Use the Submissions portal to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft
Tip
Did you know you can try the features in Microsoft 365 Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft 365 Defender portal trials hub. Learn about who can sign up and trial terms here.
Applies to
In Microsoft 365 organizations with Exchange Online mailboxes, admins can use the Submissions portal in the Microsoft 365 Defender portal to submit email messages, URLs, and attachments to Microsoft for scanning.
When you submit an email message for analysis, you will get:
- Email authentication check: Details on whether email authentication passed or failed when it was delivered.
- Policy hits: Information about any policies that may have allowed or blocked the incoming email into your tenant, overriding our service filter verdicts.
- Payload reputation/detonation: Up-to-date examination of any URLs and attachments in the message.
- Grader analysis: Review done by human graders in order to confirm whether or not messages are malicious.
Important
Payload reputation/detonation and grader analysis are not done in all tenants. Information is blocked from going outside the organization when data is not supposed to leave the tenant boundary for compliance purposes.
For other ways to submit email messages, URLs, and attachments to Microsoft, see Report messages and files to Microsoft.
Watch this short video to learn how to use admin submissions in Microsoft Defender for Office 365 to submit messages to Microsoft for evaluation.
What do you need to know before you begin?
You open the Microsoft 365 Defender portal at https://security.microsoft.com/. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
To submit messages and files to Microsoft, you need to have one of following roles:
Security Administrator or Security Reader in the Microsoft 365 Defender portal.
Note that one of these roles is required to View user submissions to the custom mailbox as described later in this article.
Admins can submit messages as old as 30 days if it is still available in the mailbox and not purged by the user or another admin.
Admin submissions are throttled at the following rates:
- Maximum submissions in any 15 minutes period: 150 submissions
- Same submissions in a 24 hour period: 3 submissions
- Same submissions in a 15 minute period: 1 submission
For more information about how users can submit messages and files to Microsoft, see Report messages and files to Microsoft.
Report questionable email to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Emails tab is selected based on the type of content you want to report, and then click
Submit to Microsoft for analysis.
In the Add the network message ID or upload the email file section, use one of the following options:
- Add the email network message ID: This is a GUID value that's available in the X-MS-Exchange-Organization-Network-Message-Id header in the message or in the X-MS-Office365-Filtering-Correlation-Id header in quarantined messages.
- Upload the email file (.msg or .eml): Click Browse files. In the dialog that opens, find and select the .eml or .msg file, and then click Open.
In the Choose a recipient who had an issue box, specify the recipient that you would like to run a policy check against. The policy check will determine if the email bypassed scanning due to user or organization policies.
In the Select a reason for submitting to Microsoft section, select one of the following options:
- Should not have been blocked (False positive)
- Should have been blocked (False negative): In the The email should have been categorized as section that appears, select one of the following values (if you're not sure, use your best judgment):
- Phish
- Malware
- Spam
When you're finished, click Submit.
Report questionable URLs to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the URLs tab is selected based on the type of content you want to report, and then click
Submit to Microsoft for analysis.
In the URL box that appears, enter the full URL (for example,
https://www.fabrikam.com/marketing.html
).In the Select a reason for submitting to Microsoft section, select one of the following options:
- Should not have been blocked (False positive)
- Should have been blocked (False negative): In the This URL should have been categorized as section that appears, select one of the following values (if you're not sure, use your best judgment):
- Phish
- Malware
When you're finished, click Submit.
Note
URL submissions are not available in clouds that do not allow for data to leave the environment. The ability to select URL will be greyed out.
Report questionable email attachment to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Email attachments tab is selected based on the type of content you want to report, and then click
Submit to Microsoft for analysis.
In the File section that appears, click Browse files. In the dialog that opens, find and select the file, and then click Open.
In the Select a reason for submitting to Microsoft section, select one of the following options:
- Should not have been blocked (False positive)
- Should have been blocked (False negative): In the This file should have been categorized as section that appears, select one of the following values (if you're not sure, use your best judgment):
- Phish
- Malware
When you're finished, click Submit.
Note
If malware filtering has replaced the message attachments with the Malware Alert Text.txt file, you need to submit the original message from quarantine that contains the original attachments. For more information on quarantine and how to release messages with malware false positives, see Manage quarantined messages and files as an admin. File submissions are not available in the clouds that do not allow for data to leave the environment. The ability to select File will be greyed out.
View email admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Emails tab is selected.
You can sort the entries by clicking on an available column header. Click Customize columns to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
- Submission name*
- Sender*
- Recipient
- Date submitted*
- Reason for submitting*
- Status*
- Result*
- Filter verdict
- Delivery/Block reason
- Submission ID
- Network Message ID/Object ID
- Direction
- Sender IP
- Bulk compliant level (BCL)
- Destination
- Policy action
- Submitted by
- Phish simulation
- Tags*
- Allow
When you're finished, click Apply.
To filter the entries, click Filter. The available filters are:
- Date submitted: Start date and End date.
- Submission ID: A GUID value that's assigned to every submission.
- Network Message ID
- Sender
- Recipient
- Name
- Submitted by
- Reason for submitting
- Status
- Tags
When you're finished, click Apply.
