*For this entry exists the more relevant or more recent entry MC335609
check before: 2021-04-16
Product:
Defender, Exchange, Microsoft Defender for Office 365, SharePoint
Platform:
Germany, Online, US Instances, Web, World tenant
Status:
Launched
Change type:
Admin impact, New feature, Updated message
Details:
Updated May 04, 2021: We have updated the rollout timeline below. Thank you for your patience.
The Spoof intelligence experience will introduce enhancements so that Security Administrators can gain better management of spoofing activity within their tenant. These feature updates will provide a clearer and easier way for Security Administrators to configure domain spoofing for both Cross-Org (External) and Intra-Org (Internal) email messages using a new “Tenant allow/block list policy” designed for Spoofing activity. Furthermore, users will be able to review insights provided by spoof intelligence system and take actions. Additionally, an enhanced Spoof detections report (also known as Spoof Mail Report) will show details about authentication results such as SPF, DKIM, DMARC, so users can assess configurations within their tenant and adopt industry email standards as applicable. This Spoof Mail Report will provide a historical view of up to last 90 days of spoofing activity using the report.
This message is associated with Microsoft 365 Roadmap ID 70590
[When this will happen]
Roll out will begin at the end of May (previouisly April) and is expected to be completed by the end of June.
Change Category:
XXXXXXX ...
Scope:
XXXXXXX ...
Release Phase:
General Availability
Created:
2021-04-03
updated:
2021-07-08
the free basic plan is required to see all details. Sign up here
A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.
Last updated 1 year ago