Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft
Tip
Did you know you can try the features in Microsoft 365 Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft 365 Defender portal trials hub. Learn about who can sign up and trial terms here.
Applies to
- Exchange Online Protection
- Microsoft Defender for Office 365 plan 1 and plan 2
- Microsoft 365 Defender
In Microsoft 365 organizations with Exchange Online mailboxes, admins can use the Submissions page in the Microsoft 365 Defender portal to submit email messages, URLs, and attachments to Microsoft for analysis.
When you submit an email message for analysis, Microsoft does the following checks:
- Email authentication check: Whether email authentication passed or failed when it was delivered.
- Policy hits: Information about any policies or overrides that may have allowed or blocked the incoming email into your tenant, overriding our service filter verdicts.
- Payload reputation/detonation: Up-to-date examination of any URLs and attachments in the message.
- Grader analysis: Review done by human graders in order to confirm whether or not messages are malicious.
Important
In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can use the Submissions page in the Microsoft 365 Defender portal to submit messages to Microsoft. The messages are only analyzed for email authentication check and policy check.
Payload reputation/detonation and grader analysis are not done as data is not supposed to leave the tenant boundary for compliance purposes.
For other ways to submit email messages, URLs, attachments and files to Microsoft, see Report messages and files to Microsoft.
Watch this short video to learn how to use admin submissions in Microsoft Defender for Office 365 to submit messages to Microsoft for evaluation.
What do you need to know before you begin?
You open the Microsoft 365 Defender portal at https://security.microsoft.com/. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
To submit messages, URLs, and email attachments to Microsoft, you need to have one of following roles:
Security Administrator or Security Reader in the Microsoft 365 Defender portal.
Note that one of these roles is required to View user reported messages as described later in this article.
Admins can submit messages as old as 30 days if they're still available in the mailbox and haven't been purged by the user or an admin.
Admin submissions are throttled at the following rates:
- Maximum submissions in any 15 minutes period: 150 submissions
- Same submissions in a 24 hour period: 3 submissions
- Same submissions in a 15 minute period: 1 submission
For more information about how users can submit messages and files to Microsoft, see Report messages and files to Microsoft.
Report questionable email to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Emails tab is selected.
On the Emails tab, click
Submit to Microsoft for analysis.
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value Email is selected.
Add the network message ID or upload the email file: Select one of the following options:
Add the email network message ID: This is a GUID value that's available in the X-MS-Exchange-Organization-Network-Message-Id header in the message or in the X-MS-Office365-Filtering-Correlation-Id header in quarantined messages.
Upload the email file (.msg or .eml): Click Browse files. In the dialog that opens, find and select the .eml or .msg file, and then click Open.
Choose a recipient who had an issue: Specify the recipients that you would like to run a policy check against. The policy check will determine if the email bypassed scanning due to user or organization policies or override.
Select a reason for submitting to Microsoft: Verify Should have been blocked (False negative) is selected.
The email should have been categorized as: Select Phish, Malware, or Spam. If you're not sure, use your best judgment.
Block all emails from this sender or domain: Select this option to create a block entry for the sender domain or email address in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List.
After you select this option, the following settings are available:
By default, Sender is selected but you can select Domain instead.
Remove block entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- 90 days
- Never expire
- Specific date: The maximum value is 90 days from today.
Block entry note: Enter optional information about why you're blocking this email.
When you're finished, click Submit, and then click Done.
After a few moments, the block entry will appear on the Domains & addresses tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Report questionable email attachments to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, select the Email attachments tab.
On the Email attachments tab, click
Submit to Microsoft for analysis.
On the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value Email attachment is selected.
File: Click Browse files to find and select the file to submit.
Select a reason for submitting to Microsoft: Verify Should have been blocked (False negative) is selected.
The email should have been categorized as: Select Phish or Malware. If you're not sure, use your best judgment.
Block this file: Select this option to create a block entry for the file in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List.
After you select this option, the following settings are available:
Remove block entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- 90 days
- Never expire
- Specific date: The maximum value is 90 days from today.
Block entry note: Enter optional information about why you're blocking this file.
When you're finished, click Submit, and then click Done.
After a few moments, the block entry will appear on the Files tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Report questionable URLs to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, select the URLs tab.
On the URLs tab, click
Submit to Microsoft for analysis.
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value URL is selected.
