Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1061724

Microsoft Defender for Cloud Apps: Improvements to threat protection capabilities

Plan for Change
Major Change

Message ID

MC1061724
View in Admin Center

Services

Microsoft Defender XDR

Summary

Microsoft Defender for Cloud Apps will enhance threat protection with a new dynamic model for detections and alerts, rolling out from June to July 2025. This model allows faster response to threats and will be implemented seamlessly. Legacy policies will be disabled but visible temporarily. No admin action is required.

Details

Coming soon for Microsoft Defender for Cloud Apps: Improvements to threat protection capabilities. We will implement a new dynamic model for threat protection detections and alerts. This change aims to improve and maintain a high signal-to-noise Ratio (SNR) for detections.

When this will happen:

General Availability (Worldwide, GCC, GCC High, DoD): We will begin rolling out the first batch of policies early June 2025 and expect to complete by early July 2025.

How this will affect your organization:

Our new dynamic model allows our security researchers an ability to respond faster to new threats, to update detection logic based on the evolving threat landscape. This means that detections can be added, removed, or modified dynamically to ensure optimal protection against emerging threats. Note: These are research-driven detections, so Customers will enjoy the protection without the need to actively configure them.

This rollout will be seamless, and you will continue to receive the same standard of protection without disruption to the provided security coverage. After rollout begins, we will include the migrated policies in Create anomaly detection policies - Microsoft Defender for Cloud Apps | Microsoft Learn (to be updated).

The first batch of policies will be:

  1. Suspicious inbox manipulation rule
  2. Suspicious email deletion activity
  3. Suspicious email forwarding rule
  4. Activity from an anonymous proxy
  5. Activity from a botnet-associated IP address

Note: In addition to the policies in the first batch mentioned above, all other OOTB policies will eventually be migrated to the new dynamic model.

After this rollout:

  • By applying the new dynamic model, we aim to provide more accurate and timely threat detections, enhancing your overall organization security.
  • In some cases, policies may be split into several different detections and alerts in order to provide an additional degree of protection and better understanding for the SOC teams on the threat etymology.
  • For several months during the gradual migration of OOTB policies, the policies will be disabled but still temporarily visible in Defender for Cloud Apps. After the migration has completed, we will remove the policies from the legacy policies page, and we will send a separate MC post about this removal.

This migration will be seamless and available by default. However, please note that we will disable legacy policies and their configured governance actions. If you wish to retain governance actions, please re-enable the policies from the legacy policies page at Defender portal > Cloud apps > Policy management page.

admin settings:>
</p><p><b>What you need to do to prepare:</b></p><p>This <span style=

This rollout will happen automatically by the specified dates with no admin action required before the rollout. Review your current configuration to assess the impact on your organization. You may want to notify your users about this change and update any relevant documentation.

Timeline

📅
Published
Apr 24, 2025
Message published to Message Center
✏️
Updated
Apr 24, 2025
Message content updated
🏁
End Date
Aug 25, 2025
Message timeline ends

Tags

#Feature update#Admin impact

Category

📋Plan for Change

Related Messages

Similar updates

MC1052160●

Microsoft Defender XDR services: Changes to the IdentityInfo table in Advanced Hunting

Apr 10, 2025
MC1066159

Microsoft Defender for Endpoint for Linux: Removing Netfilter dependency

May 1, 2025
MC1057719

MDE Mobile: Open Wi-Fi and Certificate Detections will be logged as Events

Apr 18, 2025
MC1050724

Microsoft Defender: Microsoft Secure Score recommendation update

Apr 8, 2025
MC1073068

Microsoft Defender for Identity: We will disable collection of local administrators' group members (using SAM-R)

May 13, 2025