To group the entries, click Group and select one of the following values from the dropdown list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click Export. In the dialog that appears, save the .csv file.
View email attachment admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the Email attachments tab is selected.
You can sort the entries by clicking on an available column header. Click Customize columns to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
- Attachment name*
- Date submitted*
- Reason for submitting*
- Status*
- Result*
- Filter verdict
- Delivery/Block reason
- Submission ID
- Object ID
- Policy action
- Submitted by
- Tags*
- Allow
When you're finished, click Apply.
To filter the entries, click Filter. The available filters are:
- Date submitted: Start date and End date.
- Submission ID: A GUID value that's assigned to every submission.
- Attachment filename
- Submitted by
- Reason for submitting
- Status
- Tags
When you're finished, click Apply.
To group the entries, click Group and select one of the following values from the dropdown list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click Export. In the dialog that appears, save the .csv file.
View URLs admin submissions to Microsoft
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, verify that the URLs tab is selected.
You can sort the entries by clicking on an available column header. Click Customize columns to select the columns you need. All columns can be selected and showed in the submission grid. The default values are marked with an asterisk (*):
- URL*
- Date submitted*
- Reason for submitting*
- Status*
- Result*
- Filter verdict
- Delivery/Block reason
- Submission ID
- Object ID
- Policy action
- Submitted by
- Tags*
- Allow
When you're finished, click Apply.
To filter the entries, click Filter. The available filters are:
- Date submitted: Start date and End date.
- Submission ID: A GUID value that's assigned to every submission.
- URL
- Submitted by
- Reason for submitting
- Status
- Tags
When you're finished, click Apply.
To group the entries, click Group and select one of the following values from the dropdown list:
- None
- Reason
- Status
- Result
- Tags
To export the entries, click Export. In the dialog that appears, save the .csv file.
Admin submission result details
Messages that are submitted in admin submissions are reviewed and results shown in the submissions detail flyout:
- If there was a failure in the sender's email authentication at the time of delivery.
- Information about any policy hits that could have affected or overridden the verdict of a message.
- Current detonation results to see if the URLs or files contained in the message were malicious or not.
- Feedback from graders.
If an override was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override, then the feedback from graders could take up to a day.
View user submissions to Microsoft
If you've deployed the Report Message add-in, the Report Phishing add-in, or people use the built-in reporting in Outlook on the web, you can see what users are reporting on the User reported message tab.
In the Microsoft 365 Defender portal at https://security.microsoft.com, go to the Submissions page at Actions & submissions > Submissions. To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission.
On the Submissions page, select the User reported messages tab.
You can sort the entries by clicking on an available column header. Click Customize columns to show the options. The default values are marked with an asterisk (*):
- Email subject*
- Reported by*
- Date reported*
- Sender*
- Reported reason*
- Result*
- Message reported ID
- Network Message ID
- Sender IP
- Reported from
- Phish simulation
- Converted to admin submission
- Tags*
- Marked as*
- Marked by
- Date marked
When you're finished, click Apply.
To filter the entries, click Filter. The available filters are:
- Date reported: Start date and End date.
- Reported by
- Email subject
- Message reported ID
- Network Message ID
- Sender
- Reported reason: Not junk, Phish, or Spam
- Reported from: Microsoft add-in or Third party add-in
- Phish simulation: Yes or No
- Converted to admin submission: Yes or No
- Tags
When you're finished, click Apply.
To group the entries, click Group and select one of the following values from the dropdown list:
- None
- Reason
- Sender
- Reported by
- Result
- Reported from
- Phish simulation
- Converted to admin submission
- Tags
To export the entries, click Export. In the dialog that appears, save the .csv file.
To notify users see Admin Review for Reported messages
Note
If organizations are configured to send user reported messages to the custom mailbox only, reported messages will appear in User reported messages but their results will always be empty (as they would not have been rescanned).
Undo user submissions
Once a user submits a suspicious email to the custom mailbox, the user and admin don't have an option to undo the submission. If the user would like to recover the email, it will be available for recovery in the Deleted Items or Junk Email folders.
Convert user reported messages from the custom mailbox into an admin submission
If you've configured the custom mailbox to intercept user-reported messages without sending the messages to Microsoft, you can find and send specific messages to Microsoft for analysis.
On the User reported messages tab, select a message in the list, click Submit to Microsoft for analysis, and then select one of the following values from the dropdown list:
If the message is reported to Microsoft, the Converted to admin submission value turns from no to yes. You can directly access the admin submission by clicking View the converted admin submission from the overflow menu inside the submission flyout of the respective user reported message.
View associated alert for user and admin email submissions
Important
The information in this section applies only to Defender for Office 365 Plan 2 or higher.
Currently, user submissions generate alerts only for messages that are reported as phishing.
For each user reported phishing message and admin email submission, a corresponding alert is generated.
To view the corresponding alert for a user reported phishing message, select the User reported messages tab, and then double-click the message to open the submission flyout. Click More options and then select View alert.
To view the corresponding alert for admin email submissions, select the Emails tab, and then double-click the message to open the submission flyout. Select View alert on the Open email entity option.
Feedback
Submit and view feedback for