Exchange Online|Microsoft 365|Office 365

Never Mind, Microsoft Won’t Retire Top Senders and Recipient Report

Earlier this year, Microsoft announced that they had planned to retire the top senders and recipient report from Microsoft Defender for Office 365. While I do not know the exact thought process Microsoft went through when making this decision, they clearly didn’t anticipate the widespread backlash from its users.

And it sounds like the feedback was heard as the company has announced that they will no longer kill this feature and its associated PowerShell cmdlets. Meaning Get-MailTrafficSummaryReport(Get-MailTrafficSummaryReport (ExchangePowerShell) will live to see another day.

Previously, Microsoft’s plans were to move this report to the Security and Compliance Center; this change was going to take place on June 14th but that decision has been punted, for now. The company was suggesting that administrators utilize the Threat protection status report but that recommendation came up short.

And I think that’s the important takeaway, Microsoft had made the decision to remove this report and I would suspect that at some point in the future, they will try to decommission the PowerShell cmdlet and associated report again.

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

As I heard from many Petri readers regarding this change, it’s good to see that Microsoft is listening to its users as this report is widely used across the industry for multiple reasons. While it’s good to see which mailboxes are being hit the hardest and most frequently, this report is also a baseline for identifying compromised mailboxes.

If you review this report frequently and a new mailbox pops into the list, it’s possible the account has been compromised and is being used to send out phishing emails from legitimate corporate mailboxes. There is no doubt that this is one of the more popular reports for Exchange and thankfully it’s not going away…yet.

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

 
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: