Feedback by UserVoice

Office 365 Security & Compliance

We have partnered with UserVoice, a third-party service and your use of the portal and your submission is subject to the UserVoice Terms of Service & Privacy Policy. Please do not send any novel or patentable ideas, copyrighted materials, samples or demos for which you do not want to grant a license to Microsoft.

Welcome to the Security (Protection) & Compliance UserVoice forum. We’re happy you’re here! If you have suggestions or ideas on how to improve Security or Compliance related features in O365, we’d love to hear them!

How it works
◾Check out the ideas others have suggested and vote on your favorites
◾If you have a suggestion that’s not listed yet, submit your own — 25 words or less, please
◾Include one suggestion per post

Thanks for joining our community and helping improve these features in Office 365!

Need Tech Support? Please see the O365 Community for the product or feature you are having issues with, or open a support ticket through your Office 365 administrator portal.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. release quarantine email to junk mail

    When releasing email allow the Admin the ability to release to Junk Mail folder instead of directly to inbox.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  2. How do I get my IP off of your spam blacklist?

    Every few days, you re-add my server, 3.16.178.106, to your spam blacklist, even after I fill out the removal form. How do I make this stop? Both I and your customers thank you in advance.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  Flag idea as inappropriate…  ·  Admin →
  3. need interpol six plus yrs ago ***** n local law clueless Must stop felons cyber crime targeting sos

    WoSign cert not trusted on Apple no good digital certificates public connection always gatekeepers decryption shipping pirates communications transmissions keywords give messages need to further decode interpol advised extremely high tech criminal maneuvers need speak in private phones,pc s,even pc less fax machine making passes passports when connected to Burvaska or Chinese administrators blocked communications i have to try everything someone has to know what i witness daily on devices shocking wat do i do when Gulf of Guinea ships robbers pirates use my devices educate me need to but can’t trust nothing or no one advise gotta go i’m…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  4. As banks do, send warning emails if something significant is changed....

    If something is changed (as my example, a rule was set-up to forward all emails to an address not even in my contacts list), a warning text or email should be sent to confirm its authorised. In my case I was unaware that all my emails were being forwarded, they don't even appear in your sent box so you have no way of being warned! Also when you first take out an Office 365 account why isn't the audit facility raised as an issue as it is set to off by default so when you investigate a problem, its the…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  5. Twud b very useful to allow junk mail folder email to be fwd'd to another mailbox as notification rather than do this globally

    Large organisations have many mailboxes. Having spam notifications only set globally for notifications of emails being sent to junk mail is not suitable. There should be a way to notify specified users, DL or mailbox that mail destined for a particular mailbox was treated as spam. Oftentimes there are many senders to internal mailboxes and some are infrequent yet must not be missed. As they are infrequent they are often not whitelisted. Which is fine. As long as we know they've been blocked and moved to junk mail as some mailboxes are system mailboxes and not read by humans at…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  6. Is there a way to "white-list" quaratined e-mail from known providers?

    We have known providers the send us e-mails in regular intervals, or whenever we request services. They are now being qurantied for unknown reasons.
    We would like to "white-list" selected senders, so we won't miss their communications and do not have to go through a manual release process every time.
    Thank you
    Roger

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  7. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  8. Allow Administrator to Remove Enrolled Device

    I see a user device in the Intune Mobile Device Management for Office 365. It is not a company owned device and the user does not recognize it as personal device. We would like to remove it as a trusted/enrolled device.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  9. Put a verified badge on the users "picture area" like in twitter (verified by) when the user as being sent internally.

    Put a verified badge on the users "picture area" like in twitter (verified by) when the user as being sent internal.
    Instead of tool tips, please put a verified check mark like twitter on a users picture area when the email is sent from inside the organization from an authenticated account. This would be equivalent to at least confirming the email was sent from a user who was able to authenticate to the account and be easier to catch than the tool tips.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  10. Forwarding a message that contains these so-called "safe" links is a nightmare.

    These so-called "safe" links are a nightmare from a usability standpoint and needlessly obscurew the original link. It is imprtant to have the ability for users to see clearly the original destination of each link so that they can evaluate for themselves the trustworhiness of the oringinal site. (For example, most mail readers have the ability to hover over a URL to see where it actually points and this is disabled by ATP re-rwitten URLs.). Please fix this usability disaster.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    2 comments  ·  Service Trust Portal  ·  Flag idea as inappropriate…  ·  Admin →
  11. Easy to access support

    Hi,

    Sounds silly, but after spending close to 2 hours navigating the MS support teams it makes sense to me. Either update the Office 365 "New support" area to allow support tickets for attack simulator, or have a link within the webapp to log bugs either into the support teams or via github.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. Does the single PST file with size of 50 gb fails in import pst job

    Im performing the migration using azcopy and network upload method to import the pst files to office365.

    What is the chances of success / failure if single file is of around 40- 50 gb?

    Kindly suggest.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
  13. Provide ability to conduct an Audit on permission changes in a SharePoint list. ie I want to know who has changed permissions on a SP list.

    Provide ability to conduct an Audit on permission changes in a SharePoint 365 list. ie I want to know who has changed permissions on a specific SharePoint list. Audit log search does not allow for this.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  14. Is there a process to remove your link from the list of malicious links?

    I'm part of a team that sends out emails on behalf of our users. We have an internal process to filter out phishing emails. Unfortunately, the emails embedded in our links have been classified as malicious by Office 365 Advanced Threat Protection. Is there a process to remove our links from your list of malicious URLs? Thank you!

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  15. Why is it that Secure Score states Audit for all users is not enabled. yet it is and I can run reports

    In Secure Score improvement actions it states I should enable auditing for all users. As far as I can see this is enabled and I regularly run audit reports and take action against them. Is this a fault in secure score or am I missing another switch somewhere.
    Why does Secure Score not allow admins to enable elements directly instead of going hunting for settings.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  16. Macro to Make the Audit Report Useable

    Here is the Excel Macro code to the take the csv file from the Audit Log Search - Export file. If you add these two macros to your file, you will be able to see a report that actually usable!

    Sub AuditFileRepair()
    '
    ' AuditFileRepair Macro
    '
    ' Keyboard Shortcut: Ctrl+Shift+M
    '

    Range(Selection, Selection.End(xlDown)).Select
    
    Selection.Replace What:="{""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""":""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""",""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""":", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=",""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows,
    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  17. Search by sender IP

    In https://protection.office.com/#/contentsearchbeta - We can search by Sender address (accepts *@domain), and recipient address.Can you add search by sender IP? Thanks

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  18. Allow us to retrieve the IP address used for Microsoft Teams via Content search

    Content search in Office 365 Security & Compliance does not allow us to retrieve the IP address used for Microsoft Teams, so I would like to retrieve it same as ones for other products.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  19. View initial app password when the MFA enabled

    Currently we are not able to check the newly generated initial app password when setting multi factor authentication. Previously, we were able to view the app password. We understand that no app password will be created due to the MFA integration. But if you are changing the behavior, I don’t want any app password to be created. Or if the initial app password will get generated, I would like it to be visible.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  20. O365 tenant security recommendation and InfoSec processes for O365?

    As so much work already done, we have recently deployed our tenant, can I have some template to address top key security challenges and also some process guidelines to make we sufficiently cater Corporate Security Team for any investigation?

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Reports  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base