Microsoft Defender for Office 365 Policy Builder 2026: Standard, Strict or Custom

Email security is not only about blocking threats. It is about choosing the right protection level, for the right users, without creating bypasses that weaken the tenant. This interactive guide helps Microsoft 365 admins, Exchange Online admins and security teams design practical Defender for Office 365 and EOP policies that protect users without generating unmanageable noise.

By Tiago Carvalho · Microsoft 365 Architect · Updated 2026

What this guide covers
  • Interactive Defender policy builder with 7 inputs and protection scoring
  • Standard vs Strict vs Custom preset policy decision framework
  • Persona-based policy baselines for executives, finance, HR and more
  • Anti-phishing, impersonation, Safe Links and Safe Attachments recommendations
  • Quarantine workflow and user submissions process
  • Tenant Allow/Block List and exception handling
  • Defender policies and mail flow rule alignment
  • Safe rollout phases and 18 common mistakes from real tenants
Table of contents

Introduction

Most Microsoft 365 tenants fall into one of two email security patterns. The first is the tenant where nobody has touched the Defender for Office 365 or EOP settings since the subscription started. The default protection is active, but nobody has reviewed anti-phishing thresholds, impersonation targets, quarantine workflows or Safe Links behaviour. The second is the tenant where an admin configured strict or custom policies months ago, but nobody monitors quarantine, nobody reviews false positives, and users have found workarounds that bypass the controls entirely.

Both patterns carry risk. Defaults leave gaps. Poorly monitored strict policies create noise and workarounds.

A strict policy that nobody monitors becomes noise. A custom policy that nobody understands becomes risk.

Microsoft provides preset security policies (Standard and Strict) that apply a curated set of protection settings across anti-phishing, anti-spam, anti-malware, Safe Links and Safe Attachments. These presets are a strong starting point. But some tenants need custom policies for specific users, executive protection, business process exceptions, operational constraints or licensing differences.

This guide is not a generic Defender overview. It is a practical policy builder designed to help you make specific decisions: which protection model to use, which users need stronger settings, how to handle impersonation, when to use Safe Links and Safe Attachments, how to manage quarantine and user submissions, and how to avoid the bypass rules that weaken everything else.

Microsoft Defender for Office 365 and Exchange Online Protection work together. EOP provides the baseline: anti-spam, anti-malware, anti-phishing (including spoof protection). Defender for Office 365 adds Safe Links, Safe Attachments, advanced anti-phishing with impersonation detection, threat investigation and response capabilities. The right configuration depends on licensing, user risk, operational maturity and business requirements.

Important Defender for Office 365 disclaimer

Disclaimer This guide is a practical policy design framework based on field experience with Microsoft 365 tenants. It is not a substitute for official Microsoft documentation, licensing agreements, legal advice or compliance advice.

Key points to keep in mind:

  • Protection requirements vary by organisation. User roles, threat exposure, business processes and risk appetite differ across tenants. There is no universal Defender policy set.
  • Capabilities depend on licensing. Exchange Online Protection, Defender for Office 365 Plan 1, Plan 2, and Microsoft 365 E5 each provide different feature sets. Validate against Microsoft documentation and your licensing provider.
  • Microsoft recommendations and settings can change. Preset security policies are maintained by Microsoft and may be updated. Feature behaviour and defaults can evolve. Always check the current Microsoft documentation.
  • Policies should be tested before broad rollout. Enabling strict or custom policies without a pilot phase risks blocking legitimate email and disrupting business workflows.
  • This is not legal, compliance or procurement advice. Organisations with regulatory requirements should involve legal and compliance teams in email security policy design.
  • Final validation should be done against the Microsoft Defender portal, Microsoft Learn, Microsoft Product Terms, and your licensing provider.
A note on terminology: This guide uses "preset security policies" to refer to the Standard protection and Strict protection profiles that Microsoft provides in the Microsoft Defender portal. "Custom threat policies" refers to admin-created policies with configurable settings. "EOP" refers to Exchange Online Protection, the baseline filtering layer for Exchange Online mailboxes.

What this guide helps you decide

This builder is designed to help you work through the following decisions:

  • Whether to start with the Standard preset security policy
  • Whether to use the Strict preset security policy for specific groups
  • When to build custom threat policies instead of using presets
  • Which users need stronger protection: executives, finance, HR, customer-facing
  • When to configure user impersonation and domain impersonation protection
  • When to enable Safe Links and Safe Attachments and what to monitor
  • How to manage quarantine policies and user release workflows
  • How to handle user submissions and false positive feedback
  • When to use the Tenant Allow/Block List and how to avoid dangerous broad allows
  • How to avoid mail flow rule bypasses that weaken Defender protection
  • How to review spoof intelligence decisions
  • How to align Defender policies with Exchange Online mail flow rules
  • How to roll out stronger email protection safely
  • How to monitor and review Defender policies operationally

Before you start

Before changing Defender for Office 365 or EOP policies, work through this pre-flight checklist. Skipping this step is how policy changes end up blocking legitimate email and creating support ticket storms.

