Skip to content

Commit d34d0e5

Browse files
authored
Update sharepoint-malware-false-positive-guide.md
1 parent 56f5d44 commit d34d0e5

1 file changed

Lines changed: 40 additions & 39 deletions

File tree

SharePoint/SharePointOnline/security/sharepoint-malware-false-positive-guide.md

Lines changed: 40 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -19,66 +19,66 @@ description: Identify and resolve false positive malware detections in SharePoin
1919

2020
# SharePoint malware false positive guide
2121

22-
Malware false positive detections in SharePoint occur when a safe file is mistakenly identified as malware by Microsoft scanning engines. This guide explains how to identify which feature flagged the file, report it for analysis, and unblock the file if necessary. This article talks about SharePoint, but the information also applies to files stored in OneDrive and Microsoft Teams.
22+
Malware false positive detections in Microsoft SharePoint occur when a safe file is mistakenly identified as malware by Microsoft scanning engines. This guide explains how to identify which feature flagged the file, how to report it for analysis, and how to unblock the file, if it's necessary. This article discusses SharePoint, but the information applies also to files that are stored on OneDrive and in Microsoft Teams.
2323

2424
> [!TIP]
2525
>
26-
> - Admins or security operations (SecOps) personnel with [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) permissions in organizations with cloud mailboxes have access files on the following pages in the Microsoft Defender portal:
27-
> - The **Files** tab of the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>.
28-
> - The **Email Attachments** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>.
29-
> - The **Files** tab of the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=FileHash>.
26+
> - Admins or security operations (SecOps) personnel who have [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator) permissions in organizations that use cloud mailboxes have access files on the following pages in the Microsoft Defender portal:
27+
> - The **Files** tab of the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>
28+
> - The **Email Attachments** tab of the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>
29+
> - The **Files** tab of the **Tenant Allow/Block Lists** page at <https://security.microsoft.com/tenantAllowBlockList?viewid=FileHash>
3030
>
31-
> However, the **Files** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions> is available only to organizations with **Microsoft Defender XDR** or **Microsoft Defender for Endpoint Plan 2**.
31+
> However, the **Files** tab on the **Submissions** page at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions> is available only to organizations that have **Microsoft Defender XDR** or **Microsoft Defender for Endpoint Plan 2**.
3232
> - For permissions and the most current information about the SharePoint Online Management Shell, see [Intro to SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell).
3333
34-
## Malware detections in SharePoint
34+
## Malware detection in SharePoint
3535

3636
SharePoint uses two main malware scanning engines:
3737

3838
- **Microsoft Defender for Office 365**: Files are tested in a cloud virtual environment (also known as a **sandbox**). For more information, see [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/defender-office-365/safe-attachments-for-spo-odfb-teams-about).
39-
- **Microsoft Defender for Endpoint**: Built-in virus protection using frequently updated **signature-based** detections.
39+
- **Microsoft Defender for Endpoint**: Built-in virus protection that uses frequently updated **signature-based** detections.
4040

41-
File scanning isn't always immediate. Scanning happens **asynchronously** based on factors like file type and sharing status. If a file is detected as malware, access to the file is blocked, and a warning appears.
41+
File scanning isn't always immediate. Scanning occurs **asynchronously** based on such factors as file type and sharing status. If a file is detected as malware, access to the file is blocked, and a warning message appears.
4242

4343
:::image type="content" source="media/sharepoint-malware-false-positives-blocked-file-sharepoint.png" alt-text="Screenshot of a blocked file in SharePoint." lightbox="media/sharepoint-malware-false-positives-blocked-file-sharepoint.png":::
4444

45-
## Step-by-step: Handle and prevent false positives
45+
## Handle and prevent false positives
4646

47-
Use the steps in these sections to deal with false positives in SharePoint.
47+
Use the steps in this section to resolve false positives in SharePoint.
4848

4949
### Step 1: Identify the engine that flagged the file
5050

5151
Use any of the following methods:
5252

5353
- **Simple**: Use either of the following methods in the Defender portal:
54-
- **Quarantine**: On the **Files** tab of **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>, the **Detected by** property contains one of the following values in Defender for Office 365:
55-
- **AV** for the signature detections.
56-
- **MDO** for Safe Attachments detections.
54+
- **Quarantine**: On the **Files** tab of the **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>, the **Detected by** property contains one of the following values in Defender for Office 365:
55+
- **AV** for the signature detection
56+
- **MDO** for Safe Attachments detection
5757

