Submission View

Submission View




⚑ ALL INFORMATION CLICK HERE πŸ‘ˆπŸ»πŸ‘ˆπŸ»πŸ‘ˆπŸ»

































Submission View


UIT
Resources for D2L
D2L Help
Instructor Tutorials
Quizzes
Submission Views


Note: Instructors who want to let learners review quiz submissions at a future date using
an Additional View, and wish to reveal answers to questions for a limited length of
time (like, say, 120 minutes), can add another Additional View with a "Date/Time"
restriction that takes place 120 minutes later than the original, first, Additional
View. In the secondary Additional View (same date, but set to open 120 minutes later
than the first view), the submission View Details are set to "No" for the "Show Questions?"
area. This secondary Additional View will supersede the first Additional View, and
effectively turns off access to quiz answers revealed via the "Show Questions?" ("Yes")
set up of the first view.

Advertise the opportunity by letting the class know availability date/time of the
β€œopening” of the submission view for study purposes.

This link can be posted in a course to show learners how to successfully access submission
views related to quizzes.

Links will open in a new tab or window dependent on browser/OS configuration.
What dialog boxes look like and how dialog boxes and browsers interact is dependent
upon the operating system and browser being used. The screenshots in this tutorial
may differ from the screen that the user is viewing when performing actions described.
UIT Service Desk 406-994-1777 helpdesk@montana.edu M-F,Β 8-5:00pm, Mountain Time
ECAT Team 406-994-3255 ecat@montana.edu M-F,Β 8-5:00pm, Mountain Time
For questions or comments contact the Ask Us Desk .





Table of contents



Exit focus mode





















Light



















Dark



















High contrast























Light



















Dark



















High contrast




This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Did you know you can try the features in Microsoft 365 Defender for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft 365 Defender portal trials hub . Learn about who can sign up and trial terms here .
In Microsoft 365 organizations with Exchange Online mailboxes, admins can use the Submissions portal in the Microsoft 365 Defender portal to submit email messages, URLs, and attachments to Microsoft for scanning.
When you submit an email message for analysis, you will get:
Payload reputation/detonation and grader analysis are not done in all tenants. Information is blocked from going outside the organization when data is not supposed to leave the tenant boundary for compliance purposes.
For other ways to submit email messages, URLs, and attachments to Microsoft, see Report messages and files to Microsoft .
Watch this short video to learn how to use admin submissions in Microsoft Defender for Office 365 to submit messages to Microsoft for evaluation.
You open the Microsoft 365 Defender portal at https://security.microsoft.com/ . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
To submit messages and files to Microsoft, you need to have one of following roles:
Security Administrator or Security Reader in the Microsoft 365 Defender portal .
Note that one of these roles is required to View user submissions to the custom mailbox as described later in this article.
Admins can submit messages as old as 30 days if it is still available in the mailbox and not purged by the user or another admin.
Admin submissions are throttled at the following rates:
For more information about how users can submit messages and files to Microsoft, see Report messages and files to Microsoft .
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, verify that the Emails tab is selected.
On the Emails tab, click Submit to Microsoft for analysis .
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value Email is selected.
Add the network message ID or upload the email file : Select one of the following options:
Add the email network message ID : This is a GUID value that's available in the X-MS-Exchange-Organization-Network-Message-Id header in the message or in the X-MS-Office365-Filtering-Correlation-Id header in quarantined messages.
Upload the email file (.msg or .eml) : Click Browse files . In the dialog that opens, find and select the .eml or .msg file, and then click Open .
Choose a recipient who had an issue : Specify the recipient that you would like to run a policy check against. The policy check will determine if the email bypassed scanning due to user or organization policies.
Select a reason for submitting to Microsoft : Verify Should not have been blocked (False positive) is selected.
The email should have been categorized as : Select Phish , Malware , or Spam . If you're not sure, use your best judgment.
Block all emails from this sender or domain : Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List .
After you select this option, the following settings are available:
By default, Sender is selected but you can select Domain instead.
Remove block entry after : The default value is 30 days , but you can select from the following values:
Block entry note : Enter optional information about why you're allowing this email.
When you're finished, click Submit , and then click Done .
For messages that were incorrectly blocked by spoof intelligence , a block entry for the domain pair is not created in the Tenant Allow/Block List.
For messages that were incorrectly blocked by domain or user impersonation protection , a block entry for the domain or sender is not created in the Tenant Allow/Block List. Instead, the domain or sender is added to the Trusted senders and domains section in the anti-phishing policy that detected the message.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, select the Email attachments tab.
On the Email attachments tab, click Submit to Microsoft for analysis .
On the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value Email attachment is selected.
File : Click Browse files to find and select the file to submit.
Select a reason for submitting to Microsoft : Verify Should have been blocked (False negative) is selected.
The email should have been categorized as : Select Phish or Malware . If you're not sure, use your best judgment.
Block this file : Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List .
After you select this option, the following settings are available:
Remove block entry after : The default value is 30 days , but you can select from the following values:
Block entry note : Enter optional information about why you're allowing this email.
When you're finished, click Submit , and then click Done .
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, select the URLs tab.
On the URLs tab, click Submit to Microsoft for analysis .
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value URL is selected.
URL : Enter the full URL (for example, https://www.fabrikam.com/marketing.html ), and then select it in the box that appears.
Select a reason for submitting to Microsoft : Verify Should have been blocked (False negative) is selected.
The email should have been categorized as : Select Phish or Malware . If you're not sure, use your best judgment.
Block this URL : Select this option to create a block entry for the sender in the Tenant Allow/Block List. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List .
After you select this option, the following settings are available:
Remove block entry after : The default value is 30 days , but you can select from the following values:
Block entry note : Enter optional information about why you're allowing this email.
When you're finished, click Submit , and then click Done .
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, verify that the Emails tab is selected.
On the Emails tab, click Submit to Microsoft for analysis .
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value Email is selected.
Add the network message ID or upload the email file : Select one of the following options:
Add the email network message ID : This is a GUID value that's available in the X-MS-Exchange-Organization-Network-Message-Id header in the message or in the X-MS-Office365-Filtering-Correlation-Id header in quarantined messages.
Upload the email file (.msg or .eml) : Click Browse files . In the dialog that opens, find and select the .eml or .msg file, and then click Open .
Choose a recipient who had an issue : Specify the recipient that you would like to run a policy check against. The policy check will determine if the email was blocked due to user or organization policies.
Select a reason for submitting to Microsoft : Select Should not have been blocked (False positive) , and then configure the following settings:
Allow emails with similar attributes (URL, sender, etc.) : Turn on this setting .
Remove allow entry after : The default value is 30 days , but you can select from the following values:
For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
Allow entry note : Enter optional information about why you're allowing this email.
For spoofed senders, any value you enter here is not shown in the allow entry on the Spoofed senders tab on the Tenant Allow/Block List .
When you're finished, click Submit , and then click Done .
After a few moments, the allow entry will appear on the Domains & addresses or Spoofed senders tab on the Tenant Allow/Block List page.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, select the Email attachments tab.
On the Email attachments tab, click Submit to Microsoft for analysis .
On the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value Email attachment is selected.
File : Click Browse files to find and select the file to submit.
Select a reason for submitting to Microsoft : Select Should not have been blocked (False positive) , and then configure the following settings:
Allow this file : Turn on this setting .
Remove allow entry after : The default value is 30 days , but you can select from the following values:
Allow entry note : Enter optional information about why you're allowing this file.
When you're finished, click Submit , and then click Done .
After a few moments, an allow entry will appear on the Files tab on the Tenant Allow/Block List page.
When the file is encountered again, it's not sent for Safe Attachments detonation or file reputation checks, and all other file-based filters are skipped. During mail flow, if messages containing the file pass other non-file checks in the filtering stack, the messages will be delivered.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, select the URLs tab
On the URLs tab, click Submit to Microsoft for analysis .
In the Submit to Microsoft for analysis flyout that appears, enter the following information:
Select the submission type : Verify the value URL is selected.
URL : Enter the full URL (for example, https://www.fabrikam.com/marketing.html ), and then select it in the box that appears. You can also provide a top level domain (for example, https://www.fabrikam.com/* ), and then select it in the box that appears.
Select a reason for submitting to Microsoft : Select Should not have been blocked (False positive) , and then configure the following settings:
Allow this URL : Turn on this setting .
Remove allow entry after : The default value is 30 days , but you can select from the following values:
Allow entry note : Enter optional information about why you're allowing this URL.
When you're finished, click Submit , and then click Done .
After a few moments, an allow entry will appear on the URL tab on the Tenant Allow/Block List page. For more information about the Tenant Allow/Block List, see Manage your allows and blocks in the Tenant Allow/Block List .
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, verify that the Emails tab is selected.
You can sort the entries by clicking on an available column header.
Click Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
When you're finished, click Apply .
To filter the entries, click Filter . The following values are available in the Filter flyout that appears:
When you're finished, click Apply . To clear existing filters, click Clear filters in the Filter flyout.
To group the entries, click Group and select one of the following values from the dropdown list:
To export the entries, click Export . In the dialog that appears, save the .csv file.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, verify that the Email attachments tab is selected.
You can sort the entries by clicking on an available column header.
Click Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
When you're finished, click Apply .
To filter the entries, click Filter . The following values are available in the Filter flyout that appears:
When you're finished, click Apply .
To group the entries, click Group and select one of the following values from the drop-down list:
To export the entries, click Export . In the dialog that appears, save the .csv file.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, verify that the URLs tab is selected.
You can sort the entries by clicking on an available column header.
Click Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
When you're finished, click Apply .
To filter the entries, click Filter . The following values are available in the Filter flyout that appears:
When you're finished, click Apply . To clear existing filters, click Clear filters in the Filter flyout.
To group the entries, click Group and select one of the following values from the dropdown list:
To export the entries, click Export . In the dialog that appears, save the .csv file.
Messages that are submitted in admin submissions are reviewed by Microsoft and results shown in the submissions detail flyout:
If an override was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override, then the feedback from graders could take up to a day.
If you've deployed the Report Message add-in , the Report Phishing add-in , or people use the built-in reporting in Outlook on the web , you can see what users are reporting on the User reported message tab.
In the Microsoft 365 Defender portal at https://security.microsoft.com , go to the Submissions page at Actions & submissions > Submissions . To go directly to the Submissions page, use https://security.microsoft.com/reportsubmission .
On the Submissions page, select the User reported messages tab.
Click Customize columns to select the columns that you want to view. The default values are marked with an asterisk (*):
When you're finished, click Apply .
To filter the entries, click Filter . The following values are available in the Filter flyout that appears:
W
Furkan Sert Muslim Ari Leave Me Mp3
Asian Mature Nn Gallery
Naughty America Porn 2022

Report Page