Search

MC355215 – (Updated) Microsoft Defender for Office 365: New default (URL click) alert policy (archived)

cloudscout.one Icon

check before: 2022-04-23

Product:

Defender, Defender for Office 365, Microsoft 365 Defender

Platform:

Web, World tenant

Status:

Launched

Change type:

Admin impact, Feature update, Updated message

Links:

93211

Details:

Updated May 17, 2022: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert.

The URL verdict changes to bad after the user has already clicked it.
A user clicks through (overrides the warning page) for a known, bad URL.
As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios.
The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario.
A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same.
This message is associated with Microsoft 365 Roadmap ID 93211.

[When this will happen:]

We expect this rollout to begin in early June (previously mid-May) and expect the rollout to be completed by late July (previously late June).

Change Category:
XXXXXXX ...

Scope:
XXXXXXX ...

Release Phase:
General Availability

Created:
2022-04-09

updated:
2022-08-27

the free basic plan is required to see all details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.


changes*

DatePropertyoldnew
2022-08-27MC prepareIf you’re exporting these alerts to external systems for processing (via APIs), you will also need to set up the export of the new policy.
https://www.microsoft.com/en-ww/microsoft-365/roadmap?filters=&searchterms=93211
If you’re exporting these alerts to external systems for processing (via APIs), you will also need to set up the export of the new policy.
ps://www.microsoft.com/en-ww/microsoft-365/roadmap?filters=&searchterms=932
2022-05-18MC MessagesMicrosoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert.

The URL verdict changes to bad after the user has already clicked it.
A user clicks through (overrides the warning page) for a known, bad URL.
As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios.
The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario.
A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same.
This message is associated with Microsoft 365 Roadmap ID 93211.

[When this will happen:]

We expect this rollout to begin in mid-May and expect the rollout to be completed by late June.
Updated May 17, 2022: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert.

The URL verdict changes to bad after the user has already clicked it.
A user clicks through (overrides the warning page) for a known, bad URL.
As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios.
The current alert policy 'A potentially malicious URL click was detected' will cover the ‘URL verdict change’ (# 1 above) scenario.
A new default alert policy named 'A user clicked through to a potentially malicious URL' will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same.
This message is associated with Microsoft 365 Roadmap ID 93211.

[When this will happen:]

We expect this rollout to begin in early June (previously mid-May) and expect the rollout to be completed by late July (previously late June).
2022-05-18MC TitleMicrosoft Defender for Office 365: New default (URL click) alert policy(Updated) Microsoft Defender for Office 365: New default (URL click) alert policy
2022-05-18MC Last Updated04/09/2022 03:11:072022-05-17T21:40:51Z
2022-05-18MC MessageTagNamesFeature update, Admin impactUpdated message, Feature update, Admin impact
2022-05-18MC End Time07/31/2022 09:00:002022-08-31T09:00:00Z

*starting April 2022

Last updated 11 months ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!