URL: Enter the full URL (for example,
https://www.fabrikam.com/marketing.html
), and then select it in the box that appears. You can enter upto 50 URLs at once.Select a reason for submitting to Microsoft: Verify Should have been blocked (False negative) is selected.
The email should have been categorized as: Select Phish or Malware. If you're not sure, use your best judgment.
Block this URL: Select this option to create a block entry for the URL in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List.
After you select this option, the following settings are available:
Remove block entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- 90 days
- Never expire
- Specific date: The maximum value is 90 days from today.
Block entry note: Enter optional information about why you're blocking this URL.
When you're finished, click Submit, and then click Done.
After a few moments, the block entry will appear on the URL tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Report good email to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Emails tab is selected.
On the Emails tab, click
Submit to Microsoft for analysis.
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value Email is selected.
Add the network message ID or upload the email file: Select one of the following options:
Add the email network message ID: This is a GUID value that's available in the X-MS-Exchange-Organization-Network-Message-Id header in the message or in the X-MS-Office365-Filtering-Correlation-Id header in quarantined messages.
Upload the email file (.msg or .eml): Click Browse files. In the dialog that opens, find and select the .eml or .msg file, and then click Open.
Choose a recipient who had an issue: Specify the recipient(s) that you would like to run a policy check against. The policy check will determine if the email was blocked due to user or organization policies or overrides.
Select a reason for submitting to Microsoft: Select Should not have been blocked (False positive), and then configure the following settings:
Allow emails with similar attributes (URL, sender, etc.): Turn on this setting
.
Remove allow entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- Specific date: The maximum value is 30 days from today.
For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
Allow entry note: Enter optional information about why you're allowing and submitting this email message.
For spoofed senders, any value you enter here is not shown in the allow entry on the Spoofed senders tab on the Tenant Allow/Block List.
When you're finished, click Submit, and then click Done.
After a few moments, the allow entries will appear on the Domains & addresses, Spoofed senders, URL, or Files tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Important
- Allow entries are added during mail flow based on the filters that determined the message was malicious. For example, if the sender email address and a URL in the message were determined to be bad, an allow entry is created for the sender (email address or domain) and the URL.
- If the sender email address is not found to be malicious by our filtering system, submitting the email message to Microsoft won't create an allow entry in the Tenant Allow/Block List.
- When an allowed domain or email address, spoofed sender, URL, or file (entity) is encountered again, all filters that are associated with the entity are skipped. For email messages, all other entities are still evaluated by the filtering system before making a decision.
- During mail flow, if messages from the allowed domain or email address pass other checks in the filtering stack, the messages will be delivered. For example, if a message passes email authentication checks, a message from an allowed sender email address will be delivered.
- By default, allow entries for domains and email addresses exist for 30 days. During those 30 days, Microsoft will learn from the allow entries and remove them or automatically extend them. After Microsoft learns from the removed allow entries, messages from those domains or email addresses will be delivered, unless something else in the message is detected as malicious. By default, allow entries for spoofed senders never expire.
- For messages that were incorrectly blocked by domain or user impersonation protection, the allow entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the Trusted senders and domains section in the anti-phishing policy that detected the message.
- When you override the verdict in the spoof intelligence insight, the spoofed sender becomes a manual allow or block entry that only appears on the Spoofed senders tab in the Tenant Allow/Block List.
Report good email attachments to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, select the Email attachments tab.
On the Email attachments tab, click
Submit to Microsoft for analysis.
On the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value Email attachment is selected.
File: Click Browse files to find and select the file to submit.
Select a reason for submitting to Microsoft: Select Should not have been blocked (False positive), and then configure the following settings:
Allow this file: Turn on this setting
.
Remove allow entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- Specific date: The maximum value is 30 days from today.
Allow entry note: Enter optional information about why you're allowing and submitting this file.
When you're finished, click Submit, and then click Done.
After a few moments, the allow entry will appear on the Files tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Note
- By default, allow entries for files exist for 30 days. During those 30 days, Microsoft will learn from the allow entries and remove them or automatically extend them. After Microsoft learns from the removed allow entries, messages that contain those files will be delivered, unless something else in the message is detected as malicious.
- When the file is encountered again during mail flow, Safe Attachments detonation or file reputation checks and all other file-based filters are overridden. If the filtering system determines that all other entities in the email message are clean, the message will be delivered.
- During selection, all file-based filters, including Safe Attachments detonation or file reputation checks are overridden, allowing user access to the file.
