check before: 2022-04-23
Product:
Defender, Defender for Office 365, Microsoft 365 Defender
Platform:
Web, World tenant
Status:
Launched
Change type:
Admin impact, Feature update, Updated message
Links:
Details:
Updated May 17, 2022: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert.
The URL verdict changes to bad after the user has already clicked it.
A user clicks through (overrides the warning page) for a known, bad URL.
As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios.
The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario.
A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same.
This message is associated with Microsoft 365 Roadmap ID 93211.
[When this will happen:]
We expect this rollout to begin in early June (previously mid-May) and expect the rollout to be completed by late July (previously late June).
Change Category:
XXXXXXX ...
Scope:
XXXXXXX ...
Release Phase:
General Availability
Created:
2022-04-09
updated:
2022-08-27
the free basic plan is required to see all details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
changes*
Date | Property | old | new |
2022-08-27 | MC prepare | If you’re exporting these alerts to external systems for processing (via APIs), you will also need to set up the export of the new policy.
https://www.microsoft.com/en-ww/microsoft-365/roadmap?filters=&searchterms=93211 | If you’re exporting these alerts to external systems for processing (via APIs), you will also need to set up the export of the new policy.
ps://www.microsoft.com/en-ww/microsoft-365/roadmap?filters=&searchterms=932 |
2022-05-18 | MC Messages | Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert.
The URL verdict changes to bad after the user has already clicked it. A user clicks through (overrides the warning page) for a known, bad URL. As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios. The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario. A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same. This message is associated with Microsoft 365 Roadmap ID 93211. [When this will happen:] We expect this rollout to begin in mid-May and expect the rollout to be completed by late June. | Updated May 17, 2022: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert. The URL verdict changes to bad after the user has already clicked it. A user clicks through (overrides the warning page) for a known, bad URL. As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios. The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario. A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same. This message is associated with Microsoft 365 Roadmap ID 93211. [When this will happen:] We expect this rollout to begin in early June (previously mid-May) and expect the rollout to be completed by late July (previously late June). |
2022-05-18 | MC Title | Microsoft Defender for Office 365: New default (URL click) alert policy | (Updated) Microsoft Defender for Office 365: New default (URL click) alert policy |
2022-05-18 | MC Last Updated | 04/09/2022 03:11:07 | 2022-05-17T21:40:51Z |
2022-05-18 | MC MessageTagNames | Feature update, Admin impact | Updated message, Feature update, Admin impact |
2022-05-18 | MC End Time | 07/31/2022 09:00:00 | 2022-08-31T09:00:00Z |
*starting April 2022
Last updated 11 months ago