Skip to content

Commit f9fba2e

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/defender-docs-pr (branch live)
2 parents 6918fa2 + 84fb617 commit f9fba2e

4 files changed

Lines changed: 10 additions & 7 deletions

File tree

defender-office-365/mdo-support-teams-about.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,6 @@ Microsoft Defender for Office 365 Plan 1 provides the following extra Teams prot
4747

4848
- **Report Teams items**: Users can report Teams items (messages or calls) as malicious or not malicious. Depending on the reported items settings in the organization, reported items go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md) and the following video:
4949

50-
[!VIDEO https://www.youtube.com/watch?v=ungHDS4XG4I]
51-
5250
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
5351

5452
- **Remove users from Teams chat**: To remediate malicious attacks, you can remove users from teams chats directly from the [Teams message entity panel](teams-message-entity-panel.md#remove-users-from-teams-chats-in-the-teams-message-entity-panel).

defender-office-365/submissions-admin.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.collection:
1010
ms.custom: seo-marvel-apr2020
1111
description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."
1212
ms.service: defender-office-365
13-
ms.date: 10/27/2025
13+
ms.date: 04/29/2026
1414
appliesto:
1515
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Built-in security features for all cloud mailboxes</a>
1616
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -245,6 +245,9 @@ After a few moments, the block entry is available on the **URL** tab on the **Te
245245

246246
### Report good email to Microsoft
247247

248+
> [!NOTE]
249+
> Submitting a message as "should not have been blocked" doesn't automatically override impersonation protections in your tenant. For recurring legitimate senders flagged by [domain or user impersonation protection](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365), update the **Trusted senders and domains** section in the [anti-phishing policy](anti-phishing-policies-mdo-configure.md#use-the-microsoft-defender-portal-to-modify-anti-phishing-policies) that detected the message, or create an allow entry in the [Tenant Allow/Block List](tenant-allow-block-list-about.md).
250+
248251
1. In the Defender portal at <https://security.microsoft.com>, go to **Actions & submissions** \> **Submissions**. Or, to go directly to the **Submissions** page, use <https://security.microsoft.com/reportsubmission>.
249252

250253
2. On the **Submissions** page, verify that the **Emails** tab is selected.

defender-xdr/alert-policies.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Alert policies in the Microsoft Defender portal
33
ms.author: guywild
44
author: guywi-ms
5-
ms.date: 03/31/2026
5+
ms.date: 04/29/2026
66
ms.topic: article
77
ms.service: defender-xdr
88
ms.localizationpriority: medium
@@ -115,6 +115,9 @@ You can also define user tags as a condition of an alert policy. This definition
115115

116116
- **Email notifications**. You can set up the policy so that email notifications are sent (or not sent) to a list of users when an alert is triggered. You can also set a daily notification limit so that once the maximum number of notifications is reached, no more notifications are sent for the alert during that day. In addition to email notifications, you or other administrators can view the alerts that are triggered by a policy on the **Alerts** page. Consider enabling email notifications for alert policies of a specific category or that have a higher severity setting.
117117

118+
> [!NOTE]
119+
> Some alert policies generate aggregated alerts. In these cases, activity from multiple users or entities might be included in a single alert when events occur within the policy's aggregation window. Aggregation behavior depends on the alert type and workload, and might not be configurable for certain system alerts. Licensing affects which alert policies and configuration options are available, but doesn't necessarily change aggregation behavior.
120+
118121
## Default alert policies
119122

120123
Microsoft provides built-in alert policies that help identify Exchange admin permissions abuse, malware activity, potential external and internal threats, and information governance risks. On the **Alert policies** page, the names of these built-in policies are in bold and the policy type is defined as **System**. These policies are turned on by default. You can turn off these policies (or back on again), set up a list of recipients to send email notifications to, and set a daily notification limit. The other settings for these policies can't be edited.

sentinel/includes/service-limits-table-manaement-ingestion.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,11 @@ The following table lists the service parameters and limits for the Microsoft Se
1414
| Category | Parameter/limit |
1515
|--------------------------------------------------|----------------------------------------------|
1616
| Workspaces per tenant | 20 workspaces |
17-
| Data ingestion per minute to a data collection endpoint | 50 GB |
18-
| Default ingestion volume rate threshold in LALog Analytics workspaces | 6 GB/min uncompressed |
19-
| Ingestion requests per minute to a data collection endpoint | 15,000 |
2017
| Lake Retention (Asset data) | 12 years |
2118
| Lake Retention (Aux) | 12 years |
2219
| Maximum size for field values (Log Analytics) | 32 KB (truncated above the limit) |
2320
| Table setup latency during onboarding | 90-120 minutes |
2421
| New table setup latency | 90-120 minutes |
2522
| Switching data between tiers latency | 90-120 minutes |
23+
24+
For information on Log Analytics workspace ingestion limits, see [Log Analytics workspaces, data collection volume and retention](/azure/azure-monitor/fundamentals/service-limits#logs-ingestion-api).

0 commit comments

Comments
 (0)