A potentially malicious URL click was detected |
Generates an alert when a user protected by Safe Links in your organization clicks a malicious link. This alert is generated when a user clicks on a link and this event triggers a URL verdict change identification by Microsoft Defender for Office 365. It also checks for any clicks in the past 48 hours from the time the malicious URL verdict is identified, and generates alerts for the clicks that happened in the 48-hour timeframe for that malicious link. This alert automatically triggers automated investigation and response in Defender for Office 365 Plan 2. For more information on events that trigger this alert, see Set up Safe Links policies. |
High |
Yes |
E5/G5 or Defender for Office 365 Plan 2 add-on subscription. |
A Tenant Allow Block List entry has been found malicious |
Generates an alert when Microsoft determines that the admin submission corresponding to an allow entry in the Tenant Allow/Block List is found to be malicious. This event is triggered as soon as the submission is analyzed by Microsoft.
The allow entry will continue to exist for its stipulated duration. For more information on events that trigger this alert, see Manage the Tenant Allow/Block list. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
A user clicked through to a potentially malicious URL |
Generates an alert when a user protected by Safe Links in your organization clicks a malicious link. This event is triggered when user clicks on a URL (which is identified as malicious or pending validation) and overrides the Safe Links warning page (based on your organization's Microsoft 365 for business Safe Links policy) to continue to the URL hosted page / content. This alert automatically triggers automated investigation and response in Defender for Office 365 Plan 2. For more information on events that trigger this alert, see Set up Safe Links policies. |
High |
Yes |
E5/G5 or Defender for Office 365 Plan 2 add-on subscription. |
Admin submission result completed |
Generates an alert when an Admin Submission completes the rescan of the submitted entity. An alert is triggered every time a rescan result is rendered from an Admin Submission.
These alerts are meant to remind you to review the results of previous submissions, submit user reported messages to get the latest policy check and rescan verdicts, and help you determine if the filtering policies in your organization are having the intended impact. |
Informational |
No |
E1/F1, E3/F3, or E5 |
Admin triggered manual investigation of email |
Generates an alert when an admin triggers the manual investigation of an email from Threat Explorer. For more information, see Example: A security administrator triggers an investigation from Threat Explorer.
This alert notifies your organization that the investigation was started. The alert provides information about who triggered it and includes a link to the investigation. |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Admin triggered user compromise investigation |
Generates an alert when an admin triggers the manual user compromise investigation of either an email sender or recipient from Threat Explorer. For more information, see Example: A security administrator triggers an investigation from Threat Explorer, which shows the related manual triggering of an investigation on an email.
This alert notifies your organization that the user compromise investigation was started. The alert provides information about who triggered it and includes a link to the investigation. |
Medium |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Creation of forwarding/redirect rule |
Generates an alert when someone in your organization creates an inbox rule for their mailbox that forwards or redirects messages to another email account. This policy only tracks inbox rules that are created using Outlook on the web (formerly known as Outlook Web App) or Exchange Online PowerShell. For more information about using inbox rules to forward and redirect email in Outlook on the web, see Use rules in Outlook on the web to automatically forward messages to another account. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
eDiscovery search started or exported |
Generates an alert when someone uses the Content search tool in the Microsoft Purview portal. An alert is triggered when the following content search activities are performed: - A content search is started.
- The results of a content search are exported.
- A content search report is exported.
Alerts are also triggered when the previous content search activities are performed in association with an eDiscovery case. For more information about content search activities, see Search for eDiscovery activities in the audit log. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Email messages containing malicious file removed after delivery |
Generates an alert when any messages containing a malicious file are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using Zero-hour auto purge. This policy automatically triggers automated investigation and response in Office 365. For more information on this new policy, see New alert policies in Defender for Office 365. |
Informational |
Yes |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Email messages containing malicious URL removed after delivery |
Generates an alert when any messages containing a malicious URL are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using Zero-hour auto purge. This policy automatically triggers automated investigation and response in Office 365. For more information on this new policy, see New alert policies in Defender for Office 365. |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Email messages containing malware removed after delivery |
Note: This alert policy was replaced by Email messages containing malicious file removed after delivery. This alert policy will eventually go away, so we recommend disabling it and using Email messages containing malicious file removed after delivery instead. For more information, see New alert policies in Defender for Office 365. |
Informational |
Yes |
E5/G5 or Defender for Office 365 Plan 2 add-on subscription. |
Email messages containing phish URLs removed after delivery |
Note: This alert policy was replaced by Email messages containing malicious URL removed after delivery. This alert policy will eventually go away, so we recommend disabling it and using Email messages containing malicious URL removed after delivery instead. For more information, see New alert policies in Defender for Office 365. |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Email messages from a campaign removed after delivery |
