Updated May 17, 2022: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Office 365 offers many default alert policies. One of the current default alert policy, A potentially malicious URL click was detected, generates alerts when users click URLs (which are potentially malicious) in email messages. Currently, there are two scenarios that generate this alert. This message is associated with Microsoft 365 Roadmap ID 93211.
we are enhancing the existing Microsoft Defender for Office 365 alert policy (A potentially malicious URL click was detected).
- The URL verdict changes to bad after the user has already clicked it.
- A user clicks through (overrides the warning page) for a known, bad URL.
As part of the work to expand the scope of the alert for user clicks in workloads other than email (future roadmap), we’re splitting the existing alert policy based on those two scenarios.
The current alert policy ‘A potentially malicious URL click was detected’ will cover the ‘URL verdict change’ (# 1 above) scenario.
A new default alert policy named ‘A user clicked through to a potentially malicious URL’ will now cover the click through (# 2 above) scenario. The functionality in terms of alert generation, notification, AIR, and Incident correlation remain the same.
When this will happen
We expect this rollout to begin in early June (previously mid-May) and expect the rollout to be completed by late July (previously late June).
How this will affect your organization
This change should not have any effect on security and alert detection in your organization. You can review both default alerts in the portal. However, if you’re exporting these alerts into external systems, you’ll need to include the new alert generated by the new policy.
What you need to do to prepare
If you’re exporting these alerts to external systems for processing (via APIs), you will also need to set up the export of the new policy.
Message ID: MC355215
Published: 09 April 2022
Updated: 17 May 2022