Feedback by UserVoice

Office 365 Security & Compliance

We have partnered with UserVoice, a third-party service and your use of the portal and your submission is subject to the UserVoice Terms of Service & Privacy Policy. Please do not send any novel or patentable ideas, copyrighted materials, samples or demos for which you do not want to grant a license to Microsoft.

Welcome to the Security (Protection) & Compliance UserVoice forum. We’re happy you’re here! If you have suggestions or ideas on how to improve Security or Compliance related features in O365, we’d love to hear them!

How it works
◾Check out the ideas others have suggested and vote on your favorites
◾If you have a suggestion that’s not listed yet, submit your own — 25 words or less, please
◾Include one suggestion per post

Thanks for joining our community and helping improve these features in Office 365!

Need Tech Support? Please see the O365 Community for the product or feature you are having issues with, or open a support ticket through your Office 365 administrator portal.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Unable to search Audit Log by UserLoginFailed

    I am unable to search the Audit Log for UserLoginFailed. (Security & Compliance\Search\Audit Log Search) The entry is found under Activity but cannot be searched online. This feature would be useful when looking for accounts that are/were under attack.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  2. Need better documentation and clarification

    The auto save feature went away on excel and word (perhaps others, but I don't use them often and did not notice). After a full hour and ten minutes with help chat, I figured out what happened. This is shameful on Microsofts part, it really is.

    When you go into Account> Options> Trust Center> Trust Center Settings> Privacy Options> Privacy Settings all options must be selected yes in the final box 'Connected Experiences" or there is no auto save and who knows what else.

    Such a sham, if you want auto save, (one feature of 365 touted as a big…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Privacy  ·  Flag idea as inappropriate…  ·  Admin →
  3. Stop requiring login to see news

    We are tired of constantly logging in to see what's new and available to us.
    When a mail is sent to me, I have to login as an admin to see the content.
    Our tenant is heavily troubled with hackers.
    I had to search Google to find a way to stop it, and also I found several links to security sub-pages on the Azure portal that I did not know about.
    What about giving us the real news in the mail message, and also auto-add new config pages to the portal, we can always remove them later.
    It's frustrating to…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  4. Encrypted message indicator on SENT messages is needed

    Outlook does not show the encryption status of messages sent. After sending an encrypted message, there is no way to show that it was actually encrypted.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Message Encryption & Rights Management  ·  Flag idea as inappropriate…  ·  Admin →
  5. Communicate to Windows Firewall developers that Outlook firewall permission rules do not work when outbound connections are being blocked

    If Windows Firewall is configured to block outbound as well as inbound connections unless allowed by rule, Office 365 Microsoft Outlook cannot connect to the Exchange server even after rules are created to permit the application. This is because additional executable files must be permitted. These additional files include:
    1) Microsoft Outlook Communications - hxstr.exe
    C:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11901.20184.0_x64__8wekyb3d8bbwe\hxtsr.exe
    2) Microsoft Outlook Communications - hxoutlook.exe
    C:\program files\windowsapps\microsoft.windowscommunicationsapps_16005.11901.20184.0_x64__8wekyb3d8bbwe\hxoutlook.exe
    It may also be necessary to include: backgroundtaskhost.exe:
    C:\windows\system32\backgroundtaskhost.exe

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  6. Real Destination Wedding- Rihansheve N Planner

    Destination Weddings is fast becoming a trend, now you don’t have to waste your energy and search for the wedding planner in lucknow get Desired Destination Within Your Budget by Rihansheve N planner.
    website:- https://medium.com/@rihanshevenplanners/luxury-and-unique-destination-wedding-2952dfa740d

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Service Trust Portal  ·  Flag idea as inappropriate…  ·  Admin →
  7. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  8. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  9. Better management tools for ATP Safe Attachments

    There is no way to manage emails that are currently undergoing an attachment scan in ATP. If that service goes down or experiences performance issues, there should be a way to administratively release these attachments.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Advanced Security Management  ·  Flag idea as inappropriate…  ·  Admin →
  10. In change password page please provide some guidance text on success or fail

    In Office365 Change password page please add some guidance text when the operation of changing password was performed with success or with fail. It only have some guidance while typing the password (from javascript on client side) but there is now guidance after you slick Submit button. After submtit the page looks the same as first time you enter the page. I do not know if the change was performed with success and then to use the new password, or the change was failed and I should still use the old password.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  11. Allow for mission critical internal user accounts to be whitelisted, meaning they cannot be blocked due to sending bulk emails.

