You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/security/office-365-security/submissions-user-reported-messages-custom-mailbox.md
-18Lines changed: 0 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,24 +54,6 @@ Before you get started, you need to use the following steps to configure Exchang
54
54
> [!NOTE]
55
55
> This step is especially important if you use [Attack simulation training](attack-simulation-training-get-started.md) or a third-party product to do phishing simulations. If you don't configure the reporting mailbox as a SecOps mailbox, a user reported message might trigger a training assignment by the phishing simulation product.
56
56
57
-
- Create a custom anti-malware policy for the reporting mailbox with the following settings:
58
-
59
-
- Turn off Zero-hour auto purge (ZAP) for malware (**Protection settings** section \>**Enable zero-hour auto purge for malware** isn't selected or `-ZapEnabled $false` in PowerShell).
60
-
61
-
- Turn off the [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies) (**Protection settings** section \>**Enable the common attachments filter** isn't selected or `-EnableFileFilter $false` in PowerShell).
62
-
63
-
For instructions, see [Create an anti-malware policy](anti-malware-policies-configure.md#use-the-microsoft-365-defender-portal-to-create-anti-malware-policies).
64
-
65
-
- Verify that the reporting mailbox isn't included in the Standard or Strict preset security policies. For instructions, see [Preset security policies](preset-security-policies.md).
66
-
67
-
-**Defender for Office 365**: Configure the following additional settings:
68
-
69
-
- Exclude the reporting mailbox from the Built-in protection preset security policy. For instructions, see [Preset security policies](preset-security-policies.md).
70
-
71
-
- Create a Safe Attachments policy for the mailbox where Safe Attachments scanning, including Dynamic Delivery, is turned off (**Settings**\>**Safe Attachments unknown malware response** section \>**Off** or `-Enable $false` in PowerShell). For instructions, see [Set up Safe Attachments policies in Microsoft Defender for Office 365](safe-attachments-policies-configure.md).
72
-
73
-
- Create a Safe Links policy for the reporting mailbox where Safe Links scanning in email is turned off (**URL & click protection settings**\>**On: Safe Links checks a list of known, malicious links when users click links in email** isn't selected or `EnableSafeLinksForEmail $false` in PowerShell). For instructions, see [Set up Safe Links policies in Microsoft Defender for Office 365](safe-links-policies-configure.md).
74
-
75
57
- If you have data loss prevention (DLP), exclude the reporting mailbox from DLP. For more information, see [Data loss prevention Exchange conditions and actions reference](/purview/dlp-exchange-conditions-and-actions).
76
58
77
59
After you verify that the reporting mailbox meets all of these requirements, use the procedures in this article to identify the reporting mailbox and to configure the related settings.
0 commit comments