Pre-flight checklist

  • Identify current licensing: EOP only, Defender for Office 365 Plan 1, Plan 2, or Microsoft 365 E5
  • Identify current preset security policy status: are Standard or Strict profiles active?
  • Identify existing custom threat policies and their priority order
  • Identify VIPs, executives and high-risk users who need explicit protection
  • Identify customer-facing, finance, HR and mailbox-heavy users
  • Review existing mail flow rules, especially any that bypass spam filtering or SCL modification
  • Review the Tenant Allow/Block List for stale, broad or unjustified entries
  • Review current quarantine policies and who has release permissions
  • Review user submissions process: can users report suspicious messages?
  • Review spoof intelligence: are there overrides that need validation?
  • Review email authentication: SPF, DKIM and DMARC configuration and enforcement for your domains
  • Review external senders and partner exceptions
  • Review message trace and Threat Explorer (where available) for recent false positives
  • Review false positive and false negative history from helpdesk or security team
  • Prepare the helpdesk: users will notice when quarantine or policy tip behaviour changes
  • Define pilot groups for testing policy changes before broad rollout
  • Create a rollback plan: know how to revert changes quickly
  • Document policy owners: who reviews alerts, who tunes policies, who approves exceptions
  • Define the review cadence: quarterly at minimum

Licensing and capabilities at a glance

Defender for Office 365 capabilities depend on the licensing tier. The following table is directional. Validate all licensing details against Microsoft documentation and your licensing provider.

CapabilityEOP (baseline)Defender P1Defender P2Validation
Anti-spam filteringYesYesYesIncluded with all Exchange Online plans
Anti-malware filteringYesYesYesIncluded with all Exchange Online plans
Zero-hour Auto Purge (ZAP)YesYesYesRetroactively removes spam, phishing and malware from delivered messages
Anti-phishing (spoof protection)YesYesYesEOP provides spoof intelligence and basic anti-phishing
Anti-phishing (impersonation)NoYesYesUser and domain impersonation requires P1 or higher
Safe LinksNoYesYesRequires Defender for Office 365 P1 or higher
Safe AttachmentsNoYesYesRequires Defender for Office 365 P1 or higher
Real-time detectionsNoYesYes (Threat Explorer)P1 provides real-time detections; P2 provides full Threat Explorer
Automated investigation and responseNoNoYesRequires Defender for Office 365 P2 or E5
Attack simulation trainingNoNoYesRequires Defender for Office 365 P2 or E5
Campaign viewsNoNoYesRequires Defender for Office 365 P2 or E5
Advanced hunting (email events)NoNoYesRequires Defender for Office 365 P2 or Microsoft 365 E5 with Defender XDR
Preset security policiesYes (EOP settings)Yes (full)Yes (full)EOP presets cover anti-spam, anti-malware, anti-phishing. P1+ adds Safe Links and Safe Attachments.
Quarantine policiesYesYesYesQuarantine management available with EOP and above
Tenant Allow/Block ListYesYesYesAvailable with EOP and above
Licensing note: Defender for Office 365 Plan 1 is included with Microsoft 365 Business Premium and available as an add-on to other plans. Plan 2 is included with Microsoft 365 E5 and E5 Security. Microsoft 365 licensing is subject to agreement type, region and terms. Always validate licensing eligibility and feature availability against official Microsoft documentation and your licensing provider.

EOP vs Plan 1 vs Plan 2 at a glance

DifferentiatorEOP (baseline)Defender P1Defender P2
Core protectionAnti-spam, anti-malware, spoof protection, ZAPEverything in EOPEverything in P1
URL protectionNoneSafe Links (time-of-click)Safe Links (time-of-click)
Attachment protectionAnti-malware scanningSafe Attachments (sandbox detonation)Safe Attachments (sandbox detonation)
Anti-phishingSpoof protection onlySpoof + user/domain impersonation + mailbox intelligenceSpoof + user/domain impersonation + mailbox intelligence
InvestigationMessage traceReal-time detectionsThreat Explorer + advanced hunting
Response and trainingManualManualAutomated investigation and response (AIR) + attack simulation training

Interactive Defender Policy Builder

Select the option that best describes your scenario for each category. The builder will generate a recommended Defender policy direction, protection model and per-area recommendations.

Defender Policy Builder

How the score works: The protection intensity score measures how much protection the scenario needs, not what your current licence supports. A high score means the user profile, risk level and operational context demand stronger protection. It does not mean you already have that protection in place. If the score is high but your licensing is EOP only, the recommendations will note which features require Defender for Office 365 Plan 1 or higher.

Preset security policies: Standard vs Strict

Microsoft provides two preset security policy profiles: Standard protection and Strict protection. These apply a curated set of settings across anti-spam, anti-malware, anti-phishing, Safe Links and Safe Attachments (where licensed). The settings within preset policies are fixed by Microsoft and cannot be customised. Microsoft maintains these settings and may update them.

Why presets matter

Preset security policies are a strong starting point for most tenants. They eliminate the guesswork of configuring individual thresholds and ensure settings align with Microsoft's current recommendations. Standard protection is suitable for most users. Strict protection applies more aggressive thresholds and is better suited for high-risk users or targeted groups.

However, presets are not the answer to every scenario. You cannot customise the settings within a preset. If you need specific impersonation targets, different quarantine actions, or fine-tuned thresholds for a particular group, you need custom policies.