5858
For more information, see [Use the Microsoft Defender portal to manage quarantined files in Defender for Office 365](/defender-office-365/quarantine-admin-manage-messages-files#use-the-microsoft-defender-portal-to-manage-quarantined-files-in-defender-for-office-365).
5959

6060
- **Threat Explorer (Explorer) or Real-time detections**: The **Content malware** view on one of the following pages:
61-
- **Explorer** (Defender for Office 365 Plan 2): <https://security.microsoft.com/threatexplorerv3>.
62-
- **Real-time Detections** (Defender for Office 365 Plan 1): <https://security.microsoft.com/realtimereportsv3>.
61+
- **Explorer** (Defender for Office 365 Plan 2): <https://security.microsoft.com/threatexplorerv3>
62+
- **Real-time Detections** (Defender for Office 365 Plan 1): <https://security.microsoft.com/realtimereportsv3>
6363

6464
The **Detection technology** field in the filterable properties contains one of the following values:
65-
- **Antimalware protection** for signature detections.
66-
- **File detonation** or **File reputation** for Safe Attachments detections.
65+
- **Antimalware protection** for signature detection
66+
- **File detonation** or **File reputation** for Safe Attachments detection
6767

6868
For more information, see [Content malware view in Threat Explorer and Real-time detections](/defender-office-365/threat-explorer-real-time-detections-about#content-malware-view-in-threat-explorer-and-real-time-detections).
6969

7070
- **Advanced**: Use either of the following methods:
7171
- **Microsoft Purview Audit**: Review the audit log for **FileMalwareDetected** operations. By default, the log holds information for 180 days.
7272
- The **AuditData** column contains the **VirusVendor** field:
73-
- **Default** for signature-based detections.
74-
- **Advanced Threat Protection** for Safe Attachments detections.
75-
- The **VirusInfo** field contains the full malware variant/name.
73+
- **Default** for signature-based detection
74+
- **Advanced Threat Protection** for Safe Attachments detection
75+
- The **VirusInfo** field contains the full malware variant or name.
7676

7777
For more information, see [Search the audit log](/purview/audit-search).
7878

7979
- **SharePoint Online PowerShell**: Use the [Get-SPOMalwareFile](/en-us/powershell/module/sharepoint-online/get-spomalwarefile?view=sharepoint-ps) for details about the detection. The **MalwareInfo** field indicates the detection type. For example, `Win32/CryptInject!MSR` or `Trojan_PDF_LinkedUrlCookie_A`.
8080
- Signature detection malware variants include forward slashes ('/').
81-
- Safe Attachments detection malware variants include underscores ('\_') or the text _Malicious Payload_.
81+
- Safe Attachments detection malware variants include underscores ('\_') or the text, _Malicious Payload_.
8282

8383
For example:
8484

@@ -102,46 +102,47 @@ Use any of the following methods:
102102

103103
If multiple files are flagged, submit all affected files by using the following steps.
104104

105-
1. Download the files using one of the following methods:
105+
1. Download the files by using one of the following methods:
106106

107107
> [!CAUTION]
108-
> Downloading files with malware poses risks. Always adhere to your organization's security guidelines before proceeding.
108+
> Downloading files that contain malware poses risks. Always adhere to your organization's security guidelines before you proceed.
109109
110110
- **Defender portal**: On the **Files** tab of **Quarantine** page at <https://security.microsoft.com/quarantine?viewid=Files>, select the file, and then select **Download**. For more information, see [Download quarantined files from quarantine](/defender-office-365/quarantine-admin-manage-messages-files#download-quarantined-files-from-quarantine).
111111

112112
- **SharePoint Online PowerShell**: Use the [Get-SPOMalwareFileContent](/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefilecontent) cmdlet.
113113

114-
2. Submit the files using one of the following methods based on how the file was detected:
115-
- **Safe Attachments detections**: Use the **Email attachments** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. For instructions, see [Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
114+
2. Submit the files by using one of the following methods, based on how the file was detected:
115+
- **Safe Attachments detection**: Use the **Email attachments** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. For instructions, see [Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
116116