Report good URLs to Microsoft
For URLs reported as false positives, we'll allow subsequent messages that contain variations of the original URL. For example, you use the Submissions page to report the incorrectly blocked URL www.contoso.com/abc
. If your organization later receives a message that contains the URL (for example but not limited to: www.contoso.com/abc
, www.contoso.com/abc?id=1
, www.contoso.com/abc/def/gty/uyt?id=5
, or *.contoso.com/abc
), the message won't be blocked based on the URL. In other words, you don't need to report multiple variations of the same URL as good to Microsoft.
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, select the URLs tab
On the URLs tab, click
Submit to Microsoft for analysis.
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type: Verify the value URL is selected.
URL: Enter the full URL (for example,
https://www.fabrikam.com/marketing.html
), and then select it in the box that appears. You can also provide a top level domain (for example,https://www.fabrikam.com/*
), and then select it in the box that appears. You can enter up to 50 URL at once.Select a reason for submitting to Microsoft: Select Should not have been blocked (False positive), and then configure the following settings:
Allow this URL: Turn on this setting
.
Remove allow entry after: The default value is 30 days, but you can select from the following values:
- 1 day
- 7 days
- 30 days
- Specific date: The maximum value is 30 days from today.
Allow entry note: Enter optional information about why you're allowing and submitting this URL.
When you're finished, click Submit, and then click Done.
After a few moments, the allow entry will appear on the URL tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage allows and blocks in the Tenant Allow/Block List.
Note
- By default, allow entries for URLs exist for 30 days. During those 30 days, Microsoft will learn from the allow entries and remove them or automatically extend them. After Microsoft learns from the removed allow entries, messages that contain those URLs will be delivered, unless something else in the message is detected as malicious.
- When the URL is encountered again during mail flow, Safe Links detonation or URL reputation checks and all other URL-based filters are overridden. If the filtering system determines that all other entities in the email message are clean, the message will be delivered.
- During selection, all URL-based filters, including Safe Links detonation or URL reputation checks are overridden, allowing user access to content at the URL.
View email admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Emails tab is selected.
You can sort the entries by clicking on an available column header.
Click
Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
- Submission name*
- Sender*
- Recipient
- Date submitted*
- Reason for submitting*
- Original verdict*
- Status*
- Result*
- Delivery/Block reason
- Submission ID
- Network Message ID
- Direction
- Sender IP
- Bulk compliant level (BCL)
- Destination
- Policy action
- Submitted by
- Phish simulation
- Tags*
- Action
When you're finished, click Apply.
To filter the entries, click
Filter. The following values are available in the Filter flyout that appears:
- Date submitted: Start date and End date values.
- Submission ID: A GUID value that's assigned to every submission.
- Network Message ID
- Sender
- Recipient
- Submission name
- Submitted by
- Reason for submitting: The values are Not junk, Phish, Malware, and Spam.
- Status: The values are Pending and Completed.
- Tags: The default value is All or select a user tag from the drop-down list.
When you're finished, click Apply. To clear existing filters, click
Clear filters in the Filter flyout.
To group the entries, click
Group and select one of the following values from the dropdown list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click
Export. In the dialog that appears, save the .csv file.
View email attachment admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Email attachments tab is selected.
You can sort the entries by clicking on an available column header.
Click
Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
- Attachment filename*
- Date submitted*
- Reason for submitting*
- Status*
- Result*
- Filter verdict
- Delivery/Block reason
- Submission ID
- Object ID
- Policy action
- Submitted by
- Tags*
- Action
When you're finished, click Apply.
To filter the entries, click
Filter. The following values are available in the Filter flyout that appears:
- Date submitted: Start date and End date.
- Submission ID: A GUID value that's assigned to every submission.
- Attachment filename
- Submitted by
- Reason for submitting: The values are Not junk, Phish, Malware, and Spam.
- Status: The values are Pending and Completed.
- Tags: The default value is All or select a user tag from the drop-down list.
When you're finished, click Apply.
To group the entries, click
Group and select one of the following values from the drop-down list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click
Export. In the dialog that appears, save the .csv file.
View URLs admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the URLs tab is selected.
You can sort the entries by clicking on an available column header.
Click
Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
- URL*
- Date submitted*
- Reason for submitting*
- Status*
- Result*
- Filter verdict
- Delivery/Block reason
- Submission ID
- Object ID
- Policy action
- Submitted by
- Tags*
- Action
When you're finished, click Apply.
