Defender for Office 365 Email Quarantine Queue Malware Report

This guide will show an administrator how to identify quarantined emails that pertain to failure related to Anti-Malware policy.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Security

Handbook Reference

Package: TBD

Domain: TBD

Modifies: TBD

O365 Security Identify Held Malware

  1. Navigate to the Quarantine – Microsoft Defender portal, locate and select Filters specifying the Quarantine Reasons as Malware followed by Apply.
  2. With the malware filter selected, any quarantined messages that have been flagged as malware will be propagated.
  3. As the administrator, you will be able to view the message and make any troubleshooting decisions dealing with message handling.

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.