Generates an alert when any messages associated with a Campaign are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using Zero-hour auto purge. This policy automatically triggers automated investigation and response in Office 365. For more information on this new policy, see New alert policies in Defender for Office 365. |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Email messages removed after delivery |
Generates an alert when any malicious messages that don't contain a malicious entity (URL or File), or associated with a Campaign, are delivered to mailboxes in your organization. If this event occurs, Microsoft removes the infected messages from Exchange Online mailboxes using Zero-hour auto purge. This policy automatically triggers automated investigation and response in Office 365. For more information on this new policy, see New alert policies in Defender for Office 365. |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Email reported by user as junk |
Generates an alert when users in your organization report messages as junk using the built-in Report button in Outlook or the Report Message add-in. For more information about the add-ins, see Use the Report Message add-in. |
Low |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Email reported by user as malware or phish |
Generates an alert when users in your organization report messages as phishing using the built-in Report button in Outlook or the Report Message or Report Phishing add-ins. For more information about the add-ins, see Use the Report Message add-in. For Defender for Office 365 Plan 2, E5, G5 customers, this alert automatically triggers automated investigation and response in Defender for Office 365 Plan 2. |
Low |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Email reported by user as not junk |
Generates an alert when users in your organization report messages as not junk the built-in Report button in Outlook or the Report Message add-in. For more information about the add-ins, see Use the Report Message add-in. |
Low |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Email sending limit exceeded |
Generates an alert when someone in your organization has sent more mail than is allowed by the outbound spam policy. This is usually an indication the user is sending too much email or that the account might be compromised. If you get an alert generated by this alert policy, it's a good idea to check whether the user account is compromised. |
Medium |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Failed exact data match upload |
Generates an alert when a user receives the following error when uploading an exact data match based sensitive information type: New sensitive information failed to upload. Try again later. |
High |
No |
E5/G5. |
Form blocked due to potential phishing attempt |
Generates an alert when someone in your organization is restricted from sharing forms and collecting responses using Microsoft Forms due to detected repeated phishing attempt behavior. |
High |
No |
E1, E3/F3, or E5 |
Form flagged and confirmed as phishing |
Generates an alert when a form created in Microsoft Forms from within your organization is identified as potential phishing through Report Abuse and confirmed as phishing by Microsoft. |
High |
No |
E1, E3/F3, or E5 |
Malware not zapped because ZAP is disabled |
Generates an alert when Microsoft detects delivery of a malware message to a mailbox because Zero-Hour Auto Purge for Phish messages is disabled. |
Informational |
No |
E5/G5 or Defender for Office 365 Plan 2 add-on subscription. |
Messages containing malicious entity not removed after delivery |
Generates an alert when any message containing malicious content (file, URL, campaign, no entity), is delivered to mailboxes in your organization. If this event occurs, Microsoft attempted to remove the infected messages from Exchange Online mailboxes using Zero-hour auto purge, but the message wasn't removed due to a failure. Additional investigation is recommended. This policy automatically triggers automated investigation and response in Office 365. |
Medium |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
MIP AutoLabel simulation completed |
Generates an alert when anservice-side auto-labeling policy in simulation mode has completed. |
Low |
No |
E5/G5. |
Phish delivered due to an ETR override¹ |
Generates an alert when Microsoft detects an Exchange transport rule (also known as a mail flow rule) that allowed delivery of a high confidence phishing message to a mailbox. For more information about Exchange Transport Rules (Mail flow rules), see Mail flow rules (transport rules) in Exchange Online. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Phish delivered due to an IP allow policy¹ |
Generates an alert when Microsoft detects an IP allow policy that allowed delivery of a high confidence phishing message to a mailbox. For more information about the IP allow policy (connection filtering), see Configure the default connection filter policy - Office 365. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Phish not zapped because ZAP is disabled¹ |
Generates an alert when Microsoft detects delivery of a high confidence phishing message to a mailbox because Zero-Hour Auto Purge for Phish messages is disabled. |
Informational |
No |
E5/G5 or Defender for Office 365 Plan 2 add-on subscription. |
Potential nation-state activity |
Microsoft Threat Intelligence Center detected an attempt to compromise accounts from your tenant. |
High |
No |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Purview policy simulation completed |
Generates an alert to notify admins when simulation is complete for any Purview policy that supports simulation mode. |
Low |
No |
E5/G5 |
Remediation action taken by admin on emails or URL or sender |
Note: This alert policy wasn replaced by Administrative action submitted by an Administrator. This alert policy will eventually go away, so we recommend disabling it and using Administrative action submitted by an Administrator instead.
This alert is triggered when an admin takes remediation action on the selected entity |
Informational |
Yes |
Microsoft 365 Business Premium, Defender for Office 365 Plan 1 add-on, E5/G5, or Defender for Office 365 Plan 2 add-on. |
Removed an entry in Tenant Allow/Block List |
Generates an alert when an allow entry in the Tenant Allow/Block List is learned from by filtering system and removed. This event is triggered when the allow entry for the affected domain or email address, file, or URL (entity) is removed.
