Microsoft defender for Office 365: Bulk complaint level (BCL) filtering in Threat protection status report

With this release, users, especially non OKR owners, will land on the activity feed page.  The page has updates with OKRs that are relevant to users, so they are well informed on the target, progress achieved, status, and comments/reactions from managers, leaders, and other collaborators. Users can comment/react on the updated directly from activity feed.
More info: https://techcommunity.microsoft.com/t5/microsoft-defender-for-office/improving-the-reporting-experience-in-microsoft-defender-for/ba-p/2760898

(more…)

Microsoft Purview compliance portal: Endpoint Data Loss Prevention – Detect if a label is not assigned (not labeled as a condition) – U.S. Government clouds

With this capability you will be able to configure specific restrictions for PDF and Office files that are not labeled on the endpoint devices.

(more…)

Microsoft Purview compliance portal: Data Loss Prevention – Incident management in Microsoft Defender portal (U.S. Government clouds)

This feature provides a singular view for incident management by making the Microsoft Purview Data Loss Prevention incident management experience available in the Microsoft Defender portal. Customers can import all DLP incidents into Microsoft Sentinel to extend correlation, detection and investigation across additional Microsoft and non-Microsoft data sources, and extend automated orchestration flows using Sentinel’s native SOAR capabilities.

(more…)

Forms: Allow respondents edit their responses

Allow Forms respondents to edit their own responses. The Forms creator can change the
settings to allow or prohibit these edits.

(more…)

Microsoft Defender for Office 365: Enabling malware filter bypass for SecOps Mailboxes

We are adding the ability for security admins and security operations (SecOps) teams to triage messages with malware verdicts for their own review and analysis. This update enables malware filter bypass on messages delivered to configured SecOps mailboxes in the advanced delivery policy.

(more…)

Microsoft Defender for Office 365: Auto allow of third-party phish simulation URLs in email message body

We’re enabling automatic allow of URLs present in the email message body for third-party phishing simulation campaigns. With this update, security admins no longer need to configure simulation URLs to allow in the advanced delivery policy as previously required in order to ensure URLs are not blocked/detonated at time of click. These URLs will now be automatically allowed as part of the advanced delivery email message allow.

(more…)

Microsoft Edge: Workspaces

Edge Workspaces provides a way for customers to organize their browsing tasks into dedicated windows. Edge Workspaces lets users share a set of browser tabs so working groups can view the same websites and latest working files in one place and stay on the same page. Each Edge Workspace contains its own sets of tabs and favorites, all created and curated by the user and their collaborators. Edge Workspaces are automatically saved and kept up to date.
More info: https://learn.microsoft.com/en-us/deployedge/microsoft-edge-workspaces

(more…)

AntiMalware: Default Policy (only): Common attachment filter: Configuration Change

We’re making some changes to common attachment filter settings for the Default policy (only) in the Anti-malware policy. The earlier default selection value of the ‘Quarantine the message’ is changed to ‘Reject the message with NDR’. 

In Anti-malware policies, under the protection settings for ‘Enable the common attachment filter’, there are two notification options when an email contains any attachment matching the configured file types. They are:

(more…)

Retirement of Dynamic Ordering feature in classic search experiences

We have disabled the Dynamic Ordering feature for classic search experiences in SharePoint.  While the UI for the feature is still present, all configurations associated with this feature are ignored. 

When this will happen:

(more…)

Enabling Azure Application Admin role for App Management across Microsoft 365 suite products

Microsoft allows admins to manage third party store apps and Line of Business apps across various M365 suite products from Integrated Apps blade in M365 Admin Center. Currently Integrated Apps access is limited to Global Admins, Global Reader Admins and Exchange Admins. Now, we are also allowing Azure Application Administrators to access Integrated Apps page and manage apps for their organization. 

This message is associated with Microsoft 365 Roadmap ID 88942

(more…)


I've been working with Microsoft Technologies over the last ten years, mainly focused on creating collaboration and productivity solutions that drive the adoption of Microsoft Modern Workplace.