Policy priority order

When a user is covered by multiple policies, the following priority order applies:

  1. Strict preset security policy (highest priority)
  2. Standard preset security policy
  3. Custom threat policies (ordered by priority number; lower number = higher priority)
  4. Built-in protection / default policy (lowest priority)

Built-in protection applies to all users automatically. However, Safe Links and Safe Attachments coverage within built-in protection only applies where Defender for Office 365 licensing is present. For EOP-only users, baseline EOP protections (anti-spam, anti-malware, spoof protection) still apply. Built-in protection cannot be disabled, but its settings are less protective than Standard or Strict.

This means if a user is assigned to both the Standard preset and a custom policy, the Standard preset settings will apply for all protection types covered by that preset, because it has higher priority. Plan your policy assignments carefully to avoid custom policies being unintentionally overridden by presets.

When to use which

ScenarioBetter starting pointWhyCaveat
Small tenant with no custom policiesStandard presetQuick, safe baseline with Microsoft-maintained settingsReview quarantine workflow before enabling
Executives and VIPsStrict preset + configured impersonation targetsHigher-risk users need more aggressive thresholdsConfigure protected users and domains in anti-phishing policy
Finance usersStrict presetFinance users are frequent phishing and BEC targetsMonitor false positives for invoice and payment-related email
HR usersStrict preset or Standard + customHR receives sensitive CVs and external contact; balance protection with usabilityTest Safe Attachments impact on CV and document-heavy workflows
Customer-facing usersStandard presetHigh external email volume makes strict settings risky for false positivesMonitor quarantine carefully. Consider Strict only after tuning.
IT adminsStandard presetIT admins receive legitimate technical email that strict filters may flagReview Safe Links behaviour with technical URLs
Security teamStandard presetSecurity teams need to receive and analyse suspicious samplesMay need specific exceptions for security tooling and analysis workflows
Shared / team mailboxesStandard presetOften receive high-volume external mail. Strict increases quarantine load.Ensure someone reviews quarantine for shared mailboxes
Tenant with many false positivesStandard preset firstFix false positive sources before increasing strictnessReview Tenant Allow/Block List and sender authentication first
Tenant with existing complex custom policiesAudit custom policies firstAdding presets on top of custom policies can create priority conflictsMap current policy coverage before changing anything
Presets are not set-and-forget. Even with preset security policies active, you still need to review quarantine, monitor false positives, configure impersonation targets (where applicable), manage the Tenant Allow/Block List, and review user submissions. Presets handle the settings. Operations is your responsibility.
Anti-spam BCL threshold: The Bulk Complaint Level (BCL) threshold controls how aggressively bulk mail (newsletters, marketing) is treated. Standard preset uses BCL 6; Strict uses BCL 5 (more aggressive). If users report missing newsletters or legitimate marketing email after enabling a preset, review the BCL threshold. Lower values quarantine more bulk mail; higher values allow more through. Tune based on your organisation's tolerance for bulk mail.

Recommended policy baselines

The following table provides practical starting points for different user personas. These are not mandatory. They represent common patterns that balance protection with operational impact across Microsoft 365 tenants. Adapt to your risk profile, licensing and business requirements.

PersonaModelSafe LinksSafe AttachmentsAnti-phishingQuarantineNotes
Standard usersStandard presetPreset defaultPreset defaultPreset defaultUser request release for spam; admin for phishGood baseline for most users. Monitor and tune.
Executives / VIPsStrict preset + configured impersonation targetsStrict; no click-throughBlock or dynamic deliveryUser + domain impersonation enabledAdmin review for all quarantineHighest protection. Configure protected users and domains explicitly.
Finance and HRStrict presetStrict settingsStrict settingsUser impersonation for key individualsAdmin review for phish; user release for spamHigh-risk for BEC and social engineering. Monitor invoice workflows.
IT adminsStandard presetStandard; review URL rewritesStandard or dynamic deliveryStandard presetUser request release for spamTechnical URLs may trigger Safe Links. Review false positives.
Customer-facing usersStandard presetStandard settingsDynamic delivery preferredStandard presetUser request release for spamHigh external volume. Strict may cause excessive quarantine.
Shared / team mailboxesStandard presetStandard settingsStandard settingsStandard presetAdmin review (no user to manage quarantine)Ensure an owner reviews quarantine regularly.
Partner-heavy usersStandard presetStandard settingsStandard settingsDomain impersonation for key partnersBalanced release workflowReview sender authentication for partner domains.
High-volume mailboxesStandard presetStandard settingsDynamic deliveryStandard presetUser-managed where possibleDynamic delivery reduces delays. Monitor quarantine volume.
Security teamStandard presetStandard; review exceptionsStandard; exceptions for analysisStandard presetSelf-managedMay need exceptions for security analysis tools and sample handling.
Default tenant baselineStandard preset for allEnabled where licensedEnabled where licensedPreset defaultsUser release for spam; admin for phishStart here. Layer Strict or custom on top for specific groups.
Layer, do not replace. Start with Standard preset for all users. Then add Strict for high-risk groups. Then add custom policies only where presets cannot cover a specific requirement. This layered approach keeps the configuration manageable.

Anti-phishing and impersonation protection

Anti-phishing in Microsoft Defender for Office 365 covers two areas: spoof protection (available in EOP) and impersonation protection (available with Defender for Office 365 Plan 1 and above). Spoof protection analyses sender authentication (SPF, DKIM, DMARC) and uses spoof intelligence to make allow or block decisions. Impersonation protection detects attempts to mimic specific users or domains.

Key considerations

  • Spoof protection is EOP-level. It works for all Exchange Online users regardless of Defender licensing. Spoof intelligence analyses sender authentication signals and makes allow or block decisions for spoofed senders. Review spoof intelligence overrides regularly to remove stale entries.
  • User impersonation requires Defender P1 or higher. You configure specific users to protect (executives, finance leaders, HR managers). Messages that appear to come from lookalike addresses trigger detection.
  • Domain impersonation requires Defender P1 or higher. You configure specific domains to protect (your own domain, key partner domains). Messages from lookalike domains trigger detection.
  • Mailbox intelligence uses machine learning to understand each user's email patterns and can detect unusual sender behaviour. Available with Defender P1+.
  • False positives are common when impersonation protection is first enabled. Legitimate senders with similar names or domains may be flagged. Plan for tuning.
  • Trusted senders and domains should be added carefully. Broad trusted sender lists weaken impersonation protection. Scope exceptions tightly.
  • First contact safety tip: Enable the first contact safety tip in anti-phishing policies. It shows a warning when users receive email from a sender for the first time or from a sender they rarely receive email from. This helps users spot social engineering attempts from new or unusual senders.

Risk scenarios and recommended controls

Risk scenarioRecommended controlNotes
CEO or CFO impersonation (BEC)User impersonation protection for all executivesAdd each executive by name and email. Quarantine or redirect flagged messages.
Domain spoofing of your own domainSpoof intelligence + DMARC enforcementConfigure SPF, DKIM, DMARC first. Review spoof intelligence decisions.
Partner domain lookalikesDomain impersonation for key partner domainsAdd the 5 to 10 most critical partner domains. Review false positives.
Finance team receiving fake invoicesUser impersonation for finance leaders + Strict anti-phishingBEC attacks target finance staff directly. Impersonation protection is essential.
HR receiving fake employee requestsUser impersonation for HR managersAttackers impersonate employees requesting payroll changes or personal data.
External senders with similar display namesMailbox intelligence + impersonation tipsMailbox intelligence learns normal patterns and flags anomalies.
Spoofed external sendersSpoof intelligence reviewReview overrides in spoof intelligence. Remove stale allows.
Broad "trusted senders" list weakening protectionAudit and reduce trusted sendersTrusted sender entries can reduce impersonation protection for that sender scope. Keep the list minimal.
Legitimate external senders flagged as impersonationAdd specific sender to trusted list with justificationDocument the business reason, owner and review date for each exception.
New employees not yet in impersonation targetsRegular review of protected user listReview impersonation targets when senior staff join or change roles.
Impersonation protection is not automatic. Preset security policies enable impersonation detection, but you still need to configure which users and domains to protect. This is a manual step that must be reviewed when staff change roles.

Safe Links provides time-of-click URL protection. When a user clicks a link in an email or supported Office document, Safe Links checks the URL against a threat intelligence database and can block access to malicious sites. It requires Defender for Office 365 Plan 1 or higher.

Key considerations

  • Time-of-click is the core value. Unlike static URL scanning at delivery, Safe Links checks the URL when the user actually clicks it. This catches URLs that become malicious after delivery.
  • URL rewriting changes the link appearance. Users see rewritten URLs that pass through the Safe Links service. Some users find this confusing. Communicate the change.
  • Do not use "do not rewrite" lists broadly to solve user complaints. Broad rewrite exceptions reduce the protection value of time-of-click checking and should be tightly scoped with documented justification.
  • Strict settings prevent click-through to flagged URLs. Standard settings may allow users to click through warnings. For high-risk users, prevent click-through.
  • Review "do not rewrite" URL exceptions carefully. Every exception weakens protection. Only add exceptions with documented justification and an expiry review.
  • Safe Links works in email, Teams and Office documents (where licensed and supported). Coverage varies by application. Validate current support.
  • Do not disable click tracking. The "Do not track when users click protected links" setting exists in Safe Links policies. Disabling click tracking removes visibility into what users are clicking and reduces threat intelligence value. Keep click tracking enabled unless there is a documented privacy requirement.

Safe Links by persona

PersonaSafe Links postureNotes
Standard usersStandard preset settingsGood baseline. Time-of-click enabled. User can click through warnings.
Executives / VIPsStrict. No click-through to flagged URLs.Prevent executives from clicking through to potential phishing pages.
FinanceStrict. No click-through.Finance users are frequent BEC targets. Strict Safe Links is justified.
HRStandard or Strict depending on maturityHR receives many external links (job applications, portals). Monitor false positives.
IT adminsStandard. Review URL rewriting impact.Technical URLs and admin portals may trigger false positives. Review and document exceptions.
Customer-facingStandard settingsHigh URL volume. Strict may cause friction. Monitor before escalating.
Shared mailboxesStandard settingsStandard protection. Ensure someone monitors blocked URL reports.
Security teamStandard with exceptions for analysis toolsSecurity analysts may need to access flagged URLs for investigation. Document exceptions.

Safe Attachments recommendations

Safe Attachments detonates email attachments in a sandbox environment before delivering them to users. It detects malicious files that signature-based scanning might miss. It requires Defender for Office 365 Plan 1 or higher.

Key considerations

  • Detonation adds a delivery delay. Attachments are scanned in a sandbox, which can add seconds to minutes of delay. For most users this is acceptable. For time-sensitive workflows, consider dynamic delivery.
  • Dynamic delivery delivers the email body immediately and replaces the attachment with a placeholder while scanning. The attachment is reattached after scanning completes. This reduces perceived delay.
  • Block mode prevents delivery of messages with malicious attachments. This is the strictest option and the safest for high-risk users.
  • Monitor mode detects malicious attachments but still delivers them. Useful for initial testing only. Do not use in production long-term.
  • Quarantine review is essential. Blocked attachments go to quarantine. Ensure someone reviews quarantine for legitimate files that were flagged.
  • Safe Attachments for SharePoint, OneDrive and Teams extends file scanning beyond email. Validate licensing and enable where available.

Safe Attachments by scenario

ScenarioSafe Attachments approachNotes
Standard usersStandard preset (block malicious)Preset default is appropriate for most users.
Executives / VIPsBlock mode via Strict presetStrictest protection. Quarantine review by admin or security team.
FinanceStrict presetInvoice and payment attachments are common attack vectors.
HR (CV-heavy workflows)Standard or dynamic deliveryHR receives many document attachments from unknown senders. Dynamic delivery balances speed with safety.
High-volume mailboxesDynamic deliveryReduces delivery delay for mailboxes with heavy attachment traffic.
Shared mailboxesStandard presetEnsure quarantine is reviewed by a designated owner.
Initial pilot / testingStandard preset for pilot groupStart with a small group. Review quarantine and false positive impact before expanding.
Security teamStandard with documented exceptionsSecurity analysts may need to handle suspicious files. Document any exceptions.
Do not leave Safe Attachments in monitor mode long-term. Monitor mode detects but delivers malicious files. It is only useful during initial testing. Use a limited pilot to understand the delivery impact, then move to block or dynamic delivery once the impact is understood.

Quarantine policies and user submissions

Quarantine is where Defender and EOP send messages that are flagged as spam, phishing, malware or bulk. The quarantine experience matters. If users cannot access or request release of quarantined messages, every false positive becomes a helpdesk ticket. If users can release phishing messages without review, the protection loses value.

Key considerations

  • Quarantine policies control what users can do with quarantined messages: view, request release, release directly, or nothing.
  • Phishing and malware quarantine should require admin review. Users should not be able to release high-confidence phishing or malware without security review.
  • Spam quarantine can allow user release or request release depending on operational maturity. If the helpdesk is overwhelmed with "please release this email" requests, consider allowing user request release for spam.
  • User submissions (the "Report message" add-in or built-in reporting) allow users to flag suspicious messages. This is part of the security feedback loop.
  • Admin submissions allow admins to submit messages to Microsoft for analysis. Use this for persistent false positives or false negatives.
  • Quarantine notifications let users know when messages are quarantined. Configure notification frequency and scope appropriately.

Recommended quarantine workflow

User reports a suspicious message or requests release of a quarantined message
Helpdesk or admin triages the request (spam vs phishing vs legitimate)
Security or admin reviews the message in quarantine or Threat Explorer
Decision: release, block sender, or escalate to Microsoft via admin submission
Update Tenant Allow/Block List or tune policy if pattern repeats

Quarantine release by message type

Message typeRecommended release modelNotes
SpamUser request release, or direct release only in low-risk environmentsDirect release reduces helpdesk load but may let users release borderline messages. Start with request release.
Bulk mailUser request releaseOften legitimate newsletters. Let users decide.
Phishing (low confidence)User request release with admin reviewReview before releasing. May be false positive.
Phishing (high confidence)Admin review onlyDo not allow user release. Review in quarantine or Threat Explorer.
MalwareAdmin review onlyNever allow user release of malware. Admin or security team only.
Impersonation detectionAdmin reviewReview whether the sender is legitimate. Add to trusted senders if confirmed.
User submissions are part of the security loop. Enable the Report message add-in or built-in reporting in Outlook. Users who report suspicious messages provide valuable signal. Review submissions regularly and close the feedback loop.
Quarantine notifications: Configure quarantine notification policies to inform users when messages are quarantined. Set the notification frequency (default is every 4 hours; daily is usually sufficient). Ensure notifications cover spam and bulk quarantine so users can review and request release. Avoid enabling notifications for high-confidence phishing or malware quarantine, as users should not interact with those categories directly.

Tenant Allow/Block List and exceptions

The Tenant Allow/Block List is the central mechanism for managing sender, domain, URL and file hash exceptions in Defender for Office 365 and EOP. It is powerful and it is dangerous. Broad allow entries weaken the entire protection stack. Every exception should have a documented owner, business justification and review date.

Key principles

  • Allowing a sender address alone is risky. Sender addresses can be spoofed. An allow entry for a sender address bypasses filtering for that address regardless of authentication. Prefer allowing authenticated senders.
  • Domain allows can be risky if broad or unauthenticated. Validate SPF, DKIM and DMARC alignment before allowing a domain. Prefer scoped, time-limited entries over permanent domain allows.
  • Temporary allows should have expiry dates. Use the built-in expiry feature. Review all entries that do not expire.
  • Every allow needs an owner. If nobody owns the exception, nobody reviews it. Unreviewed allows accumulate and weaken the tenant.
  • Block entries are generally safer than allow entries. Blocking a known malicious sender or domain is low risk. Be careful about blocking legitimate domains by mistake.
  • Use admin submissions to Microsoft for persistent false positives. Microsoft can update their filtering based on these submissions, which is a better long-term fix than maintaining allow entries.

Common requests and safer responses

RequestBad responseSafer response
"Allow all email from partner.com"Add domain allow for partner.comVerify partner.com has SPF/DKIM/DMARC. Add specific sender addresses if needed. Set expiry and review date.
"Our CEO's email keeps getting blocked"Allow the CEO's address in TABLCheck why the message is flagged. Review sender authentication. Fix the root cause. Use admin submission if needed.
"Allow this IP address for our vendor"Add IP to connection filter allow listConfirm the IP is genuinely the vendor's sending IP. Validate that the vendor authenticates properly. Prefer Tenant Allow/Block List with sender scope.
"Disable filtering for internal email"Create SCL -1 transport rule for internalFor cloud-only Exchange Online tenants, intra-org mail between internal mailboxes is not filtered by EOP by default. Investigate why filtering is triggering. May indicate a hybrid mail flow misconfiguration or a connector issue.
"Allow this URL that Safe Links is blocking"Add URL to "do not rewrite" listReview why the URL is flagged. Submit to Microsoft if false positive. Add specific URL exception with owner and review date only if justified.
"We need to allow all email from this marketing platform"Allow the marketing domainAdd the specific sending addresses or authenticated domain. Set expiry. Review after campaign ends.
"Stop blocking attachments from this sender"Allow sender in Safe AttachmentsReview why attachments are flagged. Use admin submission. If legitimate, add a scoped exception with documentation.
"Just turn off the spam filter for our team"Bypass filtering via mail flow ruleInvestigate why legitimate mail is being filtered. Tune policies. Fix sender authentication. Do not bypass the filtering stack.
Broad allowlisting is dangerous. Every domain allow, sender allow, or IP allow that is not scoped, justified and reviewed creates a potential bypass for attackers. Treat allow entries like firewall exceptions: narrow, documented, owned and reviewed.

Defender policies and mail flow rules

Defender for Office 365 and EOP policies protect against threats. Exchange Online mail flow rules (transport rules) modify, route or apply conditions to messages. They serve different purposes, but they can interact in ways that weaken protection if not managed carefully.

Key principles

  • Mail flow rules should not bypass spam filtering as a lazy fix. If a mail flow rule sets SCL to -1 for a sender or domain, it bypasses the entire spam filtering stack for that scope. This is dangerous and almost always the wrong approach.
  • Defender policies handle threat detection. Mail flow rules handle message routing and modification. Use the right tool for the right job.
  • If a mail flow rule bypasses filtering, it must be narrow, justified, monitored and reviewed. Document the business reason. Set a review date. Assign an owner.
  • Review existing mail flow rules for bypass conditions. Many tenants have legacy rules that predate Defender deployment and silently weaken protection.
  • Message trace and Defender reports should be reviewed before changing rules. Understand the impact before making changes.

For a detailed guide on Exchange Online mail flow rules, see the Exchange Online Mail Flow Decision Builder.

When to use what

ProblemUse Defender policyUse mail flow ruleUse bothNotes
Block phishing emailYesNoNoDefender anti-phishing is designed for this. Do not replicate with transport rules.
Block a specific malicious senderYes (Tenant Allow/Block List)NoNoUse the block list, not a transport rule.
Add disclaimer to outbound emailNoYesNoMail flow rule is the right tool for disclaimers.
Route email to a third-party archiveNoYesNoJournaling or mail flow rule for routing.
Allow email from a trusted partner that is being filteredFix sender authentication firstNo bypass ruleNoFix SPF/DKIM/DMARC. Use Tenant Allow/Block List if needed. Do not bypass filtering.
Encrypt outbound email with sensitive contentPossible (DLP + encryption)Yes (transport rule + encryption)PossibleTransport rules can apply encryption. DLP can trigger encryption in Purview.
Redirect quarantined messages to a review mailboxUse quarantine policiesNoNoQuarantine policies handle this. Do not redirect via transport rules.
Block external auto-forwardingOutbound spam policyOptional additional controlOptionalOutbound spam policy is the primary control. Transport rule can add a second layer.
Audit your mail flow rules. Run a review of all mail flow rules that modify SCL, bypass spam filtering, or set headers that affect Defender processing. Legacy rules that predate your Defender deployment may be silently weakening protection.
Outbound spam policy and automatic forwarding: The outbound spam policy in EOP includes a setting to control automatic external forwarding. By default, automatic forwarding is controlled by the system. In many tenants the recommended setting is to block automatic forwarding to prevent data exfiltration via inbox rules or SMTP forwarding. Review the outbound spam policy to confirm automatic forwarding is set to "Off" or "Automatic" (system-controlled). If your organisation has a legitimate need for auto-forwarding, scope it with a transport rule rather than allowing it broadly.

Safe Defender rollout order

Changing email security policies affects every user in scope. A phased rollout reduces the risk of blocking legitimate email and gives you time to tune before expanding.

  1. Phase 1: Discovery and current state review Review current licensing, preset status, custom policies, mail flow rules, Tenant Allow/Block List, quarantine configuration and false positive history. Map who is covered by which policy.
    Monitor: Threat reports, message trace, quarantine volumes.
    Risk if skipped: You make changes without understanding the current state.
  2. Phase 2: Enable Standard preset for a pilot group Apply the Standard preset security policy to a small pilot group. Monitor quarantine, user submissions and false positive feedback for at least two weeks.
    Monitor: Quarantine activity, user feedback, helpdesk tickets.
    Risk if skipped: Policy changes reach all users without validation.
  3. Phase 3: Identify VIP and high-risk personas Identify executives, finance, HR and customer-facing users. Map which users need Strict protection, custom impersonation targets, or specific Safe Links and Safe Attachments settings.
    Monitor: Impersonation detection results, false positive rates for these groups.
    Risk if skipped: High-risk users stay on default protection.
  4. Phase 4: Apply Strict or custom policies to high-risk groups Enable Strict preset for VIPs and high-risk groups. Add custom anti-phishing policies with user and domain impersonation targets where needed. Pilot first.
    Monitor: Impersonation alerts, quarantine for these groups, false positive feedback.
    Risk if skipped: Targeted users remain under-protected.
  5. Phase 5: Tune Safe Links and Safe Attachments Review Safe Links blocked URL reports. Review Safe Attachments quarantine. Add justified exceptions with documentation. Confirm dynamic delivery works for high-volume mailboxes.
    Monitor: Blocked URLs, attachment quarantine, user complaints.
    Risk if skipped: Legitimate URLs or files are blocked without review.
  6. Phase 6: Review quarantine and user submissions workflow Confirm quarantine policies are set correctly for each message type. Enable user submissions. Train helpdesk on quarantine triage. Confirm notification frequency.
    Monitor: Quarantine release patterns, user submission volume, helpdesk load.
    Risk if skipped: Every quarantine event becomes a support ticket.
  7. Phase 7: Review Tenant Allow/Block List and mail flow bypasses Audit all allow entries for owner, justification and expiry. Remove stale or overly broad entries. Audit mail flow rules that bypass filtering. Document remaining exceptions.
    Monitor: Allow/block list usage, bypass rule scope.
    Risk if skipped: Legacy bypasses silently weaken protection.
  8. Phase 8: Expand and establish operational review Expand Standard preset to all users. Expand Strict to all identified high-risk groups. Establish quarterly Defender policy review cadence. Track false positive trends.
    Monitor: Overall threat detection, false positive rates, quarantine efficiency.
    Risk if skipped: Policies become stale and either too strict or too permissive.

Common Defender for Office 365 mistakes I still see in real tenants

  1. Leaving the tenant on default protection forever. The built-in protection policy provides a baseline, but it is not tuned for your organisation. At minimum, enable the Standard preset.
  2. Enabling Strict for everyone without monitoring. Strict thresholds are more aggressive. Without quarantine monitoring, legitimate email gets blocked and nobody notices until users complain.
  3. Creating too many custom policies. Every custom policy adds complexity. If you cannot explain why a custom policy exists, it probably should not exist. Prefer presets and layer custom only where needed.
  4. Not understanding policy priority. Strict overrides Standard overrides Custom overrides Default. If a user is in both Strict preset and a custom policy, Strict wins. Plan assignments carefully.
  5. Not protecting VIPs with impersonation detection. Executives, finance and HR leaders are the primary BEC targets. If they are not in the impersonation protection list, they are under-protected.
  6. No domain impersonation review. Attackers register lookalike domains. If you have not added your key partner domains to the impersonation protection list, you are missing these attacks.
  7. Broad allowlisting in Tenant Allow/Block List. Allowing entire domains or unauthenticated senders creates bypass paths. Every allow entry should be scoped, justified and reviewed.
  8. Trusting sender address alone for exceptions. Sender addresses can be spoofed. An allow for a sender address without requiring authentication lets attackers through.
  9. Bypassing filtering with mail flow rules. SCL -1 transport rules, "bypass spam filtering" conditions, and header overrides silently weaken the entire protection stack.
  10. No quarantine workflow. If nobody reviews quarantine, blocked messages accumulate, false positives go unnoticed, and users learn to ignore security controls.
  11. Users cannot report suspicious messages. If the Report message add-in is not deployed or built-in reporting is not enabled, users have no way to flag threats. This breaks the security feedback loop.
  12. Helpdesk releases quarantined phishing without security review. Helpdesk should triage, not release high-confidence phishing. Define escalation paths for different quarantine categories.
  13. No review of spoof intelligence overrides. Spoof intelligence decisions should be reviewed periodically. Stale overrides can either allow spoofed senders or block legitimate ones.
  14. No Safe Links review. Blocked URL reports reveal what users are clicking on. If nobody reviews these, you miss both threat patterns and false positive opportunities.
  15. No Safe Attachments pilot. Enabling Safe Attachments without testing delivery impact can slow down email for high-volume mailboxes. Pilot first.
  16. Not reviewing false positives. If users report false positives and nothing changes, they learn to ignore policy tips and stop reporting. Tune policies based on feedback.
  17. No owner for exceptions. Every Tenant Allow/Block List entry, every mail flow bypass, every trusted sender needs an owner and a review date. Unowned exceptions accumulate.
  18. No quarterly review. Threat landscape changes. Staff changes. Business processes change. Defender policies that are never reviewed become misaligned with reality.

Field notes

Practical observations from working with Microsoft 365 tenants configuring Defender for Office 365 and EOP:

Start with Standard if the tenant has no mature policy model

Standard preset is a strong, safe baseline. It is better than defaults and easier to manage than a custom-first approach. Enable it, monitor it, then layer stronger settings on top.

Strict is for targeted groups, not always for everyone

Strict thresholds work well for executives, finance and HR. Applying Strict to the entire tenant without monitoring creates quarantine noise and user frustration. Use Strict where the risk justifies it.

Custom policies should have a clear reason to exist

If you cannot explain in one sentence why a custom policy exists instead of a preset, it probably adds complexity without value. Presets cover most needs. Custom is for specific exceptions.

VIPs need explicit impersonation protection

Adding executives to the impersonation protection list is not optional for any tenant using Defender P1 or higher. BEC attacks target specific people. The protection must name those people.

Every allow needs an owner and review date

Treat Tenant Allow/Block List entries like firewall rules. Every exception should have a business justification, an owner, and a date when it will be reviewed. Unreviewed allows accumulate risk.

False positives are feedback, not failure

When a legitimate email is blocked, that is a tuning opportunity. Review the cause. Adjust confidence levels or trusted senders if justified. Submit to Microsoft. Do not disable the protection.

Quarantine needs a process, not just a policy

Configuring quarantine policies is step one. The operational process (who reviews, how fast, what gets released) is what determines whether quarantine works or just creates friction.

Bypass rules should be treated like firewall exceptions

Any mail flow rule or allow entry that bypasses Defender filtering should be narrow, documented, owned and reviewed on a schedule. Legacy bypasses are one of the most common security gaps in tenants I review.

What to fix first

If you are reviewing a tenant with gaps, start with the area that creates the most risk. The following table maps common weak areas to the first remediation action and why it matters.

Weakest areaFix firstWhy
Too many false positivesReview Tenant Allow/Block List, admin submissions and sender authenticationAvoids broad allows that weaken protection. Fixes root cause instead of adding bypasses.
VIP phishing riskConfigure protected users and domains in impersonation policyReduces impersonation and BEC risk for the highest-value targets.
Quarantine overloadAdjust quarantine policies and notification cadenceReduces helpdesk noise and ensures users can self-serve for spam.
Unknown policy stateExport current policies and map priority orderAvoids conflicts between presets and custom policies. Reveals gaps.
Mail flow bypass rulesRemove SCL -1 rules and replace with Tenant Allow/Block List or Enhanced FilteringRestores Defender protection that bypass rules silently disabled.
Users not reporting phishEnable Report Message add-in or built-in reportingImproves security feedback loop. Gives users a way to flag threats.

Recommended first 3 actions

For tenants starting from defaults or an unknown state, these three actions deliver the most immediate protection value:

ActionWhy this first
Enable Standard preset for a pilot groupSafe, Microsoft-maintained baseline. Low risk of disruption. Immediate protection improvement over defaults.
Configure protected users and domains for executives and financeBiggest BEC and impersonation risk. These users are the primary targets for business email compromise.
Audit Tenant Allow/Block List and SCL -1 mail flow rulesRemoves dangerous bypasses that silently weaken protection. Closes the most common security gaps.

What good looks like

A mature Defender for Office 365 environment is not one with the most policies or the strictest settings. It is one where protection is aligned with risk, exceptions are controlled, and operations can sustain the monitoring required.

  • Standard preset enabled as the baseline for all users (start with a pilot group, then expand once quarantine and false positives are understood)
  • Strict preset or custom policies applied to VIPs, executives and high-risk groups
  • Clear policy priority with no unintended overrides between presets and custom
  • Few custom policies, each with a documented reason
  • User and domain impersonation configured for key individuals and partners
  • Safe Links enabled where licensed, with time-of-click protection active
  • Safe Attachments enabled where licensed, with appropriate delivery mode per persona
  • Quarantine policies aligned with operational maturity (user release for spam, admin for phishing)
  • User submissions enabled and reviewed regularly
  • Tenant Allow/Block List entries scoped, justified, owned and reviewed
  • Mail flow bypass rules audited, minimised and documented
  • Spoof intelligence overrides reviewed periodically
  • False positives tracked and used to tune policies
  • Helpdesk trained to triage quarantine requests without releasing phishing
  • Outbound spam policy configured to block automatic external forwarding
  • Quarterly Defender policy review with documented outcomes

Save this as a PDF

This guide is designed to work as a living Defender for Office 365 field guide. Save it as PDF for your team, print it for security review meetings, or use it as a working reference during policy design and rollout.

The PDF-friendly summary includes:

  • Pre-flight checklist for Defender policy changes
  • Interactive Defender policy builder results
  • Standard vs Strict vs Custom decision table
  • Persona-based policy baseline table
  • Anti-phishing and impersonation recommendations
  • Safe Links and Safe Attachments checklists
  • Quarantine workflow
  • Tenant Allow/Block List review checklist
  • Common mistakes
  • Rollout phases

Use Ctrl + P (or Cmd + P on Mac) to print this page or save as PDF. The layout is print-optimised. Run the Defender policy builder before printing to include your results in the PDF.

Review your Defender policies

Use the interactive builder above to assess your current Defender posture. Review your preset policy status, quarantine workflow, Tenant Allow/Block List entries and mail flow bypasses. Share this guide with your Exchange, security and helpdesk teams to align on email protection before making changes.

Use the builder · Review the checklist · Plan your rollout

Published on tiagoscarvalho.com · Microsoft 365 architecture, security, and governance content for IT professionals.

Next
Next

Microsoft Purview DLP Policy Builder 2026: A Practical Guide for Microsoft 365 Admins