Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Microsoft Defender for Office 365 helps deal with undetected malicious email delivered to recipients (known as false negatives) that put your organizational productivity at risk.
Defender for Office 365 can help admins understand why malicious emails were delivered, how to quickly resolve the issue, and how to prevent similar issues from happening in the future.
What you need
- Microsoft Defender for Office 365 Plan 1 or Plan 2. Microsoft 365 A5/E5/G5 includes Plan 2.
- Sufficient permissions. For example, membership in the Security Administrator role in Microsoft Entra ID.
- 5-10 minutes to perform the following steps.
Handling malicious emails in the Inbox folder of end users
- Ask end users to report the email as Phishing or Junk using the built-in Report button in supported versions of Outlook.
- End users can also add senders to their Blocked Senders List in Outlook to prevent emails from this sender from being delivered to their inbox.
- Admins can triage the user reported messages from User reported tab on the Submissions page.
- From those reported messages, admins can submit to Microsoft for analysis to learn why that email was allowed in the first place.
- If needed, while submitting to Microsoft for analysis, admins can create a block entry for the sender to mitigate the problem.
- Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your organization setup could be improved to prevent similar issues from happening in the future.
Handling malicious emails in junk folder of end users
- Ask end users to report the email as phishing using the built-in Report button in supported versions of Outlook.
- Admins can triage the user reported messages from the User reported tab on the Submissions page.
- From those reported messages admins can submit to Microsoft for analysis and learn why that email was allowed in the first place.
- If needed, while submitting to Microsoft for analysis, admins can create a block entry for the sender to mitigate the problem.
- Once the results for submissions are available, read the verdict to understand why emails were allowed, and how your organization setup could be improved to prevent similar issues from happening in the future.
Handling malicious emails landing in the quarantine folder of end users
- End users receive an email digest about quarantined messages as per the settings enabled by admins.
- End users can preview the messages in quarantine, block the sender, and submit those messages to Microsoft for analysis.
Handling malicious emails landing in the quarantine folder of admins
- Admins can view the quarantined emails (including the ones asking permission to request release) from the review page.
- Admins can submit any malicious, or suspicious messages to Microsoft for analysis, and create a block to mitigate the issue while waiting for a verdict.
- Once the results for submissions are available, read the verdict to learn why the emails were allowed, and how your organization setup could be improved to prevent similar issues from happening in the future.