Occasionally, Microsoft 365 Advanced Threat Protection (ATP) Safe Links service may mistakenly identify a Digify URL as malicious. This can happen when there is a “false-positive” result from Microsoft’s ATP algorithm.
While we are working with Microsoft to resolve the issue, to visit Digify URLs that are automatically blocked by the ATP Safe Links in Office 365 in the meantime, you can set up a custom "do not rewrite" list for specific groups in your organization.
How to set up a custom do-not-rewrite URLs list using Office 365 Advanced Threat Protection (ATP) Safe Links
ATP Safe Links protection uses "do not rewrite" lists for exceptions. If you are assigned a role with administrative privileges, you can whitelist Digify by setting up your custom "do not rewrite" lists.
You can set a "do not rewrite" list when you add or edit Safe Links policies that apply to specific recipients in your organization.
To view or edit a custom "do not rewrite" URLs list
Go to https://security.microsoft.com and sign in with the Microsoft account with admin rights.
In the left navigation, under Policies & rules > Threat policies > Safe Links.
In the section, you may choose Create or select an existing policy
On protection settings or Edit protection settings in existing policies
In the Do not rewrite the following URLs section and Manage URLs, select Add URLs, and enter the following URL
https://digify.com/* (For Digify App)
https://digify-download-cali.s3.us-west-1.amazonaws.com/* (For export Data room and Statistics)
When you are finished adding URLs, in the lower right corner of the screen, choose Save/Submit.
To allow the recipients in your organization to access Digify and all the subdomains and paths, we recommend adding a wildcard asterisks (*) to the end of the URL you specify in the “do not rewrite” list.
To learn more about Office 365 ATP Safe Links policies, here are some Help articles by Microsoft that you may find useful: