Skip to content

Commit ff1ff06

Browse files
authored
Merge pull request #3520 from MicrosoftDocs/chrisda
Update try-microsoft-defender-for-office-365.md
2 parents b405500 + 84c1c73 commit ff1ff06

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

defender-office-365/try-microsoft-defender-for-office-365.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
ms.custom:
1919
ms.service: defender-office-365
2020
ROBOTS:
21-
ms.date: 01/29/2025
21+
ms.date: 04/18/2025
2222
---
2323

2424
# Try Microsoft Defender for Office 365
@@ -27,7 +27,7 @@ As an existing Microsoft 365 customer, the **Trials** and **Evaluation** pages i
2727

2828
Before you try Defender for Office 365 Plan 2, there are some key questions that you need to ask yourself:
2929

30-
- Do I want to passively observe what Defender for Office 365 Plan 2 can do for me (*audit*), or do I want Defender for Office 365 Plan 2 to take direct action on issues that it finds (*block*)?
30+
- Do I want to passively observe what Defender for Office 365 Plan 2 can do for me (_audit_), or do I want Defender for Office 365 Plan 2 to take direct action on issues that it finds (_block_)?
3131
- Either way, how can I tell what Defender for Office 365 Plan 2 is doing for me?
3232
- How long do I have before I need to make the decision to keep Defender for Office 365 Plan 2?
3333

@@ -78,7 +78,13 @@ The default policies for these EOP features are always on, apply to all recipien
7878

7979
Do you want your Defender for Office 365 experience to be active or passive? The following modes are available:
8080

81-
- **Audit mode**: Special _evaluation policies_ are created for anti-phishing (which includes impersonation protection), Safe Attachments, and Safe Links. These evaluation policies are configured to _detect_ threats only. Defender for Office 365 detects harmful messages for reporting, but the messages aren't acted upon (for example, detected messages aren't quarantined). The settings of these evaluation policies are described in the [Policies in audit mode](#policies-in-audit-mode) section later in this article. We also automatically turn on SafeLinks time of click protection in audit mode for non-email workloads (for example, Microsoft Teams, SharePoint, and OneDrive for Business)
81+
- **Audit mode**: Special _evaluation policies_ are created for anti-phishing (which includes impersonation protection), Safe Attachments, and Safe Links. These evaluation policies are configured to _detect_ threats only. Defender for Office 365 detects harmful messages for reporting, but the messages aren't acted upon (for example, detected messages aren't quarantined). The settings of these evaluation policies are described in the [Policies in audit mode](#policies-in-audit-mode) section later in this article.
82+
83+
> [!NOTE]
84+
> The following protection features are **on by default** and can **take action** on items, even in audit mode:
85+
>
86+
> - Safe Links time of click protection in non-email workloads (for example, Microsoft Teams, SharePoint, and OneDrive).
87+
> - [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
8288
8389
You can also selectively turn on or turn off anti-phishing protection (spoofing and impersonation), Safe Links protection, and Safe Attachments protection. For instructions, see [Manage evaluation settings](#manage-evaluation-settings).
8490

@@ -99,7 +105,7 @@ The key factors that determine which modes are available to you are:
99105

100106
:::image type="content" source="media/mdo-trial-mail-flow.png" alt-text="Mail flows from the internet into Microsoft 365, with protection from EOP and/or Defender for Office 365 Plan 1." lightbox="media/mdo-trial-mail-flow.png":::
101107

102-
In these environments, **audit mode** or **blocking mode** are available, depending on your licensing as explained in the next section
108+
In these environments, **audit mode** or **blocking mode** are available, depending on your licensing as explained in the next section.
103109

104110
- You're currently using a third-party service or device for email protection of your Microsoft 365 mailboxes. Mail from the internet flows through the protection service before delivery into your Microsoft 365 organization. Microsoft 365 protection is as low as possible (it's never completely off; for example, malware protection is always enforced).
105111

@@ -476,7 +482,7 @@ A: See [Order of precedence for preset security policies and other policies](pre
476482
To see these policies and their settings, run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
477483

478484
```powershell
479-
Write-Output -InputObject ("`r`n"*3),"Evaluation anti-phishing policy",("-"*79);Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Attachments policy",("-"*79);Get-SafeAttachmentPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Links policy",("-"*79);Get-SafeLinksPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"
485+
Write-Output -InputObject ("`r`n"*3),"Evaluation anti-phishing policy",("-"*79); Get-AntiPhishPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Attachments policy",("-"*79); Get-SafeAttachmentPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"; Write-Output -InputObject ("`r`n"*3),"Evaluation Safe Links policy",("-"*79);Get-SafeLinksPolicy | Where-Object -Property RecommendedPolicyType -eq -Value "Evaluation"
480486
```
481487

482488
The settings are also described in the following tables.

0 commit comments

Comments
 (0)