Skip to main content
All CollectionsTools & Technical DocumentationTroubleshooting
Microsoft Defender marking Glasscubes links incorrectly malicious
Microsoft Defender marking Glasscubes links incorrectly malicious

This document describes how to stop Microsoft Defender flagging Glasscubes URLs as malicious.

Updated over a week ago

Follow the steps below to add domains used by Glasscubes to a Microsoft Defender for Microsoft 365 policy that prevents your users from seeing the following warning screen when clicking on emails in Outlook:

First step:

Go to “Report submission” in your Microsoft 365 Defender setting (you will need an account with special permissions, e.g. global admin) and add the URL as “Not junk”.


Second step:

Please note that depending on the scope of the license you have purchased, access to these settings in the Microsoft Defender may not be possible. For more information on this topic, please contact Microsoft Support.

1. First, please go to https://www.office.com/apps?auth=2&home=1 and, in the "Office 365" tab, select "Security".

A new tab of Microsoft 365 Defender will open.

2. Click on "Policies and rules" and then on “Threat policies”. Under "Threat policies" click on “Safe Links”.

The window for editing safe links opens.

3. Click on "Create" to add a new safe links policy if one is not present. Please skip to step 7 if you already have a policy (you need to edit it).

4. Name your policy and give it, if necessary, a description.

5. In the "Users and domains" tab, select your organization’s domain as the recipient domain.

6. In the protection settings, select “Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.”.

7. Next click on "Manage 0 URLs".

Now add the domains/URLs shown above to the policy. Please do not add http or https and use the exact URLs shown.

Once done submit/Save changes to the whole policy. In the case you have multiple policies please make sure this has a higher priority than others to be applied.

Did this answer your question?