknown threats. Microsoft's anti-malware includes powerful heuristic detection that provides protection even during the early stages of a malware outbreak.
39+
- **Layered defenses against malware**: Anti-malware scans of email help protect against both known and unknown threats. Microsoft's anti-malware includes powerful heuristic detection that provides protection even during the early stages of a malware outbreak.
4040
- **Real-time threat response**: During some outbreaks, the anti-malware team might have enough information about a virus or other form of malware to write sophisticated policy rules that detect the threat, even before a definition is available. These rules are published to the global network every 2 hours to provide your organization with an extra layer of protection against attacks.
4141
- **Fast anti-malware definition deployment**: The anti-malware team can receive and integrate malware definitions and patches before they're publicly released.
4242

43-
In EOP, messages that are found to contain malware in _any_ attachments are quarantined<sup>\*</sup>. Whether the recipients can view or otherwise interact with the quarantined messages is controlled by _quarantine policies_. By default, messages that were quarantined due to malware can only be viewed and released by admins. Users can't release their own quarantined malware messages, regardless of any available settings that admins configure. For more information, see the following articles:
43+
Microsoft 365 quarantines messages when malware is found in _any_ attachment<sup>\*</sup>. Whether the recipients can view or otherwise interact with the quarantined messages is controlled by _quarantine policies_. By default, messages that were quarantined due to malware can only be viewed and released by admins. Users can't release their own quarantined malware messages, regardless of any available settings that admins configure. For more information, see the following articles:
4444

4545
<sup>\*</sup> Malware filtering is skipped on SecOps mailboxes that are identified in the advanced delivery policy. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](advanced-delivery-policy-configure.md).
4646

@@ -51,7 +51,7 @@ Anti-malware policies also contain a _common attachments filter_. Messages that
5151

5252
For more information about anti-malware protection, see the [Frequently asked questions: Anti-malware protection for email in Microsoft 365](anti-malware-protection-faq.yml).
5353

54-
To configure the default anti-malware policy, and to create, modify, and remove custom anti-malware policies, see [Configure anti-malware policies](anti-malware-policies-configure.md). In the Standard and Strict [preset security policies](preset-security-policies.md), the anti-malware policy settings are already configured and unmodifiable as described in [EOP anti-malware policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-malware-policy-settings).
54+
To configure the default anti-malware policy, and to create, modify, and remove custom anti-malware policies, see [Configure anti-malware policies](anti-malware-policies-configure.md). In the Standard and Strict [preset security policies](preset-security-policies.md), the anti-malware policy settings are already configured and unmodifiable as described in [Anti-malware policy settings](recommended-settings-for-eop-and-office365.md#anti-malware-policy-settings).
5555

5656
> [!TIP]
5757
> If you disagree with the malware verdict, you can report the message attachment to Microsoft as a false positive (good attachment marked as bad) or a false negative (bad attachment allowed). For more information, see [How do I report a suspicious email or file to Microsoft?](submissions-report-messages-files-to-microsoft.md).

