Skip to content

Commit 306bb65

Browse files
Merge pull request #2481 from MicrosoftDocs/main
Publish main to live, 01/17/25, 3:30 PM PT
2 parents 4f87fc9 + 73a75f3 commit 306bb65

File tree

4 files changed

+103
-11
lines changed

4 files changed

+103
-11
lines changed

defender-endpoint/live-response.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122122
## Initiate a live response session on a device
123123

124124
> [!NOTE]
125-
> Live response actions initiated from the Device page are not available in the machineactions API.
125+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126126
127-
1. Sign in to Microsoft Defender portal.
127+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128128

129-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130130

131131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132132

@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235235

236236
#### To upload a file in the library
237237

238-
1. Click **Upload file to library**.
238+
> [!NOTE]
239+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240+
241+
1. Select **Upload file to library**.
239242

240-
2. Click **Browse** and select the file.
243+
2. Select **Browse** and select the file.
241244

242245
3. Provide a brief description.
243246

244247
4. Specify if you'd like to overwrite a file with the same name.
245248

246249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247250

248-
6. Click **Confirm**.
251+
6. Select **Confirm**.
249252

250253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251254

@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255258

256259
> [!WARNING]
257-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
258261
259262
## Run a script
260263

32.4 KB
Loading
52 KB
Loading

defender-office-365/reports-email-security.md

Lines changed: 93 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ description: "Admins can learn how to find and use the email security reports th
1919
ms.custom:
2020
- seo-marvel-apr2020
2121
ms.service: defender-office-365
22-
ms.date: 01/08/2025
22+
ms.date: 01/17/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -242,6 +242,10 @@ If you hover over a horizontal band in the diagram, you see the number of relate
242242

243243
:::image type="content" source="media/mail-flow-status-report-mailflow-view-details.png" alt-text="The Phishing block details in Mailflow view in the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-details.png":::
244244

245+
In Defender for Office 365, if you select **Phishing block** \> **General filter**, threat classification results are shown. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
246+
247+
:::image type="content" source="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png" alt-text="Screenshot of selecting Phishing block, General filter in the Mailflow view of the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png":::
248+
245249
The details table below the diagram shows the following information:
246250

247251
- **Date (UTC)**
@@ -688,7 +692,7 @@ In the details table below the chart, the following information is available:
688692
- **Subject**
689693
- **Sender**
690694
- **Recipients**
691-
- **Detection technology**: The same detection technology values from the chart.
695+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
692696
- **Delivery status**
693697
- **Sender IP**
694698
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -732,6 +736,91 @@ In Defender for Microsoft 365, the following actions are available at the top of
732736

733737
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
734738

739+
### View data by Email \> Phish and Chart breakdown by Threat classification (Defender for Office 365)
740+
741+
:::image type="content" source="media/threat-protection-status-report-phishing-threat-classification-view.png" alt-text="The Threat classification view for phishing email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-threat-classification-view.png":::
742+
743+
Threat classification in Defender for Office 365 uses AI to identify and categorize threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
744+
745+
In the **View data by Email \> Phish** view, selecting **Chart breakdown by Threat classification** shows the following information in the chart:
746+
747+
- **PII Gathering**
748+
- **Business intelligence**
749+
- **Invoice**
750+
- **Payroll**
751+
- **Gift card**
752+
- **Contact establishment**
753+
- **Task**
754+
- **None**
755+
756+
In the details table below the chart, the following information is available:
757+
758+
- **Date**
759+
- **Subject**
760+
- **Sender**
761+
- **Recipients**
762+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
763+
- **Threat classification**: The same threat classification values shown in the chart and described in [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
764+
- **Delivery status**
765+
- **Sender IP**
766+
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
767+
768+
To see all columns, you likely need to do one or more of the following steps:
769+
770+
- Horizontally scroll in your web browser.
771+
- Narrow the width of appropriate columns.
772+
- Zoom out in your web browser.
773+
774+
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
775+
776+
- **Date (UTC)** **Start date** and **End date**
777+
- **Detection** section:
778+
- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
779+
- **Advanced filter**: Phishing signals based on machine learning.
780+
- **General filter**: Phishing signals based on analyst rules.
781+
- **Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.
782+
- **Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.
783+
- **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
784+
- **Impersonation brand**: Sender impersonation of well-known brands.
785+
- **Mixed analysis detection**: Multiple filters contributed to the message verdict.
786+
- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
787+
- **Fingerprint matching**: The message closely resembles a previous detected malicious message.
788+
- **URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
789+
- **URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
790+
- **Impersonation user**: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
791+
- **Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
792+
- **Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
793+
- **File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
794+
- **File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
795+
- **Campaign**: Messages identified as part of a [campaign](campaigns.md).
796+
- **Threat classification**: Leave the value **All** or remove it, double-click in the empty box, and then select an available value.
797+
- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
798+
- **Evaluation**: **Yes** or **No**.
799+
- **Protected by**: **MDO** (Defender for Office 365) and **EOP**
800+
- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.
801+
- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).
802+
- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
803+
- **Policy type**: Select **All** or one of the following values:
804+
- **Anti-malware**
805+
- **Safe Attachments**
806+
- **Anti-phish**
807+
- **Anti-spam**
808+
- **Mail flow rule** (transport rule)
809+
- **Others**
810+
- **Policy name (details table view only)**: Select **All** or a specific policy.
811+
- **Recipients (separated by commas)**
812+
813+
When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
814+
815+
If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
816+
817+
The following actions are available at the top of the Email summary panel for the Threat protection status report:
818+
819+
- :::image type="icon" source="media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity**: For more information, see [The Email entity page in Microsoft Defender for Office 365](mdo-email-entity-page.md).
820+
- :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**: For information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard).
821+
822+
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
823+
735824
### Chart breakdown by Delivery status
736825

737826
:::image type="content" source="media/threat-protection-status-report-phishing-delivery-status-view.png" alt-text="The Delivery status view for phishing email and malware email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-delivery-status-view.png":::
@@ -754,7 +843,7 @@ In the details table below the chart, the following information is available:
754843
- **Subject**
755844
- **Sender**
756845
- **Recipients**
757-
- **Detection technology**: The same detection technology values from the chart.
846+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
758847
- **Delivery status**
759848
- **Sender IP**
760849
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -811,7 +900,7 @@ In the details table below the chart, the following information is available:
811900
- **Date**
812901
- **Attachment filename**
813902
- **Workload**
814-
- **Detection technology**: The same detection technology values from the chart.
903+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
815904
- **File size**
816905
- **Last modifying user**
817906

0 commit comments

Comments
 (0)