Edit

Share via


Secure by default in cloud organizations

Tip

Did you know you can try the features in Microsoft Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft Defender portal trials hub. Learn about who can sign up and trial terms on Try Microsoft Defender for Office 365.

"Secure by default" is a term used to define the default settings that are most secure as possible.

However, security needs to be balanced with productivity. This balance includes:

  • Usability: Settings shouldn't get in the way of user productivity.
  • Risk: Security might block important activities.
  • Legacy settings: Some configurations for older products and features might need to be maintained for business reasons, even if new, modern settings are improved.

All organizations with cloud mailboxes automatically receive email protection. This protection includes:

  • Email with suspected malware is automatically quarantined. The quarantine policy used by the anti-malware policy controls whether recipients are notified. For more information, see Configure anti-malware policies.
  • Email identified as high confidence phishing is handled according to the anti-spam policy action. See Configure anti-spam policies.

For more information, see Default email protections for cloud mailboxes.

Because Microsoft wants to keep our customers secure by default, some organization overrides aren't applied for malware or high confidence phishing. These overrides include:

  • Allowed sender lists or allowed ___domain lists in anti-spam policies.
  • Outlook Safe Senders.
  • The IP Allow List in the default connection filter policy.
  • Exchange mail flow rules (also known as transport rules).

Use admin submissions to temporarily allow specific messages blocked by Microsoft 365.

More information on these overrides can be found in Create sender allowlists.

Note

Anti-spam policies that use the Move message to Junk Email folder action for high confidence phishing messages are converted to the Quarantine message action. The Redirect message to email address action for high confidence phishing messages is unaffected.

Secure by default isn't a setting that you can turn on or off. It's how our filtering keeps potentially dangerous or unwanted messages out of your mailboxes. Malware and high confidence phishing messages should be quarantined. By default, only admins can manage messages quarantined as malware or high confidence phishing, and they can also report false positives to Microsoft from quarantine. For more information, see Manage quarantined messages and files as an admin.

More information

Secure by default means we take the same action on messages you would take if you knew the message was malicious, even if you configured exceptions that would otherwise allow delivery of the message. We always used this approach on malware, and now we're extending this approach to high confidence phishing messages.

Our data indicates a user is 30 times more likely to click a malicious link in messages in the Junk Email folder versus Quarantine. Our data also indicates the false positive rate (good messages marked as bad) for high confidence phishing messages is low. Admins can resolve any false positives with admin submissions.

We also determined the allowed sender and allowed ___domain lists in anti-spam policies and Safe Senders in Outlook were too broad and were causing more harm than good.

To put it another way: as a security service, we're acting on your behalf to prevent users from being compromised.

Exceptions

You should only consider using overrides in the following scenarios: