Please Be Aware: Microsoft Making Changes to Spam Filtering in M365 Affecting Most Users

We want to make you aware of some upcoming changes to Microsoft’s 365 Spam Filter. In striving for the best protection parameters, Microsoft has decided to increase the security surrounding email filtering. This may cause some messages to be moved to SPAM unintentionally, and Platte River is not able to override this, as this is a Microsoft 365-level change.

If you suspect mail may have been filtered unintentionally, be sure to check your Spam folder, called “Junk Email” in newer versions of outlook, and can be found in your left navigation pane.
Graphical user interface Description automatically generated with low confidence

We will continue to monitor on our end just as we always have, to keep you, your data, and your environment safe and secure. Below we have included Microsoft’s official statement on this change for your information.

Upcoming Changes to 365 Spam Filtering

Microsoft believes it’s critical to keep our customers secure by default. We have determined that legacy overrides tend to be too broad and cause more harm than good. As a security service, we believe it’s imperative that we act on your behalf to prevent your users from being compromised. This means these legacy overrides will no longer be honored for email messages we believe are malicious. We already apply this approach with malware messages and now we have extended it to messages with high confidence phish verdicts. We have been taking a very deliberate approach to rolling out these changes in phases to ensure customers are not surprised and there are no negative side effects. We began to rollout Secure by Default for high confidence phishing messages by the override type starting in December 2020 (Roadmap ID 60827). Today, we’re at a point in our Secure by Default journey where the following overrides are not honored for malicious emails (malware or high confidence phish emails):

  • Allowed sender lists or allowed domain lists (anti-spam policies)
  • Outlook Safe Senders
  • IP Allow List (connection filtering)

We are now extending Secure by Default to cover high confidence phishing messages for the remaining legacy override type, Exchange mail flow rules (also known as transport rule or ETRs).

Key Points

  • Timing: We will begin rolling out Secure by Default for ETRs starting at the beginning of August and complete rollout by early September.
  • Action: Review and assess impact.

How this will affect your organization:

After the last phase of Secure by Default is enabled in August for ETRs, Defender for Office 365:

  • Will no longer deliver messages with a high confidence phish verdict, regardless of any explicit ETRs.
  • Will no longer recommend using ETRs to configure third-party phishing simulations or Security Operations mailbox message delivery.

What you need to do to prepare:

If you are currently using Exchange mail flow rules (also known as transport rules or ETRs) to configure your third-party phishing simulation campaigns or delivery for security operation mailboxes, you should begin to configure these with the new Advanced Delivery policy when the feature is launched in July (Roadmap ID 72207). For more information, please refer to message center post MC256473. Administrators should also use the submission portal to report messages whenever they believe a message has the wrong verdict so that the filter can improve organically.

The Resource Hub

Get Complete Managed Services Insights

Visit our Resource Center for up-to-date news and stories for technology and business leaders.

Three IT Service Techs Working together at desks in office

Move Forward with IT Services for Business

Use managed services for small and mid-sized businesses that help you reach your goals.

Work With Us