defender-office-365/anti-malware-protection-faq.yml

Lines changed: 10 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,18 +18,18 @@ metadata:
1818
- tier2
1919
ms.custom:
2020
- seo-marvel-apr2020
21-
description: Admins can view frequently asked questions and answers about anti-malware protection in Exchange Online Protection (EOP).
21+
description: Admins can view frequently asked questions and answers about anti-malware protection for email in Microsoft 365.
2222
ms.service: defender-office-365
23-
title: Anti-malware protection FAQ
23+
title: Frequently asked questions - Anti-malware protection
2424
summary: |
2525
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2626
2727
**Applies to**
28-
- [Exchange Online Protection](eop-about.md)
28+
- [Default email protections in Microsoft 365](eop-about.md)
2929
- [Microsoft Defender for Office 365 Plan 1 and Plan 2](mdo-about.md#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet)
3030
- [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
3131
32-
This article provides frequently asked questions and answers about anti-malware protection for Microsoft 365 organizations with mailboxes in Exchange Online, or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes.
32+
This article provides frequently asked questions and answers about anti-malware protection for email in Microsoft 365 organizations with cloud mailboxes.
3333
3434
For questions and answers about the quarantine, see [Quarantine FAQ](quarantine-faq.yml).
3535
@@ -43,7 +43,7 @@ sections:
4343
- question: |
4444
What are best practice recommendations for configuring and using the service to combat malware?
4545
answer: |
46-
See [EOP anti-malware policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-malware-policy-settings).
46+
See [Anti-malware policy settings](recommended-settings-for-eop-and-office365.md#anti-malware-policy-settings).
4747
4848
- question: |
4949
How often are the malware definitions updated?
@@ -68,9 +68,7 @@ sections:
6868
- question: |
6969
Does the service scan internal messages for malware?
7070
answer: |
71-
For organizations with Exchange Online mailboxes, the service scans for malware in all inbound and outbound messages, including messages sent between internal recipients.
72-
73-
A standalone EOP subscription scans messages as they enter or leave the on-premises email organization. Messages sent between internal on-premises recipients aren't scanned for malware. However, you can use the built-in anti-malware scanning features of Exchange Server. For more information, see [Anti-malware protection in Exchange Server](/Exchange/antispam-and-antimalware/antimalware-protection/antimalware-protection).
71+
For Microsoft 365 organizations with cloud mailboxes, the service scans for malware in all inbound and outbound messages, including messages sent between internal recipients.
7472
7573
- question: |
7674
Is heuristic scanning enabled?
@@ -104,11 +102,9 @@ sections:
104102
- question: |
105103
How can I configure the service to block specific executable files (such as \*.exe) that I fear may contain malware?
106104
answer: |
107-
You can enable and configure the *common attachments filter* (also known as *common attachment blocking*) as described in [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies).
108-
109-
You can also create an Exchange mail flow rule (also known as transport rule) that blocks any email attachment that has executable content.
105+
You can configure the *common attachments filter* (also known as *common attachment blocking*) as described in [Common attachments filter in anti-malware policies](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies).
110106
111-
Follow the steps in [How to reduce malware threats through file attachment blocking in Exchange Online Protection](https://support.microsoft.com/help/2959596) to block the file types listed in [Supported file types for mail flow rule content inspection in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/inspect-message-attachments#supported-file-types-for-mail-flow-rule-content-inspection).
107+
You can also create an Exchange mail flow rule (also known as transport rule) that blocks any email attachment that has executable content. For instructions, see [Use mail flow rules to block messages with executable attachments in Exchange Online](/exchange/security-and-compliance/mail-flow-rules/use-rules-to-block-executable-attachments).
112108
113109
For increased protection, we also recommend using the **Any attachment file extension includes these words** condition in mail flow rules to block some or all of the following extensions: `ade, adp, ani, bas, bat, chm, cmd, com, cpl, crt, hlp, ht, hta, inf, ins, isp, job, js, jse, lnk, mda, mdb, mde, mdz, msc, msi, msp, mst, pcd, reg, scr, sct, shs, url, vb, vbe, vbs, wsc, wsf, wsh`.
114110
@@ -150,9 +146,9 @@ sections:
150146
Yes, the message trace tool enables you to follow email messages as they pass through the service. For more information about how to use the message trace tool to find out why a message was detected to contain malware, see [Message trace in the modern Exchange admin center](/exchange/monitoring/trace-an-email-message/message-trace-modern-eac).
151147
152148
- question: |
153-
Can I use a third-party anti-spam and anti-malware provider with Exchange Online?
149+
Can I use a non-Microsoft anti-spam and anti-malware provider with Exchange Online?
154150
answer: |
155-
Yes. In most cases, we recommend that you point your MX records to (that is, deliver email directly to) EOP. If you need to route your email somewhere else first, you need to enable [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so EOP can use the true message source in filtering decisions.
151+
Yes. Generally, we recommend that you point your MX records to (that is, deliver email directly to) Microsoft 365. If you need to route your email somewhere else first, you need to enable [Enhanced Filtering for Connectors](/exchange/mail-flow-best-practices/use-connectors-to-configure-mail-flow/enhanced-filtering-for-connectors) so Microsoft 365 can use the true message source in filtering decisions.
156152
157153
- question: |
158154
Are spam and malware messages being investigated as to who sent them, or being transferred to law enforcement entities?

defender-office-365/anti-malware-protection-for-spo-odfb-teams-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: seo-marvel-apr2020
2121
ms.service: defender-office-365
2222
ms.date: 06/17/2025
2323
appliesto:
24-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
24+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2626

2727
---

defender-office-365/anti-phishing-from-email-address-validation.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How EOP validates the From address to prevent phishing
2+
title: How Microsoft 365 validates the From address to prevent phishing
33
f1.keywords:
44
- NOCSH
55
ms.author: chrisda
@@ -15,21 +15,21 @@ ms.assetid: eef8408b-54d3-4d7d-9cf7-ad2af10b2e0e
1515
ms.collection:
1616
- m365-security
1717
- tier2
18-
description: Admins can learn how Exchange Online Protection (EOP) and Outlook.com enforce email address syntax to help prevent phishing.
18+
description: Admins can learn how Microsoft 365 enforces email address syntax to help prevent phishing.
1919
ms.custom: seo-marvel-apr2020
2020
ms.service: defender-office-365
2121
ms.date: 3/28/2024
2222
appliesto:
23-
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
23+
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections in Microsoft 365</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
2626
---
2727

28-
# How EOP validates the From address to prevent phishing
28+
# How Microsoft 365 validates the From address to prevent phishing
2929

3030
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3131

32-
Phishing attacks are a constant threat to any email organization. In addition to using [spoofed (forged) sender email addresses](anti-phishing-protection-spoofing-about.md), attackers often use values in the From address that violate internet standards. To help prevent this type of phishing, Exchange Online Protection (EOP) and Outlook.com require inbound messages to include an RFC-compliant From address as described in this article.
32+
Phishing attacks are a constant threat to any email organization. In addition to using [spoofed (forged) sender email addresses](anti-phishing-protection-spoofing-about.md), attackers often use values in the From address that violate internet standards. To help prevent this type of phishing, Microsoft 365 requiref inbound messages to include an RFC-compliant From address as described in this article.
3333

3434
- If you regularly receive email from organizations that have malformed From addresses as described in this article, encourage these organizations to update their email servers to comply with modern security standards.
3535

0 commit comments

Comments
 (0)