117-
- **Defender for Endpoint signature detections** (Microsoft Defender XDR or Microsoft Defender for Endpoint Plan 2): Submit a file for malware analysis using the **Files** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions>. For instructions, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde). Or, submit the file through the **Microsoft Security Intelligence** portal at <https://www.microsoft.com/wdsi/filesubmission>.
117+
- **Defender for Endpoint signature detection** (Microsoft Defender XDR or Microsoft Defender for Endpoint Plan 2): Submit a file for malware analysis by using the **Files** tab on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=fileSubmissions>. For instructions, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde). Or, submit the file through the **Microsoft Security Intelligence** portal at <https://www.microsoft.com/wdsi/filesubmission>.
118118

119119
### Step 3: Verify the outcome
120120

121-
If Microsoft identifies a false positive and updates the definitions, the file shouldn't be flagged again. If the file continues to be flagged, contact Microsoft Support and specify whether the issue involves a single file or multiple files.
121+
If Microsoft identifies a false positive and updates the definitions, the file shouldn't be flagged again. If the file continues to be flagged, contact Microsoft Support, and specify whether the issue involves a single file or multiple files.
122122

123123
## Unblock files
124124

125125
> [!IMPORTANT]
126-
> Only unblock files you're confident are safe.
126+
> Only unblock files that you're confident are safe.
127127
128128
Use any of the following methods:
129129

130-
- Admins can release files from [quarantine](https://security.microsoft.com/quarantine) **within 30 days**. For more information, see [Release quarantined files from quarantine](/defender-office-365/quarantine-admin-manage-messages-files#release-quarantined-files-from-quarantine).
130+
- Admins can release files from [quarantine](https://security.microsoft.com/quarantine) within 30 days. For more information, see [Release quarantined files from quarantine](/defender-office-365/quarantine-admin-manage-messages-files#release-quarantined-files-from-quarantine).
131131

132-
- For Safe Attachments malware detections, admins can use the **Email attachments** tab (which also applies to Sharepoint files) on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment> to submit a blocked file. When the admin selects, **I've confirmed it's clean**, they can then choose **Allow this file** to create an allow entry for the file on the **Files** tab of the **Tenant Allow/Block List**. For instructions, see [Submit good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
132+
- To submit a blocked file for Safe Attachments malware detection, admins can use the **Email attachments** tab (that also applies to Sharepoint files) on the **Submissions** page in the Defender portal at <https://security.microsoft.com/reportsubmission?viewid=emailAttachment>. After you select **I've confirmed it's clean**, you can then select **Allow this file** to create an allow entry for the file on the **Files** tab of the **Tenant Allow/Block List**. For instructions, see [Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft).
133133

134134
> [!TIP]
135135
>
136-
> - Reuploading a file might restore access, but the file might be flagged again unless the definitions are updated.
137-
> - For files blocked **longer than 30 days**, contact Microsoft Support with the following information:
138-
> - Evidence that the file is safe.
139-
> - The detection type.
136+
> - Uploading a file again might restore access, but the file might also be flagged again unless the definitions are updated.
137+
> - For files that are blocked for more than 30 days, contact Microsoft Support and provide the following information:
138+
> - Evidence that the file is safe
139+
> - The detection type
140140
> - The file path from the relevant source:
141-
> - The SharePoint library details.
142-
> - Output from the [Get-SPOMalwareFile](/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefile) cmdlet.
141+
> - The SharePoint library details
142+
> - Output from the [Get-SPOMalwareFile](/powershell/module/microsoft.online.sharepoint.powershell/get-spomalwarefile) cmdlet
143143
>
144-
> Here's an example path from the SharePoint library details: <https://contoso.sharepoint.com/sites/Everyone/Shared%20Documents/General/MyDoc1.docx>
144+
> Here's an example path from the SharePoint library details:
145+
> <https://contoso.sharepoint.com/sites/Everyone/Shared%20Documents/General/MyDoc1.docx>
145146
>
146147
> :::image type="content" source="media/sharepoint-malware-false-positives-copy-path.png" alt-text="Screenshot of how to copy the path of a file in SharePoint" lightbox="media/sharepoint-malware-false-positives-copy-path.png":::
147148
@@ -153,4 +154,4 @@ Use any of the following methods:
153154

154155
[Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](/defender-office-365/safe-attachments-for-spo-odfb-teams-about)
155156

156-
[Submit good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft)
157+
[Report good email attachments to Microsoft](/defender-office-365/submissions-admin#report-good-email-attachments-to-microsoft)

0 commit comments

Comments
 (0)