You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -587,7 +587,8 @@ For detailed syntax and parameter information, see [Get-QuarantinePolicy](/power
587
587
588
588
## Modify quarantine policies in the Microsoft Defender portal
589
589
590
-
You can't modify the default quarantine policies named AdminOnlyAccessPolicy, DefaultFullAccessPolicy, or DefaultFullAccessWithNotificationPolicy.
590
+
> [!NOTE]
591
+
> Permissions and notification settings in default quarantine policies are read only (aren't modifiable).
591
592
592
593
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat policies**\>**Quarantine policies** in the **Rules** section. Or, to go directly to the **Quarantine policies** page, use <https://security.microsoft.com/quarantinePolicies>.
593
594
@@ -675,6 +676,9 @@ Quarantine policies also control whether users receive _quarantine notifications
675
676
- Inform the user that the message is in quarantine.
676
677
- Allow users to view and take action on the quarantined message from the quarantine notification. Permissions control what the user can do in the quarantine notification as described in the [Quarantine policy permission details](#quarantine-policy-permission-details) section.
677
678
679
+
> [!NOTE]
680
+
> Permissions and notification settings in default quarantine policies are read only (aren't modifiable).
681
+
678
682
The relationship between permissions, permissions groups, and the default quarantine policies are described in the following tables:
679
683
680
684
|Permission|No access|Limited access|Full access|
@@ -745,14 +749,12 @@ The effect of **No access** permissions (admin only access) on user capabilities
745
749
-**Quarantine notifications turned on**:
746
750
-**On the Quarantine page**: Quarantined messages are visible to users, but the only available action is :::image type="icon" source="media/m365-cc-sc-view-message-headers-icon.png" border="false"::: [View message headers](quarantine-end-user.md#view-email-message-headers).
747
751
-**In quarantine notifications**: Users receive quarantine notifications, but the only available action is **Review message**.
748
-
> **Note:**
749
-
> 💡 The **default `AdminOnlyAccessPolicy`** is **immutable** and **always has notifications disabled**.
750
-
> To enable notifications while maintaining restricted access:
751
-
> -**Create a custom quarantine policy**
752
-
> - Set **Access: No access**
753
-
> - Configure **notifications** as needed
754
-
755
-
<!-- You may need to use a plugin or CSS styling in your Markdown tool to display this in pink -->
752
+
753
+
> [!TIP]
754
+
> To enable quarantine notifications while maintaining restricted access, [create a custom quarantine policy](#step-1-create-quarantine-policies-in-the-microsoft-defender-portal) with the following settings:
755
+
>
756
+
> -**Recipient message access** page: Select **Set specific access (Advanced)**, but leave **Select release action preference** and **Select additional actions recipients can take on quarantined messages** blank/unselected (equivalent to the value 0 for the _EndUserQuarantinePermissionsValue_ parameter on the **New-QuarantinePolicy** cmdlet [in Powershell](#create-quarantine-policies-in-powershell)).
757
+
> -**Quarantine notification** page: Select **Enable** and then select **Don't include quarantined messages from blocked sender addresses** (default) or **Include quarantined messages from blocked sender addresses**.
0 commit comments