Feedback by UserVoice

Office 365 Security & Compliance

We have partnered with UserVoice, a third-party service and your use of the portal and your submission is subject to the UserVoice Terms of Service & Privacy Policy. Please do not send any novel or patentable ideas, copyrighted materials, samples or demos for which you do not want to grant a license to Microsoft.

Welcome to the Security (Protection) & Compliance UserVoice forum. We’re happy you’re here! If you have suggestions or ideas on how to improve Security or Compliance related features in O365, we’d love to hear them!

How it works
◾Check out the ideas others have suggested and vote on your favorites
◾If you have a suggestion that’s not listed yet, submit your own — 25 words or less, please
◾Include one suggestion per post

Thanks for joining our community and helping improve these features in Office 365!

Need Tech Support? Please see the O365 Community for the product or feature you are having issues with, or open a support ticket through your Office 365 administrator portal.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Allow the ability to move files within OneDrive when conditional access app restrictions are applied.

    When application restrictions are applied to SharePoint/One Drive and conditional access is used to apply this to un-trusted devices the users are unable to download/sync/print to avoid data leakage which is the expected behavior however users are unable to move files/folders within one drive itself which appears a serious limitation as the data is not being removed simply relocated within itself.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  3. Recording a log of files deleted by retention policy

    Add a feature that can record a log of files deleted by retention policy which set to delete content after its retention period.
    It would be nice if we could see the file names and the deleted data in the log.

    6 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Compliance Manager  ·  Flag idea as inappropriate…  ·  Admin →
  4. ATP safe-links sould not break DKIM signatures when forwarding email outside O365.

    Considering the following scenario:
    - An incoming mail (DKIM signed) arrives from an extrenal domain.
    - The domain in O365 is protected by ATP safelinks.
    - ATP safelinks rewrite URLs and email is delivered to mailbox.
    - The email is forwarded to the external domain (but DKIM is now broken since the contents of the email were modified by ATP Safelinks).
    - When forwarded email arrives at external domain that has a reject DMARC policy in place, the email will automatically fail validation and will be delivered to SPAM folder.

    If user has forward enabled in his account, email should…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Journaling Rule - Domain Filter

    We have one office 365 tenant but multiple regions, which use different smart hosts for email filtering.

    It would be appreciated to filter the mail from a domain/domains in the sent or received from columns rather than creating groups.

    8 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  6. Please create a PowerShell cmdlet to schedule when exporting malware of Real-time detections

    I would like you to create a PowerShell cmdlet to schedule when exporting malware of Real-time detections.

    4 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Malware  ·  Flag idea as inappropriate…  ·  Admin →
  7. Conversation function in outlook

    users can see the complete conversation history when they click on the "you are not responding to the latest message in this conversation"- message. User can now see all e-mails in the conversation. Also when they excluded from the conversation or the email was forwarded to other persons. We see in this an privacy problem.
    Scenario:
    person has a conversation with his manager via e-mail, he forwarded this mails to the works Council with a bad comment.
    The manager want to forward his last e-mail to another person and received the message " you are not responding to the latest…

    3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Privacy  ·  Flag idea as inappropriate…  ·  Admin →
  8. Why is it that Secure Score states Audit for all users is not enabled. yet it is and I can run reports

    In Secure Score improvement actions it states I should enable auditing for all users. As far as I can see this is enabled and I regularly run audit reports and take action against them. Is this a fault in secure score or am I missing another switch somewhere.
    Why does Secure Score not allow admins to enable elements directly instead of going hunting for settings.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  9. Audit Log for Emails downloaded from Threat Explorer

    SOC analysts often download email bodies from Threat Explorer to do further investigation. Currently there is no audit log for the action of downloading an email from Threat Explorer, which makes it hard to put controls around this wide reaching permission. Please include the action of downloading an email from Threat Explorer into the O365 Audit Log.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  10. Enable auditing of Administrator actions in O365 Security & Compliance Center

    Please enable auditing of Administrator actions in O365 Security & Compliance Center (O365 S&CC) .

    Cause creating or changing DLP policies does not have show any tracking activities in the O365 S&CC -> Search -> Audit log search.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  11. Export data in View alerts by using PowerShell

    Regarding with the exporting data in View alerts via Office 365 Security & Compliance, it would be great if we could run it by using Windows PowerShell as it is more convenient.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. Want to select a security group for the Add a condition option when creating a new alert policy

    If we could select a security group from the Add a condition option when creating a new alert policy via O365 Security & Compliance. If this option would be available, it would be more convenient when selecting multiple users.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  13. Improve mailbox audit action controls

    Audit mailboxes by default? Great!
    Automatically get new audit actions added to the default audit set? Great!
    Modify the default audit set as you see fit? Also great!
    Having to choose between modifying the set yourself or letting Microsoft add new features automatically? Stupid.

    We should be able to set the default set as required for our compliance, and still be able to tick a box to choose whether to let Microsoft add new audit actions when the become available.

    3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  14. Looking up OneDrive accounts on eDiscovery

    The options currently available to find a user's OneDrive are not intuitive enough, its based out on guess work, there should be an interface that, just as searching for mailboxes, show the OneDrive sites for all the "Smith, John"'s on the tenant

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  15. ATP

    Better heuristics and behavior scanning for ATP Safelinks to catch phishing URLS from Google and AWS storage buckets. ATP has not been catching URLs from these paths.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  16. 3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  17. Need a public-facing information describing about permissions to access or operate the new Security/Compliance Center

    Currently, there is no information about permissions for the new Security/Compliance Center. If we could have a public-facing information describing about details in what kind of permissions can be used, our admin would be able to optionally set various combinations of permissions. So, please provide us the information.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  18. Keep an audit trail when quarantined emails are deleted or released

    Currently if a user or admin deletes or releases an email from quarantine, there is no history or log of this occurring. I think it is a VITAL feature to be able to keep a record of this! What if a user maliciously releases an infected email? Or if a user deleted a mission critical email, maybe even inadvertently...

    3 votes
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  19. Support .csv files in DLP Policies

    Support .csv files in DLP Policies

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  20. Onenote data cannot be searched or downloaded

    Currently, data within OneNote notebooks cannot be searched for, or downloaded on behalf of users.

    OneNote data for users who leave cannot be archived for regulatory purposes, which has been confirmed in support ticket 17519242.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Compliance Manager  ·  Flag idea as inappropriate…  ·  Admin →
← Previous 1 3 4 5 105 106
  • Don't see your idea?

Feedback and Knowledge Base