Clients who have availed themselves of the Microsoft 365 Advanced Threat Protection service should be aware that emails might sometimes be quarantined. This process is an integral part of ensuring digital safety, but it can occasionally flag legitimate emails. To address this, clients receive a daily summary of quarantined emails. Additionally, this guide provides a step-by-step approach for clients to manually inspect and release any legitimate emails from the Quarantine.
In instances where legitimate emails from a specific address or domain are repeatedly flagged, clients are encouraged to reach out. This enables the team to implement exclusions, reducing the likelihood of such occurrences in the future. It’s crucial to remember that releasing an email from Quarantine should only be done when its legitimacy is unquestionably confirmed.
Steps to Access and Manage Quarantined Emails
- Accessing Quarantine: Start by opening a web browser and navigating to https://protection.office.com/quarantine. Here, clients need to log in using their email address and password;
- Locating Emails: Once logged in, peruse the list of quarantined emails. Find the email in question and select it by clicking the corresponding check box;
- Verifying Email Authenticity: Before releasing any email, it’s imperative to verify its authenticity. To do this, select the ‘Preview message’ option from the right-hand menu. After confirming the email’s legitimacy and ensuring it’s safe, clients can proceed to release it by clicking the blue ‘Release message’ button;
- Releasing and Reporting: Clients have the option to release the email either to themselves or to all original recipients. Additionally, there’s an option to report the message to Microsoft. This reporting helps refine Microsoft’s filters, reducing future false positives.
Important Reminder
If there is any uncertainty regarding the legitimacy of a quarantined email, clients are strongly advised to contact Impact Computing for guidance. Their team is always ready to assist in determining the nature of the email, ensuring clients’ digital safety.
Conclusion
Navigating the world of email security, particularly within the context of Microsoft 365 Advanced Threat Protection, requires vigilance and a proactive approach. By understanding the quarantine process, regularly checking for false positives, and collaborating with support teams like Impact Computing when necessary, clients can effectively manage their email security. This guide is a step towards empowering clients to take control of their digital correspondence, ensuring both the security and the integrity of their communications.