Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1184997

Microsoft Defender for O365: New email actions available in Advanced Hunting

Informational

Message ID

MC1184997
View in Admin Center

Services

Microsoft Defender XDR

Summary

Microsoft Defender for O365 now allows triggering new remediation actions—Submit to Microsoft, add to allow/block list, and initiate automated investigation—directly from the Advanced Hunting interface. This feature, rolled out since November 10, 2025, is enabled by default and supports improved threat response without policy changes.

Details

Introduction:

This update introduces new remediation actions in Microsoft Defender for O365 that can be triggered directly from the Advanced Hunting interface. These actions—previously only available in Threat Explorer—include “Submit to Microsoft” and “Initiate automated investigation.” This enhancement enables security teams to respond to threats more efficiently and programmatically using custom queries, aligning with customer feedback to streamline incident response workflows.

When this will happen:

General Availability (Worldwide): We began rolling out this feature on November 10, 2025.

How this affects your organization:

Who is affected:

  • Admins and Security Analysts using Microsoft Defender XDR and Advanced Hunting.

What will happen:

  • New actions will be available directly from Advanced Hunting results:
    • Submit to Microsoft
    • Add entries to Tenant allow/block list
    • Initiate automated investigation
  • These actions are enabled automatically and available by default; they cannot be removed from the user interface.
  • Existing admin policies are respected; no policy changes are required.
  • Threat Explorer will continue to be available; both interfaces will coexist.
What you can do to prepare:
  • Review and update existing hunting queries and playbooks to incorporate new actions.
  • Communicate the change to SOC teams and relevant stakeholders.
  • Provide training or documentation as needed.
  • If you want to scope access to these actions, use role-based access control (RBAC) in Microsoft Defender XDR.
    • Click path: Microsoft 365 Defender portal > Settings > Permissions > Roles

Learn more: Take action on advanced hunting query results in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn

Compliance considerations:

No compliance considerations identified, review as appropriate for your organization.

Timeline

📅
Published
Nov 12, 2025
Message published to Message Center
✏️
Updated
Nov 12, 2025
Message content updated
🏁
End Date
Dec 10, 2025
Message timeline ends

Tags

#Feature update#User impact#Admin impact

Category

📖Stay Informed

Related Messages

Similar updates

MC1194061

IP address changes in Defender for Identity v2.x sensor communication

Dec 10, 2025
MC1192254

Microsoft Defender for Endpoint: New Microsoft Secure Score recommendations

Dec 5, 2025
MC1171845

Microsoft Defender for Office 365: Enhancing the quarantine experience for administrators

Oct 13, 2025
MC1166867

Microsoft Defender for Office 365: Enhancing the quarantine email preview experience

Oct 6, 2025
MC1163754

Enhancements to the Deep Analysis tab of Email Entity page by Microsoft Defender for Office 365

Oct 1, 2025