Microsoft Phishing Report
The phishing report button allows users in your organization to identify and report suspicious emails securely and efficiently. Designed to integrate seamlessly into the everyday work environment, this button allows users to actively contribute to the company's cybersecurity with just one click.
What permissions are required and why?
When you install and sign in to the application, you will be asked to grant certain permissions. Below is a list of the requested permissions and their purposes:
- Sign you in and read your profile: This permission allows the application to authenticate you and retrieve basic information about your user account, such as your name and email address. It is used to associate reported messages with the correct user in your organization.
- Read and write access to your mail: This is necessary so the application can access the content of the reported email and optionally move it to a different folder (such as Junk or Deleted Items) after it has been reported.
- Maintain access to data you have given it access to: This allows the application to retain access to the granted permissions without requiring you to sign in every time. It ensures smooth operation and uninterrupted reporting capabilities.
How to install it?
To install the phishing report button in Microsoft for your entire organization follow these steps
➤ Admin Center
Log in to your Admin Center account and look in the left sidebar for the Settings > Integrated Applications tab.
➤ Upload the app
Download this XML file, click on Upload custom apps and follow the instructions to install the application as an Office Add-in.
➤ Find the button
The app will be reflected in 24 to 72 business hours in all users of your organization. You can find it in the top sidebar, when you open an email.
If you do not see the shortcut, you can find it by clicking on the Apps button in the same bar.