To filter the entries, click
Filter. The following values are available in the Filter flyout that appears:
- Date submitted: Start date and End date.
- Submission ID: A GUID value that's assigned to every submission.
- URL
- Submitted by
- Reason for submitting: The values Not junk, Phish, Malware, and Spam.
- Status: The values are Pending and Completed.
- Tags: The default value is All or select a user tag from the drop-down list.
When you're finished, click Apply. To clear existing filters, click
Clear filters in the Filter flyout.
To group the entries, click
Group and select one of the following values from the dropdown list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click
Export. In the dialog that appears, save the .csv file.
Admin submission result details
Messages that are submitted in admin submissions are reviewed by Microsoft and results shown in the submissions detail flyout:
- If there was a failure in the sender's email authentication at the time of delivery.
- Information about any policies or overrides that could have affected or overridden the message verdict from filtering system.
- Current detonation results to see if the URLs or files contained in the message were malicious or not.
- Feedback from graders.
If an override or policy configuration was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override or policy, the detonation and feedback from graders could take up to a day.
View user reported messages to Microsoft
If you've deployed the Microsoft Report Message or Report Phishing add-ins or if people use the built-in Report button in Outlook on the web, you can see what users are reporting on the User reported tab on the Submissions page.
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions > User reported tab. To go directly to the User reported tab, use https://security.microsoft.com/reportsubmission?viewid=user.
On the User reported tab, the following settings are available:
Click
Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
- Submission name*
- Reported by*
- Date reported*
- Sender*
- Reported reason*
- Original verdict*
- Result*
- Message reported ID
- Network Message ID
- Sender IP
- Reported from
- Phish simulation
- Converted to admin submission
- Tags*
- Marked as*
- Marked by
- Date marked
When you're finished, click Apply.
To filter the entries, click
Filter. The following values are available in the Filter flyout that appears:
- Date reported: Start date and End date.
- Reported by
- Name
- Message reported ID
- Network Message ID
- Sender
- Reported reason: The values are Not junk, Phish, or Spam.
- Reported from: The values are Microsoft or Third party.
- Phish simulation: The values are Yes or No.
- Converted to admin submission: The values are Yes or No.
- Tags: The default value is All or select a user tag from the drop-down list.
When you're finished, click Apply. To clear existing filters, click
Clear filters in the Filter flyout.
To group the entries, click
Group and select one of the following values from the dropdown list:
- None
- Reason
- Sender
- Reported by
- Original verdict
- Result
- Reported from
- Phish simulation
- Converted to admin submission
- Tags
To export the entries, click
Export. In the dialog that appears, save the .csv file.
To notify users, see Admin Review for Reported messages
Note
User reported messages that are sent only to the reporting mailbox (not to Microsoft) appear on the User reported tab on the Submissions page, but the Result value for those entries is Not Submitted to Microsoft (because these messages aren't analyzed by Microsoft).
Undo user reported messages
Once a user reports a suspicious message that's delivered to the reporting mailbox, to Microsoft, or both, the user or admins can't undo the reported message. The user can recover the messages from their Deleted Items or Junk Email folders.
Convert user reported messages in the reporting mailbox into admin submissions
If you've configured the reporting mailbox to intercept user reported messages without sending the messages to Microsoft, admins can find and manually send specific messages to Microsoft for analysis.
On the User reported tab at https://security.microsoft.com/reportsubmission?viewid=user, select a message from the list, click Submit to Microsoft for analysis, and then select one of the following values from the dropdown list:
If the message is reported to Microsoft, the Converted to admin submission value turns from no to yes. You can directly access the admin submission by clicking View the converted admin submission from the More options menu on the submission flyout of the message.
View associated alert for user and admin email submissions
Note
The information in this section applies only to Defender for Office 365 Plan 2 or higher.
For each user reported message and admin email submission, a corresponding alert is generated.
To view the corresponding alert for a user reported phishing message, go to the User reported tab at https://security.microsoft.com/reportsubmission?viewid=user, and then double-click the message to open the submission flyout. Click More options and then select View alert.
To view the corresponding alert for admin email submissions, go to the Emails tab at https://security.microsoft.com/reportsubmission?viewid=email, and then double-click the message to open the submission flyout. Select View alert on the Open email entity option.
Feedback
Submit and view feedback for