Thank you for those details. I have a query if anyone can answer. Reference host is selected adn exacted host profile from there. Now this profile is attached to another host which is newly installed. When it is checked for compliance, it shows Host Customization Required. But when Host Customization is clicked and opened, it shows empty box. Can you assist?
Allowed by whom? Microsoft does not decide corporate security, which is just as well obviously. Like I said, is a great tool, but too powerful, and it is utterly irresponsible to advise users about this tool unless you also make clear that users in corporate settings must not operate such tools without the strict blessing of their IT/security teams. That goes for any “fix” or action really. You actually need to be putting at the beginning of any article, “don’t do this on your business device unless you have the blessing of the relevant IT body” etc. Because it’s tools like this and other things that people download after reading about it on a helpful website that allow hackers to run amok once they can acquire entry via a compromised device.
Do not download any tool, Microsoft or otherwise, to your corporate device and attempt to “fix” things on your or other computers without the explicit approval of your IT team. Astounding that this even needs to be said.
Thanks for the good info. Microsoft’s ever-changing nature presents a challenge (and a rabbit-hole of searching). In reviewing mail status, we trigger the stock monthly email & collaboration report. (Using Defender for O365 Plan 1 policy defaults). Most data is obvious (Edge Block Spam, Good Mail, Malicious URL etc.) but there’s a column labeled ‘others’ – in our case tallying as much as 10% of total volume.
Any idea what that is? (and are these messages delivered? quarantined? bit-bucketed? returned to sender?)
By mistake I have tried this simulation ( Malware Attachment) in my personal laptop directly, worried how to remove that malicious thing running in my personal laptop, any idea like where that malicious file gets stored, Thanks in Advance