Office 365 Advanced Threat Protection
Office 365 Advanced Threat Protection (ATP) helps to protect your organization from malicious attacks by:
Scanning email attachments for malware with ATP Safe Attachments
Scanning web addresses (URLs) in email messages and Office documents with ATP Safe Links
Identifying and blocking malicious files in online libraries with ATP for SharePoint, OneDrive, and Microsoft Teams
Checking email messages for unauthorized spoofing with spoof intelligence
Detecting when someone attempts to impersonate your users and your organization's custom domains with ATP anti-phishing capabilities in Office 365
Protection through Office 365 ATP is determined by policies that your organization's security team defines for Safe Links, Safe Attachments, and Anti-Phishing. It's important to periodically review and revise your policies to keep them up to date and to take advantages of new features that are added to the service.
Reports are available to show how ATP is working for your organization. These reports can also show you areas where you might need to review and update your policies. And, if you have files that are marked as malware that shouldn't be, or files you'd like Microsoft to examine, you can submit a file to Microsoft for analysis.
New features are continually being added to ATP
We are continuing to add new features to Office 365, and that includes ATP. Below is a list of several new features, some of which call for an ATP policy to be reviewed and updated. To learn more about new features coming to ATP (or Microsoft 365 in general), visit the Microsoft 365 Roadmap.
|Feature updates||Action items|
|Beginning in October 2018 and rolling out over the next several months, when people are using Outlook Web Application (OWA) or Outlook, ATP Safe Links renders original URLs, not rewritten URLs. (We call this native link visibility.)||None|
|Beginning in September 2018, Office 365 ATP warning pages feature a new color scheme, more details, and the ability to continue to a site despite given warnings and recommendations.||None|
|Beginning in the second half of 2018, ATP Safe Links protection is extended to apply to URLs in Office Online (Word Online, Excel Online, PowerPoint Online, and OneNote Online) and Office 365 ProPlus on Mac.||Review and edit your ATP Safe Links policies|
|Beginning in late May 2018, quarantine capabilities in the Security & Compliance Center are being extended to ATP for SharePoint Online, OneDrive for Business, and Microsoft Teams.||Review and edit your ATP Safe Attachments policies|
|Beginning in March 2018, ATP Safe Links protection is extended to apply to email sent between people within an organization.||Review and edit your ATP Safe Links policies|
|Beginning in late October 2017, ATP Safe Links protection is extended to apply to URLs in email as well as URLs in Office 365 ProPlus documents, such as Word, Excel, PowerPoint, and Visio on Windows, as well as Office apps on iOS and Android devices.||Make sure you're using Modern Authentication for Office|
Get Office 365 ATP
Office 365 ATP is included in subscriptions, such as Microsoft 365 Enterprise, Microsoft 365 Business, Office 365 Enterprise E5, and Office 365 Education A5. If your organization has an Office 365 subscription that does not include Office 365 ATP, you can potentially purchase ATP as an add-on. For more information, see Office 365 Advanced Threat Protection Service Description.
Define policies for ATP
Set up ATP anti-phishing policies in Office 365 including impersonation-based attacks to protect against attackers who send email messages that appear to be from trusted people or domains
Set up ATP Safe Attachments policies in Office 365 and choose from several options, such as Dynamic Delivery and previewing
See how ATP is working by viewing reports
After your ATP policies are in place, reports are available to show how the service is working.
Make sure that you are an Office 365 global administrator, security administrator, or security reader. (See Permissions in the Office 365 Security & Compliance Center.)
If needed, make adjustments to your security policies. See the following resources:
Submit a suspicious file to Microsoft for analysis
If you get a file that you suspect could be malware, you can submit that file to Microsoft for analysis. Visit the Windows Defender Security Intelligence submission portal.
If you get an email message (with or without an attachment) that you'd like to submit to Microsoft for analysis, use the Report Message add-in.