You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/reports-email-security.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -489,6 +489,7 @@ In the **View data by Email \> Phish** and **Chart breakdown by Detection Techno
489
489
-**Impersonation brand**: Sender impersonation of well-known brands.
490
490
-**Impersonation domain**<sup>\*</sup>: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
491
491
-**Impersonation user**<sup>\*</sup>: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
492
+
-**LLM content analysis**: Analyis by Microsoft's purpose-built large language models to detect harmful email.
492
493
-**Mailbox intelligence impersonation**<sup>\*</sup>: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
493
494
-**Mixed analysis detection**: Multiple filters contributed to the message verdict.
494
495
-**Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
@@ -623,14 +624,14 @@ On the **Threat protection status** page, the :::image type="icon" source="media
623
624
624
625
In the **View data by Email \> Malware** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
625
626
627
+
-**Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
628
+
-**Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
626
629
-**File detonation**<sup>\*</sup>: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
627
630
-**File detonation reputation**<sup>\*</sup>: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
628
631
-**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
629
-
-**Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
630
-
-**URL malicious reputation**
631
632
-**URL detonation**<sup>\*</sup>: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
632
633
-**URL detonation reputation**<sup>\*</sup>: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
633
-
-**Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
0 commit comments