What does the Defender Anti-Spam (Inbound) policy overrule?

Josh 40 Reputation points
2025-01-28T12:27:10.4433333+00:00

The Defender Anti-Spam, Anti-Malware and Anti-Phish policies all sit together in the Email Policy and Rules section, but I am trying to understand what an exception to these policies would over rule?

Mainly looking at the Anti-Spam Policy, as that is the one I most frequently add too, if I add an email to its exception list, what would it take for that email to still be blocked? If that email sent malware, would the Anti-Malware rule over rule the Anti-Spam and still block it?

I found the Microsoft Documentation on it but it wasn't very helpful in the context of what protection Anti-Spam removes and the prioritisation.

Any help would be great and please could I have the source of any information provided.

Microsoft 365
Microsoft 365
Formerly Office 365, is a line of subscription services offered by Microsoft which adds to and includes the Microsoft Office product line.
5,770 questions
Microsoft Intune Security
Microsoft Intune Security
Microsoft Intune: A Microsoft cloud-based management solution that offers mobile device management, mobile application management, and PC management capabilities.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
477 questions
Microsoft Defender for Identity
Microsoft Defender for Identity
A Microsoft service that helps protect enterprise hybrid environments from multiple types of advanced, targeted cyberattacks and insider threats.
251 questions
0 comments No comments
{count} votes

Accepted answer
  1. Catherine Kyalo 905 Reputation points Microsoft Employee
    2025-03-19T08:28:41.75+00:00

    The answer to your question is YES,

    If a package contains malicious content and manages to bypass an initial phishing filter, it will be detected and removed by the content filtering action.

    Below is how the layering in MDO works:

    1.      Edge protection: - This covers the outer wall which includes items like: Network throttling, IP reputation and domain reputation, this helps slow don suspicious traffic at the entrance.

    2.      Sender Intelligence – This checks credentials of anyone trying to enter: Here the focus is on domain impersonation, user impersonation and mailbox intelligence.

    3.      Content filtering – If anything gets past the sender intelligence then, the tools check the contents of any packages being brought in for any malicious links or suspicious patterns. (Anti - Malware)

    4.      Post-Delivery Protection-Finally, even if something slips through all the previous layers, features like Zero hour purge, safe links and safe attachments neutralize threats even after they have been delivered.

    If you find the answer above helpful, please Accept the answer to help anyone in the community who might have a similar question to quickly find the solution.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.