Check provider logo

Defender anti-malware policy has admin notifications enabled for internal users sending malware

defender_malware_policy_notifications_internal_users_malware_enabled

Severitymedium
Servicedefender
by Prowler

Microsoft Defender for Office 365 anti-malware policies are checked for admin notifications on malware detected from internal senders, ensuring a valid notification address is defined (EnableInternalSenderAdminNotifications and InternalSenderAdminAddress).

Effective settings across default and custom policies are considered.

Risk

Without these notifications, malware sent from internal accounts can persist unnoticed, delaying response and containment. This undermines integrity of email, enables lateral movement and outbound propagation, and can cause domain reputation damage and blocklisting, affecting availability.

Run this check with Prowler CLI

prowler m365 --checks defender_malware_policy_notifications_internal_users_malware_enabled

Recommendation

Enable and maintain admin alerts for internal-sender malware and route to a monitored mailbox or SOC list (EnableInternalSenderAdminNotifications and InternalSenderAdminAddress).

Ensure coverage via policy precedence, integrate with SIEM, and apply least privilege and defense in depth to limit impact.

Remediation

CLI

Set-MalwareFilterPolicy -Identity Default -EnableInternalSenderAdminNotifications $true -InternalSenderAdminAddress "<ADMIN_EMAIL>"

Other
  1. In the Microsoft Defender portal (security.microsoft.com), go to Email & collaboration > Policies & rules > Threat policies > Anti-malware
  2. Select the affected policy (e.g., Default) and click Edit policy
  3. Open Notifications
  4. Turn on "Notify an admin about undelivered messages from internal senders"
  5. Add at least one Administrator email address
  6. Save

Source Code

Resource Type

NotDefined

References