‘Replace’ Policy Action in Safe Attachments Retiring – Microsoft Defender for Office 365

If you’re like me you enjoy the rich set of features included in Microsoft Defender for Office 365 including the Safe Links and Safe Attachments capabilities. Microsoft has announced a change to retire the ‘replace’ action in Safe Attachment policies and that is today’s #MicrosoftCloudQuickFix !

Safe Attachments in Microsoft Defender for Office 365 provides an additional layer of protection for email attachments that have already been scanned by anti-malware protection in Exchange Online Protection (EOP). Specifically, Safe Attachments uses a virtual environment to check attachments in email messages before they’re delivered thru a process know as detonation.

Safe Attachments protection is controlled by Safe Attachment policies configured in the Microsoft 365 Defender portal. In Safe Attachment policies one of the actions which can be applied to a message is the ‘Replace’ action which delivers only the message body to the recipient without the original attachments when it has been found to contain malware.

Beginning in September 2022 the ‘Replace’ action will be retired and no longer available for use in Safe Attachment policies. The first phase of the retirement will automatically apply the ‘Block’ action, which will quarantine the email, to any existing policies with the ‘Replace’ action specified.

The second phase of the retirement targeted to complete by late-October 2022 will remove the ‘Replace’ action altogether from the Microsoft Defender portal and any existing policies with it will be changed to use the ‘Block’ action.

There will not be a similar action to ‘Replace’ post retirement and we recommend that you review and update all applicable Safe Attachments policies in your tenant beforehand.

For more information on Safe Attachment policy settings in Microsoft Defender for Office 365 please see Safe Attachments – Office 365 | Microsoft Docs

#Microsoft #Microsoft365 #MicrosoftDefenderforOffice365 #MicrosoftCloudSecurity #MicrosoftCloudQuickFix

Advanced Threat Protection (ATP) Safe Links in Teams

Today’s #MicrosoftCloudQuickFix is that #Microsoft has completed the rollout of Advanced Threat Protection Safe Links in #MicrosoftTeams to production and government #Microsoft365 tenants!

With this update, Microsoft brings the premium security of Window Defender for Office 365 Safe Links into #MicrosoftTeams clients!

ATP Safe Links for Teams checks that the links people click on in Teams are safe the moment that an end user clicks the link. If the link is flagged as malicious, ATP Safe Links will show a block page. All links throughout Teams including in chats, channels, and tabs are protected.

thumbnail image 1 captioned Figure 1: Safe Links prevents users from accessing malicious sites

To enable ATP Safe Links to protect users in Microsoft Teams, create or modify a Safe Links policy in the Microsoft 365 Defender Portal under Threat Policies then Safe Links.

Check out this Microsoft Docs page for more details on Safe Links in Microsoft Defender for Office 365!

#MicrosoftCloudQuickFix #Microsoft365 #MicrosoftDefender #MicrosoftTeams

Expanded user impersonation to 350 protected users with anti-phishing policy

#Microsoft is increasing the number of protected users you can secure in #ExchangeOnline with #MicrosoftDefenderforOffice365 anti-phishing policies. This is today’s #MicrosoftCloudQuickFix !

Available by the end of the first week of June 2021 within Anti-Phishing policy, in the Users to protect section, you will be able to specify up to 350 users (per policy) up from 60 users.

This means you will be able to specify more users to be protected. This user impersonation protection continues to prevent the specified users from being impersonated as message senders. This is a must-have for key personnel in your organization from Board Members to Executives/C-Suite to your Finance staff and protects against impersonation attacks that are designed to trick key users such as finance, executive assistants, and HR into making wire transfers or providing other monetizable information to cybercriminals.

Check out this Microsoft Docs page for more details on how to configure Impersonation settings in anti-phishing policies.