Feedback by UserVoice

Office 365 Security & Compliance

We have partnered with UserVoice, a third-party service and your use of the portal and your submission is subject to the UserVoice Terms of Service & Privacy Policy. Please do not send any novel or patentable ideas, copyrighted materials, samples or demos for which you do not want to grant a license to Microsoft.

Welcome to the Security (Protection) & Compliance UserVoice forum. We’re happy you’re here! If you have suggestions or ideas on how to improve Security or Compliance related features in O365, we’d love to hear them!

How it works
◾Check out the ideas others have suggested and vote on your favorites
◾If you have a suggestion that’s not listed yet, submit your own — 25 words or less, please
◾Include one suggestion per post

Thanks for joining our community and helping improve these features in Office 365!

Need Tech Support? Please see the O365 Community for the product or feature you are having issues with, or open a support ticket through your Office 365 administrator portal.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Does the single PST file with size of 50 gb fails in import pst job

    Im performing the migration using azcopy and network upload method to import the pst files to office365.

    What is the chances of success / failure if single file is of around 40- 50 gb?

    Kindly suggest.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
  2. Provide ability to conduct an Audit on permission changes in a SharePoint list. ie I want to know who has changed permissions on a SP list.

    Provide ability to conduct an Audit on permission changes in a SharePoint 365 list. ie I want to know who has changed permissions on a specific SharePoint list. Audit log search does not allow for this.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  3. Remove internal email domain in communication compliance

    When we check emails on communication compliance, we need to check emails sent to/received from external.
    However there is no function to remove emails communicating with internal(Filter function is not enough because we need to check all external domain)
    We would like to have a function to remove internal email quickly.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Communication Compliance  ·  Flag idea as inappropriate…  ·  Admin →
  4. Is there a process to remove your link from the list of malicious links?

    I'm part of a team that sends out emails on behalf of our users. We have an internal process to filter out phishing emails. Unfortunately, the emails embedded in our links have been classified as malicious by Office 365 Advanced Threat Protection. Is there a process to remove our links from your list of malicious URLs? Thank you!

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  5. Why is it that Secure Score states Audit for all users is not enabled. yet it is and I can run reports

    In Secure Score improvement actions it states I should enable auditing for all users. As far as I can see this is enabled and I regularly run audit reports and take action against them. Is this a fault in secure score or am I missing another switch somewhere.
    Why does Secure Score not allow admins to enable elements directly instead of going hunting for settings.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  6. Macro to Make the Audit Report Useable

    Here is the Excel Macro code to the take the csv file from the Audit Log Search - Export file. If you add these two macros to your file, you will be able to see a report that actually usable!

    Sub AuditFileRepair()
    '
    ' AuditFileRepair Macro
    '
    ' Keyboard Shortcut: Ctrl+Shift+M
    '

    Range(Selection, Selection.End(xlDown)).Select
    
    Selection.Replace What:="{""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""":""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""",""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=""":", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows, MatchCase:=False, SearchFormat:=False, _
    ReplaceFormat:=False
    Selection.Replace What:=",""", Replacement:="|", LookAt:=xlPart, _
    SearchOrder:=xlByRows,
    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  7. Search by sender IP

    In https://protection.office.com/#/contentsearchbeta - We can search by Sender address (accepts *@domain), and recipient address.Can you add search by sender IP? Thanks

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    1 comment  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  8. Allow Whitelisting of Attachment Types in O365

    Instead of the current blacklisting of attachment types possible in O365, users should be able to allow only Whitelisted Attachment types, which basically largely reduces the attack surface via email.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Communication Compliance  ·  Flag idea as inappropriate…  ·  Admin →
  9. View initial app password when the MFA enabled

    Currently we are not able to check the newly generated initial app password when setting multi factor authentication. Previously, we were able to view the app password. We understand that no app password will be created due to the MFA integration. But if you are changing the behavior, I don’t want any app password to be created. Or if the initial app password will get generated, I would like it to be visible.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  10. O365 tenant security recommendation and InfoSec processes for O365?

    As so much work already done, we have recently deployed our tenant, can I have some template to address top key security challenges and also some process guidelines to make we sufficiently cater Corporate Security Team for any investigation?

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Reports  ·  Flag idea as inappropriate…  ·  Admin →
  11. Conflict Folder - sync issues outlook

    We need to be able to delete from powershell the contents of this folders in outlook. When we search our mailboxes we have some users from 6GB to 20GB of rubbish that consumes recourses and from our local storage and Microsoft cloud storage. We raised a ticket with MS support and this feature is unavailable.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. mfa

    MFA Calling Options. Right now, when you choose to have MFA call your phone it is only in English. Offer a configurable method for other languages such as German. My company has a large group of users in other countries and some do not speak English.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  13. 1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  14. Better information about source/system in OTP-sms:es and authenticator requests

    Make it visible what system/source/purpose an OTP SMS or authenticator request is concerning.

    The current solution does not state more than the source "Microsoft" and the OTP. It becomes hard to verify that the purpose of the OTP is legitimate.

    As a reference you could look into Swedish Mobile Bank-ID where the name of the company or organization requesting verification is displayed as part of the request.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  15. コンテンツの検索にて組織外のユーザーを検索クエリの条件として指定できるようにしてほしい

    メッセージ追跡レポートでは、連絡先に追加してある組織外のユーザーを検索条件として指定できますが、コンテンツの検索ではできないので不便です。
    またコンテンツの検索で組織外の全ユーザーを一括で検索できるようにしてほしいです。

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  16. I want to check delayed messages in real time

    Security & Compliance feature can not confirm delayed messages in real time

    セキュリティ&コンプライアンスの機能では遅延したメッセージをリアルタイムに確認できない

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Message Trace  ·  Flag idea as inappropriate…  ·  Admin →
  17. Log protocol rejections in Exchange Audit Log

    Azure AD logs the protocol authentication as successful and there is no protocol rejection logged in Exchange. This makes it very hard to prove the system was NOT accessed from an investigation perspective. This should be addressed my Microsoft ASAP. From a Security perspective, there is value in knowing about connections which are denied to a system as this could indicate an attack.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  18. Security Reports

    Please enable better format for reports. PP, PDF etc. Something with graphics. CSV format not good for quick summary overview.

    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Reports  ·  Flag idea as inappropriate…  ·  Admin →
  19. Need discrete XML files for domains and ip addresses that can and cannot traverse a proxy solution

    Please create 3 discrete XML Feeds for the following categories of traffic to enable easier consumption of data required to configure the customer's environment relative to proxying traffic for Office 365 workloads:

    • All FQDN/CIDR paired and CIDR prefix only destinations - Bypass your proxy for all FQDN/CIDR paired and CIDR prefix only destinations;
    
    • Inspection, authentication, reputation lookup services for any FQDNs marked required without a CIDR prefix - Bypass your proxy or remove inspection, authentication, reputation lookup services for any FQDNs marked required without a CIDR prefix;
    • Everything Else - For any remaining optional FQDNs, wildcards, DNS,
    1 vote
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  20. Maintain the Folder structure in Advanced eDiscovery

    It would be good to be able to see the Folder Structure that was originally created in outlook and one drive in Advanced eDiscovery. Presently all the documents and there, but the structure has been lost and so locating documents is challenging

    0 votes
    Vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base