Share via

Microsoft Defender O365 incorrectly classifying trusted sender as High Confidence Phish

Jose Flores 0 Reputation points
2026-04-06T14:54:03.0533333+00:00

Hello everyone,

I’m experiencing an issue with Microsoft Defender for Office 365 incorrectly flagging a legitimate email as “High confidence phish”

The sender (pac@aludra.cloud) is trusted and has already been validated. However, multiple emails with invoice attachments (PDF and XML) are being consistently quarantined and marked as phishing.

I have already:

Verified that the sender is legitimate

Confirmed that the emails are safe

Noticed that Defender still classifies them as “High confidence phish”

Any guidance or best practices would be greatly appreciated.

Thank you in advance.

Microsoft Security | Microsoft Defender | Microsoft Defender for Office 365
0 comments No comments

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-04-06T14:54:21.7033333+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    High confidence phishing and malware are always protected by “secure by default” behavior in Microsoft 365. That means:

    • Messages classified as High confidence phishing are always quarantined.
    • Organization-level overrides such as allowed sender/domain lists, Outlook Safe Senders, IP Allow Lists, and mail flow rules are not honored for these messages.

    So even though the sender is trusted and validated, Defender for Office 365 will still quarantine messages if they are scored as high confidence phish.

    To handle this scenario while keeping protection in place, use the supported workflows instead of allowlists:

    1. Use quarantine workflows
    2. Report the messages as false positives to Microsoft
    3. Avoid using Safe Senders / allowlists to bypass filtering
      • Outlook Safe Senders and organization allowlists are not applied to malware or high confidence phishing due to secure-by-default behavior. See Secure by default in cloud organizations.
      • Even where Safe Senders or allowlists do apply, they are discouraged because they bypass parts of the filtering stack and can allow malicious mail if the trusted sender is compromised. See Create sender allowlists for cloud mailboxes.
    4. End-user handling of quarantined messages
      • By default, end users cannot release high confidence phishing messages themselves; this is by design. Other quarantine reasons (spam, phishing, bulk, etc.) may allow user release, but high confidence phishing is restricted. See Manage quarantined messages and files as a user.

    Operationally, the best practice is:

    • Continue to let Defender quarantine high confidence phish.
    • Have admins review and release legitimate messages from quarantine as needed.
    • Consistently submit these legitimate quarantined messages as false positives via admin submissions so Microsoft can adjust detections over time.

    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.