Cloud App Security Administration Guide for Office 365

Creating Threat Detection Policy Rules

To create a Threat Detection policy rule

  1. In the Rule Name field, enter the name you want to use to identify the rule.
  2. From the Mode dropdown list, select the mode in which you want the DLP policy rule to operate:
  3. In the Scope section, either:
    • Select All users and groups (all licensed users) to have the policy rule either apply to all users.
    • In the Specific users and groups list, select the specific users or user groups to which the policy should apply or be excluded from being applied.
  4. In the Advanced section, the workflow options you see will depend on the Mode set for the policy.
    • For the Malicious attachment workflow, you can specify that:
      • messages or files be quarantined, and the recipient is alerted and allowed to restore the email messages or files.
      • messages or files be quarantined, and the recipient is alerted and allowed to request that the email or files be restored by an administrator.
      • messages or files be quarantined, but the recipient is not alerted. However, an administrator can restore the message.
      • no action be taken on the message. The event will still be logged.
    • For the Phishing workflow, you can specify that:
      • messages or files be sent to the intended recipient with a warning.
      • messages or files be quarantined, and the recipient is alerted and allowed to restore the messages or files.
      • messages or files be quarantined, and the recipient is alerted and allowed to request that the messages or files be restored by an administrator.
      • messages or files be quarantined, but the recipient is not alerted. However, an administrator can restore the messages or files.
      • no action be taken on the messages or files. The event will still be logged.
    • For the Suspicious phishing workflow, you can specify that:
      • messages or files be sent to the intended recipient with a warning.

        The content and formatting of the warning can be customized by clicking the gear icon to the right of the list.

      • messages or files be quarantined, and the recipient is alerted and allowed to request that the messages or files be restored by an administrator.
      • messages or files be quarantined, but the recipient is not alerted. However, an administrator can restore the message.
      • no action be taken on the messages or files. The event will still be logged.
    • For the Spam workflow, you can specify that:
      • email messages be sent to the intended recipient with “[Spam]” added to the Subject line.
      • email messages be sent to the intended recipient with “[Spam]” added to the Subject line and delivered to the Junk folder.
      • email messages be quarantined, the recipient is alerted, and the recipient can restore the email message.
      • email messages be quarantined, but the recipient is not alerted. However, an administrator can restore the email message.
      • no action be taken on the email message. The event will still be logged.
    • From the Severity list, specify severity level with which the event will be recorded:
      • Auto
      • Critical
      • High
      • Medium
      • Low
      • Lowest
  5. In the Advanced > Security Tools section:
    1. Select All running threat detection tools to use all of the activated Security Tools. (This is on by default.) If you unselect this option, you can then select which specific Security Tools are used.
    2. Click Configure Anti-Impersonation and Phishing Confidence-Level to configure additional anti-phishing options.
      • Select a value for the Confidence level field to set a default confidence level. By setting a higher confidence level, you should see fewer detections and fewer false-positive results.
      • Enable Warn users of suspected impersonations to warn users of suspected impersonated messages and accounts. You can set the detection level to all internal users or only senior-level users within your organization.
      • Select Allow end users to Allowed list senders they trust via in-mail link to allow your end users to add senders they trust to the Allowed list using a link provided in the email message.
      • Select Allow list emails with MSFT SCL = -1 to automatically allow emails that Microsoft marks as allowed by placing SCL=-1 in the header of the email message.

      For more information about configuring the anti-impersonation options, refer to Managing Nickname Impersonation.

    3. Click Ok.
  6. In the Advanced > Alerts section:
    1. Select Send email alert to admin(s) about phishing to notify administrators when a possible leak is detected.
      • Click the gears icon to modify the email message sent to administrators.
      • Click the users icon to select which administrators should receive the message.
    2. Select Send Email alert to… to notify specific users sharing the file when a possible threat is detected.
      • Click the gears icon to modify the email message sent to the users.
    3. Select Send email alert to admin(s) about malware to notify administrators when a possible threat is detected.
      • Click the gears icon to modify the email message sent to administrators.
      • Click the users icon to select which administrators should receive the message.
    4. Select Alert recipient to inform the recipient of the message when a possible threat is detected.
      • Click the gears icon to modify the email message sent to the recipient.
  7. Click Save and Apply.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden