Skip to content

Commit

Permalink
Update defender-for-office-365-whats-new.md
Browse files Browse the repository at this point in the history
  • Loading branch information
faoquong authored Oct 8, 2024
1 parent 84a1fc0 commit 7ba2de4
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion defender-office-365/defender-for-office-365-whats-new.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,10 @@ For more information on what's new with other Microsoft Defender security produc

- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.

- (GA) SecOps personnel can now release email messages from quarantine or move messages from quarantine back to user Inboxes directly from :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** in Threat Explorer, Advanced hunting, custom detection, the Email entity page, and the Email summary panel. This capability allows security operators to manage false positives more efficiently and without losing context. For more information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).
- (GA) SecOps personnel can now release email messages from quarantine or move messages from quarantine back to user Inboxes directly from :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** in Threat Explorer, Advanced hunting, custom detection, the Email entity page, and the Email summary panel. This capability allows security operators to manage false positives more efficiently and without losing context. For more information, see [Threat hunting: Email remediation](threat-explorer-threat-hunting.md#email-remediation).

- We will be introducing Intra-org protection data into 3 of our core customer facing reports (Mail flow status reports, Threat protection status reports, and Top senders/recipient reports). With this Optics, Admins and security operators will have insight into how MDO is protecting users from malicious email traffic inside the organization tenant. https://learn.microsoft.com/en-us/defender-office-365/reports-email-security?view=o365-worldwide#email-security-report-changes-in-the-microsoft-365-defender-portal


## May 2024

Expand Down

0 comments on commit 7ba2de4

Please sign in to comment.