Skip to content

Commit f1deb05

Browse files
authored
Merge pull request #1557 from MicrosoftDocs/main
MicrosoftDocs/memdocs-pr#16314
2 parents 1de9970 + 51347ea commit f1deb05

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 10/08/2024
11+
ms.date: 10/09/2024
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -48,6 +48,7 @@ For more information on what's new with other Microsoft Defender security produc
4848
- With one click, SecOps personnel can take a quarantine release action directly from Explorer (Threat Explorer) or the Email entity page (no need to go to the Quarantine page in the Defender portal). For more information, see [Remediate malicious email delivered in Office 365](remediate-malicious-email-delivered-office-365.md).
4949
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Mac v16.89 (24090815) or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
5050
- We're updating the end user experience for allow and block list management of their email messages. With one click, users can block email from unwanted senders and prevent those messages from appearing in their default quarantine view and in quarantine notifications. Users can also allow email from trusted and prevent future messages from those senders from being quarantined (if there are no admin overrides). Users also have visibility into any admin overrides that led to a quarantined email message. For more information, see [View quarantined email](quarantine-admin-manage-messages-files.md#view-quarantined-email).
51+
- Admins can see [policy](anti-spam-policies-configure.md#use-the-microsoft-defender-portal-to-modify-anti-spam-policies) what-if insights for the bulk complaint level (BCL) threshold, spoof, and impersonation settings, which lets them understand the implication of a setting change based on historical data. This capability lets admins confidently tune their settings without anxiety about possible repurcussions on users.
5152

5253
## August 2024
5354

defender-office-365/tenant-allow-block-list-urls-configure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier1
1616
description: Admins can learn how to allow or block URLs in the Tenant Allow/Block List.
1717
ms.service: defender-office-365
18-
ms.date: 07/18/2024
18+
ms.date: 10/09/2024
1919
appliesto:
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -347,6 +347,7 @@ Valid URL entries and their results are described in the following subsections.
347347
- **Allow not matched**:
348348
- abc-contoso.com
349349
- contoso.com/a
350+
- abc.xyz.contoso.com/a/b/c
350351
- payroll.contoso.com
351352
- test.com/contoso.com
352353
- test.com/q=contoso.com
@@ -356,6 +357,7 @@ Valid URL entries and their results are described in the following subsections.
356357
- **Block match**:
357358
- contoso.com
358359
- contoso.com/a
360+
- abc.xyz.contoso.com/a/b/c
359361
- payroll.contoso.com
360362
- test.com/contoso.com
361363
- test.com/q=contoso.com

0 commit comments

Comments
 (0)