Microsoft 365 roadmap roundup – 3rd October 2022

Microsoft Information Protection

Updates listed under this heading combines the following products: Azure Information Protection, Microsoft compliance center, Information Protection, Microsoft Defender, Microsoft Intune, Security & Compliance center and Cloud App Security:

  • Launched (2)
  • Rolling out (6)
  • In development (2)


  • Microsoft Defender for Office 365: URL and attachment allow & block via submissions for government clouds – In government clouds, we honor the data residency commitments aligned with these environments. As a result, submissions are not sent to Microsoft. Admins can still create allow or block rules in the tenant allow/block list for emails via admin email submission. With this change, customers in our government cloud environments will be able to create allow and block entries for URLs and attachments in the Tenant allow block list via admin URL and email attachment submission. The data submitted via the submissions experience will not leave the customer tenant just as is standard for admin email submissions. Roadmap ID:98132
  • Microsoft 365 compliance center: Microsoft Purview | Data Lifecycle Management – Optimized behavior of deleted files with multiple versions in SharePoint (U.S. Government clouds)  – SharePoint Online items with multiple versions and a retention label now move to the Preservation Hold Library as a single file containing all versions when deleted.  Roadmap ID:93420


  • Microsoft Defender for Office 365: Expansion for URL Click Alert policy – We are expanding coverage of the malicious URL click alert. The alert will now include any clicks in the past 48 hours (for emails) from the time the malicious URL verdict is identified. Roadmap ID:93300
  • Microsoft 365 compliance center: Microsoft Purview | eDiscovery (Premium) – Jobs limit update (U.S. Government clouds) – The eDiscovery (Standard and Premium) jobs limit will be updated to provide users with better clarity on operational limit across the tenant. With simplified fewer jobs related limit, users will have better flexibility in managing these limits and how they are shared among different job types across the eDiscovery workflow. Roadmap ID: 93365
  • Microsoft Defender for Office 365: Updates to the common attachment filter in the anti-malware policy in government clouds – We are enhancing the common attachments filter (Anti-malware policy) to expand list of available file types and also manage custom file types in the portal.  Roadmap ID:93431
  • Microsoft Defender for Office 365: Anti-malware policy notifications in government clouds – The anti-malware policy can be configured with recipient and sender notifications when a message is quarantined. We are redesigning this notifications option and delivery. Roadmap ID:93433
  •  Microsoft Defender for Office 365: Enforce authentication to pass on AntiSpam allowed domains & senders for Spoof protection – Currently, EOP and MDO tenant administrators can specify domains and senders to be allowed using Anti-Spam policy. However, these domains and senders can be easily spoofed by attackers. We are making changes to improve the security of sender and domain allows defined in the Antispam policy and within user allow lists so that they require the domain or sender to pass authentication in order for the allow to be honored. The change only impacts messages that are considered to be internal, that is, the sender or domain is defined as an accepted domain in your organization. All other messages are handled as they are today. Roadmap ID:93436
  • Microsoft Defender for Office 365: Tenant blocks via admin submission – Security teams can now block sender email addresses, domains, URLs and email attachments while making admin submission for email, URL and file attachment respectively. Roadmap ID:98920


Release – October 2022

  • 🆕 Microsoft Defender for Office 365: Categorization of user-reported messages – An updated “Submissions” experience will categorize user-reported messages into individual tabs for Phish, Spam (Junk) etc., based on the user’s report. Roadmap ID: 100159

Release – January 2023

  • 🆕 Microsoft Defender for Office 365: End user reporting for suspicious messages in Microsoft Teams – End users will be able to report suspicious Microsoft Teams messages as a security threat just like they do for emails – to help the organization to protect itself from attacks via Microsoft Teams. Roadmap ID: 100160

Buy Me a Coffee at

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s