Categories Office 365Tutorials

Using Office 365 service health to get some answers quickly

Just another day in paradise: I was in the middle of a meeting and there were tons of messages about false-positives in my email, phone, SMS, Teams, smoke signals, you name it. In the beginning, the issue was detected because of attachments not being received in the organization and after a couple of minutes in Office 365 service health we found the culprit to be the ATP (advanced threat protection). Basically, we went to Office 365 Security & Compliance, Threat Management, and Dashboard. Looking at the numbers we noticed a spike in the malware trends, as depicted in the image below.

My line of thought was to check the Real-time detections and check if my organization was being targeted by an attack or something of the sorts. However, I noticed that virtually all office files were being blocked and they were not related (different senders), so my second thought was to open a ticket.

However, before spending the time in opening a ticket, I checked the Office 365 service health, and I noticed an informational icon in Exchange Online, and there was one advisory being listed, as depicted in the image below.

In the advisory blade, I was able to see the summary of the case and understand the details. By doing that I saved the time of opening a ticket, and I was able to set the proper expectation within my organization communicating the issue and now it is just matter of following up in the advisory to make sure that issue is fixed.

Featured image: Pixabay

Anderson Patricio

Anderson Patricio is a Canadian MVP in Cloud and Datacenter Management, and Office Server and Services, besides of the Microsoft Award he also holds a Solutions Master (MCSM) in Exchange, CISSP and several other certifications. Anderson contributes to the Microsoft Community with articles, tutorials, blog posts, twitter, forums and book reviews. He is a regular contributor here at Techgenix.com, MSExchange.org, ITPROCentral.com and Anderson Patricio.org (Portuguese).

Share
Published by
Anderson Patricio

Recent Posts

Exchange Server log files growth and inadequate disk space allocation

When it comes to Exchange, if you build it, it will grow. Exchange Server log file growth can fill up…

3 hours ago

Hold the phone! Voice communication is becoming cool again

Business telephone conversations have largely been supplanted by email. But voice communication is far from dead — and it may…

6 hours ago

What are the potential disadvantages of SSL/TLS?

There’s wide consensus on the benefits of SSL/TLS. However, not as much attention has been given to SSL/TLS disadvantages.

3 days ago

Exploring native software inventory logging in Windows Server

Windows Server has built-software inventory logging that can be very useful. Here’s how to use this little-known feature.

3 days ago

Passwordless authentication: Safer, better, and about time

Passwordless authentication has quickly become one of the primary means by which users access their laptops, phones, and tablets because…

3 days ago

Automated Incident Response in Office 365 ATP simplifies cybersecurity

Microsoft has pumped up Office 365 Advanced Threat Protection with a new feature, Automated Incident Response. Here’s what you need…

4 days ago