Skip to content

Commit 4ec71b7

Browse files
committed
Update reports-email-security.md
Updated View data by Email \> Malware** and **Chart breakdown by Detection Technology (added Campaign and sorted alpha)
1 parent f0adf9a commit 4ec71b7

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

defender-office-365/reports-email-security.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -489,6 +489,7 @@ In the **View data by Email \> Phish** and **Chart breakdown by Detection Techno
489489
- **Impersonation brand**: Sender impersonation of well-known brands.
490490
- **Impersonation domain**<sup>\*</sup>: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
491491
- **Impersonation user**<sup>\*</sup>: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
492+
- **LLM content analysis**: Analyis by Microsoft's purpose-built large language models to detect harmful email.
492493
- **Mailbox intelligence impersonation**<sup>\*</sup>: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
493494
- **Mixed analysis detection**: Multiple filters contributed to the message verdict.
494495
- **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
@@ -623,14 +624,14 @@ On the **Threat protection status** page, the :::image type="icon" source="media
623624
624625
In the **View data by Email \> Malware** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
625626

627+
- **Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
628+
- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
626629
- **File detonation**<sup>\*</sup>: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
627630
- **File detonation reputation**<sup>\*</sup>: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
628631
- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
629-
- **Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
630-
- **URL malicious reputation**
631632
- **URL detonation**<sup>\*</sup>: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
632633
- **URL detonation reputation**<sup>\*</sup>: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
633-
- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
634+
- **URL malicious reputation**
634635

635636
<sup>\*</sup> Defender for Office 365 only
636637

0 commit comments

Comments
 (0)