Things to know about "Exchange Online Protection"

The Microsoft cloud-based mail filter is quite aggressive, so you should regularly check your junk folder and quarantine page for incorrectly classified messages.

  • Quarantine emails contain a direct link to the quarantine website.
  • Personal Allow and Deny lists are managed in Outlook or Webmail (junk mail settings).
  • Allow-List entries apply to emails that have been classified as "Spam", but not to emails that have been quarantined as "Spoof" or "Phishing".
  • Not only incoming but also outgoing mail is filtered. Even internal mail traffic is subjected to some basic checks.
  • Quarantined messages remain in quarantine for 30 days, after which they are deleted.
  • Checking URLs in email messages protects against malicious links used in phishing and other attacks. (Safe links / time-of-click protection)
    Safe Links Time-of-Click protection is only available for Microsoft mail clients connected to cloud-based mailboxes.

Report emails as spam/junk or phishing, or even as not junk (false positive) to Microsoft

Your reports help the AI learn how to classify emails.

Outlook-App Report Message


Properties of the quarantine report messages from EOP

Sender address: quarantine@messaging.microsoft.com

Subject: Microsoft 365 security: You have messages in quarantine

Content example:


warning Note to the point >Request release<

Requests for the release of quarantined emails are manually checked by an ETH Zurich security administrator no more than once a day on working days and released at their own discretion.



Check emails from shared mailboxes that are in quarantine

Open https://security.microsoft.com/quarantine and log in with your authorized ETH user name.
Click on the filter icon to the right of the search field.
Under Recipient address, enter the email of the shared mailbox and click Apply.
The emails now appear in the list and can be checked.
If there are additional alias email addresses, they must be re-entered individually.



Non-permitted attachments - ETH Zurich list


The following attachment types are not accepted.
The restriction applies to incoming, outgoing and also internal e-mail.

File extension RuleComment
aceDefaultCompressed archive
aniDefaultAnimated mouse cursors
apkDefaultAndroid package
app DefaultApplication
appxDefaultWindows application
arjDefaultCompressed files
batDefaultBatch file
cabDefaultCabinet (archive)
ceoETH
chmETHMS compiled HTML file
cmdDefaultBatch file
cnfETHConfiguration file
comDefaultExecutable
cplETHControl panel file
debDefaultDebian package
dexDefaultDalvik EXecutable
dllDefaultWindows library
docmDefaultWord macro file
elfDefaultExecutable and linkable file
exeDefaultExecutable
htaDefaultHTML Application
imgDefaultDisk image
inetlocETHApple Finder internet location format
insETHWindows dialup configuration
isoDefaultDisk image
jarDefaultJava executable
jnlpDefaultJava network launching protocol
jobETHWindows task scheduler instructions
jseETHVisual studio
kextDefaultKernel extension
lhaDefaultCompressed archive
libDefaultLibrary
libraryDefaultLibrary
lnkDefaultLink files
lzhDefaultCompressed archive
machoDefaultMach-O object file
madETHMicrosoft access
mafETHMicrosoft access
magETHMicrosoft access
mamETHMicrosoft access macro
maqETHMicrosoft access
marETHMicrosoft access
masETHMicrosoft access
mavETHMicrosoft access
mawETHMicrosoft access
mscDefaultMicrosoft management console
msiDefaultMicrosoft software installer
msixDefaultWindows application package
mspDefaultWindows installer patch file
mstDefaultWindows installer setup transform
pifDefaultProgram information files
ppaDefaultPowerPoint
ppamDefaultPowerPoint add-on
regDefaultWindows registry file
revDefaultRecovery volume
scfDefaultWindows shell command file
scrDefaultWindows screen saver file
sctDefaultScriplet
shbETHWindows shortcut
shsETHShell scrap object
svgETHXML Scalable Vector Graphics
sysDefaultWindows system file
uifDefaultCompressed disc image
vbDefaultVisual basic
vbeDefaultVBScript
vbsDefaultVisual basic script
vxdDefaultApplication helper
wscDefaultWindows script component
wsfDefaultWindows script
wshDefaultWindows script host control
xllDefaultExcel add-in
xlsbETHExcel binary workbook
xnkETHMicrosoft Exchange shortcut
xzDefaultCompressed archive
zDefaultCompressed archive

Zero-hour auto purge (ZAP)

Zero-hour auto purge (ZAP) is a protection feature in Exchange Online Protection (EOP) that retroactively detects and neutralizes malicious phishing, spam, or malware messages that have already been delivered to Exchange Online mailboxes.

ZAP finds and takes automated action on messages that are already in a user's mailbox. ZAP's search is limited to the last 48 hours of delivered email. Users aren't notified if ZAP detects and deletes a message.

Detailed information on ZAP can be found here on the Microsoft website.