top of page
Search

How to Prevent Users from Releasing Malicious Emails with Microsoft 365 Quarantine Policies

  • Hanna Korotka
  • 3 hours ago
  • 3 min read

Email‑based threats remain one of the most common entry points for cyberattacks. Even with advanced detection in place, the final risk often comes down to user actions. If users are allowed to release dangerous messages from quarantine, a single mistake can lead to credential theft, malware infection, or business email compromise.


This is where Microsoft 365 Quarantine Policies play a critical role. They allow organizations to tightly control what users can do with quarantined emails based on the type of threat detected, while keeping high‑risk decisions firmly in the hands of administrators.


This guide explains how quarantine policies work, what Microsoft allows by design, and how to configure them to reduce risk without breaking legitimate email workflows.


What Quarantine Policies Control in Microsoft 365


In Microsoft Defender for Office 365, quarantine policies define the end‑user experience for messages that are automatically quarantined by protection features such as anti‑spam, anti‑phishing, anti‑malware, and Safe Attachments. These policies do not decide what gets quarantined. Instead, they decide what happens after a message is already in quarantine.


Specifically, quarantine policies control two things: how users can interact with their own quarantined messages, and whether users receive periodic quarantine notification emails.


Microsoft intentionally limits user interaction for higher‑risk threats. Messages identified as malware or high‑confidence phishing are treated very differently from spam or bulk mail, and quarantine policies enforce that separation.


How Microsoft Prevents User Release of High‑Risk Emails by Design


Microsoft’s default behavior already blocks users from releasing the most dangerous messages. Emails quarantined due to malware or high‑confidence phishing cannot be previewed or released by end users at all. These messages are restricted to administrators only, regardless of the quarantine policy assigned.


This design choice ensures that users cannot override detections that represent a clear security threat. Even if a user believes the message is legitimate, the release decision remains under administrative control.


For lower‑risk categories such as spam or bulk mail, Microsoft allows more flexibility. Users may be permitted to preview, delete, or release messages, depending on the quarantine policy assigned to the detection feature that quarantined the email.


Using Microsoft 365 Quarantine Policies to Limit User Actions


Administrators can go beyond Microsoft’s default behavior by creating custom quarantine policies. These policies allow you to reduce user permissions even for lower‑risk emails, ensuring users cannot directly release messages into their inbox.


A common security‑first approach is to allow users to request release, rather than release messages themselves. In this model, users can see that a message exists, but the final decision stays with IT or security administrators. Microsoft explicitly supports this configuration through custom quarantine policies.


Microsoft 365 Quarantine Policies are created and managed in the Microsoft Defender portal. Administrators configure them under Email & collaboration → Policies & rules → Threat policies → Quarantine policy, where default policies are available and custom policies can be created. Microsoft documents this workflow in detail in its official guidance on creating quarantine policies in the Microsoft Defender portal.


Custom policies can define whether users are allowed to preview messages, delete them, block senders, or submit release requests. Each of these actions can be enabled or disabled individually, giving organizations precise control without relying on user judgment alone.


Assigning Quarantine Policies to Security Features


Quarantine policies do nothing on their own unless they are assigned to protection features. Microsoft allows quarantine policies to be attached to supported threat policies such as anti‑spam, anti‑phishing, anti‑malware, and Safe Attachments.


When a policy is assigned, it applies only to messages quarantined by that specific feature. This means organizations can allow more flexibility for spam while keeping phishing and malware strictly locked down, all using Microsoft‑supported configurations.


It is important to note that changes to a quarantine policy affect only newly quarantined messages. Messages already in quarantine keep the policy that was applied at the time they were quarantined.


Why Quarantine Notifications Matter


Quarantine notifications are optional but powerful. Microsoft allows organizations to notify users every four hours, daily, or weekly about their quarantined messages. Notifications improve transparency and reduce helpdesk tickets, especially when users cannot see expected emails.


However, notifications should be used carefully. If users are notified too frequently without understanding the security context, they may pressure administrators to release unsafe messages. Clear internal guidance is essential when notifications are enabled.


Security Outcome: Reducing Risk Without Relying on Users


When configured correctly, Microsoft 365 Quarantine Policies strike a balance between usability and security. Users stay informed, legitimate emails are recoverable, and high‑risk content never reaches the inbox without explicit administrative approval.


Most importantly, organizations are no longer dependent on users to correctly identify malicious emails. The platform enforces security decisions automatically, exactly as Microsoft designed it.



 
 
 

Comments


Get the Latest News to Your Inbox

bottom of page