Submit malware, non-malware, and other suspicious files to Microsoft for analysis
Note
If you're an admin in an organization with Exchange Online mailboxes, we recommend that you use the Submissions page in the Microsoft Defender portal to submit messages to Microsoft for analysis. For more information, see Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft.
You've probably heard the following best practices for years:
- Avoid opening messages that look suspicious.
- Never open an attachment from someone you don't know.
- Avoid opening attachments in messages that urge you to open them.
- Avoid opening files downloaded from the internet unless they're from a verified source.
- Don't use anonymous USB drives.
But what can you do if you receive a message with a suspicious attachment or have a suspicious file on your system? In these cases, you should submit the suspicious attachment or file to Microsoft. Conversely, if an attachment in an email message or file was incorrectly identified as malware or some other threat, you can submit that, too.
What do you need to know before you begin?
All Microsoft 365 organizations that send or receive email include anti-malware protection that's automatically enabled. For more information, see Anti-malware protection in EOP.
Messages with attachments that contain scripts or other malicious executables are considered malware, and you can use the procedures in this article to report them.
Messages with links to malicious sites are considered phishing. For more information about reporting phishing and good messages, see Report messages and files to Microsoft.
Files that block you from your accessing your system and demand money to open them are considered ransomware.
Submit malware files to Microsoft
Organizations that have a Microsoft Defender XDR subscription, or Microsoft Defender XDR for Endpoint Plan 2 can submit files using the Submissions page in the Microsoft Defender portal. For more information, see Use admin submission for submitting files in Microsoft Defender for Endpoint.
Or, you can go to the Microsoft Security Intelligence page at https://www.microsoft.com/wdsi/filesubmission to submit the file. To receive analysis updates, sign in or enter a valid email address. We recommend using your Microsoft work or school account.
After you've uploaded the file or files, note the Submission ID that's created for your sample submission (for example, 7c6c214b-17d4-4703-860b-7f1e9da03f7f
).
After we receive the sample, we'll investigate. If we determine that the sample file is malicious, we take corrective action to prevent the malware from going undetected.
If you continue receiving infected messages or attachments, then you should copy the message headers from the email message, and contact Microsoft Customer Service and Support for further assistance. Be sure to have your Submission ID ready as well.
Submit good files to Microsoft
Organizations that have a Microsoft Defender XDR Subscription or Microsoft Defender XDR for Endpoint Plan 2 can submit files using the Submissions page in the Microsoft Defender portal. For more information, see Use admin submission for submitting files in Microsoft Defender for Endpoint.
Or, you can go to the Microsoft Security Intelligence page at https://www.microsoft.com/wdsi/filesubmission to submit the file. To receive analysis updates, sign in or enter a valid email address. We recommend using your Microsoft work or school account.
You can also submit a file that you believe was incorrectly identified as malware to the website. (Just select No for the question Do you believe this file contains malware?)
After we receive the sample, we'll investigate. If we determine that the sample file is clean, we take corrective action to prevent the file from being detected as malware.