    A mission critical account that sends very important information (ie Amber Alerts) should not be blocked. Until an administrator unblocks the account, the agency is unable to send these alerts that are time sensitive. Being able to exempt certain accounts would be highly beneficial.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  12. If Sending to multiple recipients, it would be nice of the tool tip still appeared at the top of the message.

    ATP Anti phising policy puts a neat Mailtip on top of the message for one recipient - if to many, it puts in the footer in plain text, right after our disclaimer. That is pretty worthless.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  13. 1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Spam & Phishing  ·  Flag idea as inappropriate…  ·  Admin →
  14. Audit event is generated in Azure Information Protection manually tagged one way but should be automatically tagged another

    At present using Office 365 labelling to automatically label an email or file will only work if the user has not tagged it. If the user tags the file manually but automatic classification should tag it as another, the manual process overrules.

    There is no audit event generated for this, so a user could attach credit card numbers into a document, classify it as public and send it out. There would be no event generated which said it contains credit card numbers, only that it was classified as public.

    It should either:
    a) Override the manual tagging and classify it…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Auditing  ·  Flag idea as inappropriate…  ·  Admin →
  15. Allow you to change the name of a rule after Preservation Lock

    Simply allow users to change the name of a rule setup after the preservation lock is setup. The purpose of Preservation Lock is to block you from making the rules less restrictive. Not to stop you from renaming the rule which is inconsequential.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  eDiscovery  ·  Flag idea as inappropriate…  ·  Admin →
  16. The ability to copy a Sensitivity Label for the purposes of using it as a template for a new [similarly configured] label.

    The ability to copy a Sensitivity Label for the purposes of using it as a template for a new [similarly configured] label.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  DLP & Transport Rules  ·  Flag idea as inappropriate…  ·  Admin →
  17. outbound malware report: dont count NDRs in this report

    outbound malware report triggers panic.

    NDRs of malware emails are showing up in the outbound malware report.

    NDRs probably shouldn't include the virus payload or else such NDRs shouldn't be shown in the outbound malware report.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  18. Fix wording and styling on verification/authentication/app-password pages

    On this page: https://portal.office.com/account/

    there is an option labeled as follows: "Update your phone numbers used for account security."

    This label is very poorly written.

    Our organization has chosen to emphasize use of the authenticator app rather than using phone numbers and inevitably users who are struggling to set things up are bemused (at best) or irate (at worst) when we tell them to click on "update your phone numbers" in order to set up the authenticator app.

    The link text should be written in such a way that it makes sense for people depending on phone numbers and for…

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  19. Specify the applied entity in the "Activity Map" on the Cloud App Security dashboard

    "Activity" on the world map might indicate "activities" as defined in the other reports on the dashboard about user activity. However it seems that the applied entity in the "Activity map" is defined as "active users with any number of activities (including any number of logins) during the specified time interval".
    A clarification about the definition and applied entity on the "Activity map" as well as in the documentation would be helpful and appreciated.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Reports  ·  Flag idea as inappropriate…  ·  Admin →
  20. Provide the option to decrypt emails on the client only

    In the Snowden incident, the government forced Lavabit to provide them with their SSL keys, in order to decrypt their traffic.

    For some clients in financing and government, this risk might not be acceptable.

    Therefore, it should be possible to have an additional encryption layer on top of SSL, where email are transferred to the client in an encrypted state an can only be decrypted by the client.

    1 vote
    Vote
    Sign in
    (thinking…)
    Sign in with: Facebook Google
    Signed in as (Sign out)
    You have left! (?) (thinking…)
    0 comments  ·  Flag idea as inappropriate…  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base