You no longer need the affected allow entry. Email messages that contain the affected entities are delivered to the Inbox if nothing else in the message is determined to be bad. URLs and files will be allowed at time of click.
For more information on events that trigger this alert, see Manage the Tenant Allow/Block list. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Retention Auto-labeling policy simulation completed |
Generates an alert when a retention auto-labeling policy simulation has completed. |
Low |
No |
E5/G5 |
Successful exact data match upload |
Generates an alert after a user successfully uploads an exact data match based sensitive information type. |
Low |
No |
E5/G5 |
Suspicious connector activity |
Generates an alert when a suspicious activity is detected on an inbound connector in your organization. Mail is blocked from using the inbound connector. The admin receives an email notification and an alert. This alert provides guidance on how to investigate, revert changes, and unblock a restricted connector. To learn how to respond to this alert, see Respond to a compromised connector. |
High |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Suspicious email forwarding activity |
Generates an alert when someone in your organization has autoforwarded email to a suspicious external account. This is an early warning for behavior that might indicate the account is compromised, but not severe enough to restrict the user. Although it's rare, an alert generated by this policy might be an anomaly. It's a good idea to check whether the user account is compromised. |
High |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Suspicious email sending patterns detected |
Generates an alert when someone in your organization has sent suspicious email and is at risk of being restricted from sending email. This is an early warning for behavior that might indicate that the account is compromised, but not severe enough to restrict the user. Although it's rare, an alert generated by this policy might be an anomaly. However, it's a good idea to check whether the user account is compromised. |
Medium |
Yes |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Suspicious tenant sending patterns observed |
Generates an alert when Suspicious sending patterns have been observed in your organization, which might lead to your organization being blocked from sending emails. Investigate any potentially compromised user and admin accounts, new connectors, or open relays to avoid tenant exceed threshold blocks. For more information about why organizations are blocked, see Fix email delivery issues for error code 5.7.7xx in Exchange Online. |
High |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Teams message reported by user as security risk |
This alert is triggered when users report a Teams message as a security risk. |
Low |
No |
E5/G5 or Defender for Office 365 add-on. |
Tenant Allow/Block List entry is about to expire |
Generates an alert when an allow entry or block entry in the Tenant Allow/Block List entry is about to be removed. This event is triggered seven days before the expiration date, which is based on when the entry was created or last updated.
For both allow entries and block entries, you can extend the expiration date. For more information on events that trigger this alert, see Manage the Tenant Allow/Block list. |
Informational |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Tenant restricted from sending email |
Generates an alert when most of the email traffic from your organization is detected as suspicious and Microsoft has restricted your organization from sending email. Investigate any potentially compromised user and admin accounts, new connectors, or open relays, and then contact Microsoft Support to unblock your organization. For more information about why organizations are blocked, see Fix email delivery issues for error code 5.7.7xx in Exchange Online. |
High |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
Tenant restricted from sending unprovisioned email |
Generates an alert when too much email is being sent from unregistered domains (also known as unprovisioned domains). Office 365 allows a reasonable amount of email from unregistered domains, but you should configure every domain that you use to send email as an accepted domain. This alert indicates that all users in the organization can no longer send email. For more information about why organizations are blocked, see Fix email delivery issues for error code 5.7.7xx in Exchange Online. |
High |
No |
E1/F1/G1, E3/F3/G3, or E5/G5 |
User requested to release a quarantined message |
Generates an alert when a user requests release for a quarantined message. To request the release of quarantined messages, the Allow recipients to request a message to be released from quarantine (PermissionToRequestRelease) permission is required in the quarantine policy (for example, from the Limited access preset permissions group). For more information, see Allow recipients to request a message to be released from quarantine permission. |
Informational |
No |
Microsoft Business Basic, Microsoft Business Standard, Microsoft Business Premium, E1/F1/G1, E3/F3/G3, or E5/G5 |
User restricted from sending email |
Generates an alert when someone in your organization is restricted from sending outbound mail. This alert typically indicates a compromised account where the user is listed on the Restricted entities page at https://security.microsoft.com/restrictedentities. For more information about restricted users, see Remove blocked users from the Restricted entities page. |
High |
Yes |
Microsoft Business Basic, Microsoft Business Standard, Microsoft Business Premium, E1/F1/G1, E3/F3/G3, or E5/G5 |
User restricted from sharing forms and collecting responses |
Generates an alert when someone in your organization is restricted from sharing forms and collecting responses using Microsoft Forms due to detected repeated phishing attempt behavior. |
High |
No |
E1, E3/F3, or E5 |