Edit

Share via


Default email protections for cloud mailboxes

Tip

Did you know you can try the features in Microsoft Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft Defender portal trials hub. Learn about who can sign up and trial terms on Try Microsoft Defender for Office 365.

The default email protections in Microsoft 365 protect your organization from spam, malware, phishing and other email threats. These protections are included in all organizations with cloud mailboxes.

These protections are on by default via the default threat policies for:

The default threat policies for these features apply to all recipients. You can't turn them off, but you can override them by turning on and configuring preset security policies or creating custom threat policies.

You can customize the security settings in the default threat policies, create custom threat policies, or better yet, turn on and add all recipients to the Standard and/or Strict preset security policies. For complete information, see Configure threat policies.

The rest of this article explains how the default email protections for cloud mailboxes work and the features they contain.

Tip

The default email protections for cloud mailboxes are also available as a separate subscription to protect on-premises email environments (not just Microsoft Exchange). For more information, see Exchange Online Protection for on-premises organizations.

How the default email protections for cloud mailboxes work

The following diagram shows how the default email protections for cloud mailboxes work.

A diagram of email from the internet or Customer feedback entering Microsoft 365 and passing through the default email protections for cloud mailboxes.

  1. Incoming messages in Microsoft 365 initially pass through connection filtering, which checks the sender's reputation. Most spam is rejected at this point. For more information, see Configure connection filtering.

  2. If malware is found in the message or a message attachment, the message is delivered to quarantine. By default, only admins can view and interact with malware quarantined messages. But, admins can create and use quarantine policies to specify what users are allowed to do to quarantined messages. To learn more about malware protection, see Anti-malware protection.

  3. Policy filtering evaluates the message against any Exchange mail flow rules (also known as transport rules) configured to act on messages. For example, a rule can notify a manager about messages from a specific sender.

    In on-premises organizations with Exchange Enterprise CAL with Services licenses, data loss prevention (DLP) checks also happen at this point.

  4. The message passes through content filtering, which includes anti-spam and anti-phishing filtering:

    • Anti-spam policies identify messages as bulk, spam, high confidence spam, phishing, or high confidence phishing.

      High confidence phishing messages are always delivered to quarantine. By default, only admins can view and interact with high confidence phishing messages.

    • Anti-phishing policies identify messages as spoofing.

    You can configure the action to take on the message based on the filtering verdict (for example, quarantine or move to the Junk Email folder), and what users can do to the quarantined messages using quarantine policies. For more information, see Configure anti-spam policies and Configure anti-phishing policies for all cloud mailboxes.

A message that successfully passes all of these protection layers is delivered to the recipients.

For more information, see Order and precedence of email protection.

Microsoft 365 datacenters

Microsoft 365 runs on a worldwide network of datacenters that are designed to provide the best availability. For example, if a datacenter becomes unavailable, email messages are automatically routed to another datacenter without any interruption in service. Servers in each datacenter accept messages on your behalf, providing a layer of separation between the servers that host your organization and the internet. Through this highly available network, Microsoft can ensure that email reaches your organization in a timely manner.

Microsoft load balances between datacenters withing the same region only. If you're provisioned in one region, all of your messages are processed using the mail routing for that region.

Microsoft 365 communications

The following communication channels are available for issues and new features in Microsoft 365:

Features in the default email protections for cloud mailboxes

This section provides a high-level overview of the main features that are available in the default email protections for cloud mailboxes.

For information about requirements, important limits, and feature availability across all subscription plans, see the Exchange Online Protection service description.

Tip

  • Microsoft 365 uses several URL blocklists that help detect known malicious links within messages.
  • Microsoft 365 uses a vast list of domains that are known to send spam.
  • Microsoft 365 inspects the active payload in the message body and all message attachments for malware.
Feature Comments
Protection
Preset security policies Preset security policies

Configuration analyzer
Anti-malware Anti-malware protection

Frequently asked questions: Anti-malware protection

Configure anti-malware policies
Inbound anti-spam Anti-spam protection

Frequently asked questions: Anti-spam protection

Configure anti-spam policies
Outbound anti-spam Outbound spam protection

Configure outbound spam filtering

Control automatic external email forwarding
Connection filtering Configure connection filtering
Anti-phishing Anti-phishing policies

Configure anti-phishing policies for all cloud mailboxes
Anti-spoofing protection Spoof intelligence insight

Manage the Tenant Allow/Block List
Zero-hour auto purge (ZAP) for delivered malware, spam, and phishing messages ZAP in Exchange Online
Tenant Allow/Block List Manage the Tenant Allow/Block List
Blocklists for message senders Create sender blocklists
Allowlists for message senders Create sender allowlists
Directory Based Edge Blocking (DBEB) Use Directory Based Edge Blocking to reject messages sent to invalid recipients
Quarantine and submissions
Admin submission Use Admin submission to submit suspected spam, phish, URLs, and files to Microsoft
User reported message settings User reported settings
Quarantine - admins Manage quarantined messages and files as an admin

Frequently asked questions: Quarantined messages

Report messages and files to Microsoft

Anti-spam message headers

You can analyze the message headers of quarantined messages using the Message Header Analyzer at.
Quarantine - end-users Find and release quarantined messages as a user

Use quarantine notifications to release and report quarantined messages

Quarantine policies
Mail flow
Mail flow rules Mail flow rules (transport rules) in Exchange Online

Mail flow rule conditions and exceptions (predicates) in Exchange Online

Mail flow rule actions in Exchange Online

Manage mail flow rules in Exchange Online

Mail flow rule procedures in Exchange Online
Accepted domains Manage accepted domains in Exchange Online
Connectors Configure mail flow using connectors in Exchange Online
Enhanced Filtering for Connectors Enhanced filtering for connectors in Exchange Online
Monitoring
Message trace Message trace

Message trace in the Exchange admin center
Email & collaboration reports View email security reports
Mail flow reports Mail flow reports in the Exchange admin center
Mail flow insights Mail flow insights in the Exchange admin center
Auditing reports Auditing reports in the Exchange admin center
Service Level Agreements (SLAs) and support
Spam effectiveness SLA > 99%
False positive ratio SLA < 1:250,000
Virus detection and blocking SLA 100% of known viruses
Monthly uptime SLA 99.999%
Phone and web technical support 24 hours a day, seven days a week Get support for Microsoft 365 for business.
Other features
A geo-redundant global network of servers Microsoft 365 runs on a worldwide network of datacenters that are designed to help provide the best availability. For more information, see the Microsoft 365 datacenters section earlier in this article.
Message queuing when the on-premises server can't accept mail Messages in deferral remain in our queues for one day. Message retry attempts are based on the error we get back from the recipient's mail system. On average, messages are retried every 5 minutes. For more information, see the Mail flow delivery FAQ.
Office 365 Message Encryption available as an add-on For more information, see Encryption in Office 365.