Skip to content

Commit 73a75f3

Browse files
authored
Merge pull request #2480 from MicrosoftDocs/TC-chrisda
TC-chrisda to Main
2 parents a341c90 + 2ff7157 commit 73a75f3

File tree

3 files changed

+93
-4
lines changed

3 files changed

+93
-4
lines changed
32.4 KB
Loading
52 KB
Loading

defender-office-365/reports-email-security.md

Lines changed: 93 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ description: "Admins can learn how to find and use the email security reports th
1919
ms.custom:
2020
- seo-marvel-apr2020
2121
ms.service: defender-office-365
22-
ms.date: 01/08/2025
22+
ms.date: 01/17/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -242,6 +242,10 @@ If you hover over a horizontal band in the diagram, you see the number of relate
242242

243243
:::image type="content" source="media/mail-flow-status-report-mailflow-view-details.png" alt-text="The Phishing block details in Mailflow view in the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-details.png":::
244244

245+
In Defender for Office 365, if you select **Phishing block** \> **General filter**, threat classification results are shown. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
246+
247+
:::image type="content" source="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png" alt-text="Screenshot of selecting Phishing block, General filter in the Mailflow view of the Mailflow status report." lightbox="media/mail-flow-status-report-mailflow-view-phishing-block-threat-class.png":::
248+
245249
The details table below the diagram shows the following information:
246250

247251
- **Date (UTC)**
@@ -688,7 +692,7 @@ In the details table below the chart, the following information is available:
688692
- **Subject**
689693
- **Sender**
690694
- **Recipients**
691-
- **Detection technology**: The same detection technology values from the chart.
695+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
692696
- **Delivery status**
693697
- **Sender IP**
694698
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -732,6 +736,91 @@ In Defender for Microsoft 365, the following actions are available at the top of
732736

733737
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
734738

739+
### View data by Email \> Phish and Chart breakdown by Threat classification (Defender for Office 365)
740+
741+
:::image type="content" source="media/threat-protection-status-report-phishing-threat-classification-view.png" alt-text="The Threat classification view for phishing email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-threat-classification-view.png":::
742+
743+
Threat classification in Defender for Office 365 uses AI to identify and categorize threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
744+
745+
In the **View data by Email \> Phish** view, selecting **Chart breakdown by Threat classification** shows the following information in the chart:
746+
747+
- **PII Gathering**
748+
- **Business intelligence**
749+
- **Invoice**
750+
- **Payroll**
751+
- **Gift card**
752+
- **Contact establishment**
753+
- **Task**
754+
- **None**
755+
756+
In the details table below the chart, the following information is available:
757+
758+
- **Date**
759+
- **Subject**
760+
- **Sender**
761+
- **Recipients**
762+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
763+
- **Threat classification**: The same threat classification values shown in the chart and described in [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
764+
- **Delivery status**
765+
- **Sender IP**
766+
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
767+
768+
To see all columns, you likely need to do one or more of the following steps:
769+
770+
- Horizontally scroll in your web browser.
771+
- Narrow the width of appropriate columns.
772+
- Zoom out in your web browser.
773+
774+
Select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** to modify the report by selecting one or more of the following values in the flyout that opens:
775+
776+
- **Date (UTC)** **Start date** and **End date**
777+
- **Detection** section:
778+
- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
779+
- **Advanced filter**: Phishing signals based on machine learning.
780+
- **General filter**: Phishing signals based on analyst rules.
781+
- **Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.
782+
- **Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.
783+
- **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
784+
- **Impersonation brand**: Sender impersonation of well-known brands.
785+
- **Mixed analysis detection**: Multiple filters contributed to the message verdict.
786+
- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
787+
- **Fingerprint matching**: The message closely resembles a previous detected malicious message.
788+
- **URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
789+
- **URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
790+
- **Impersonation user**: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
791+
- **Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
792+
- **Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
793+
- **File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
794+
- **File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
795+
- **Campaign**: Messages identified as part of a [campaign](campaigns.md).
796+
- **Threat classification**: Leave the value **All** or remove it, double-click in the empty box, and then select an available value.
797+
- **Priority account protection**: **Yes** and **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
798+
- **Evaluation**: **Yes** or **No**.
799+
- **Protected by**: **MDO** (Defender for Office 365) and **EOP**
800+
- **Direction**: Leave the value **All** or remove it, double-click in the empty box, and then select **Inbound**, **Outbound**, or **Intra-org**.
801+
- **Tag**: Leave the value **All** or remove it, double-click in the empty box, and then select **Priority account**. For more information about user tags, see [User tags](user-tags-about.md).
802+
- **Domain**: Leave the value **All** or remove it, double-click in the empty box, and then select an [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
803+
- **Policy type**: Select **All** or one of the following values:
804+
- **Anti-malware**
805+
- **Safe Attachments**
806+
- **Anti-phish**
807+
- **Anti-spam**
808+
- **Mail flow rule** (transport rule)
809+
- **Others**
810+
- **Policy name (details table view only)**: Select **All** or a specific policy.
811+
- **Recipients (separated by commas)**
812+
813+
When you're finished configuring the filters, select **Apply**, **Cancel**, or :::image type="icon" source="media/m365-cc-sc-clear-filters-icon.png" border="false"::: **Clear filters**.
814+
815+
If you select an entry from the details table by clicking anywhere in the row other than the check box next to the first column, an email details flyout opens. This details flyout is known as the _Email summary panel_ and contains summarized information that's also available on the [Email entity page in Defender for Office 365](mdo-email-entity-page.md) for the message. For details about the information in the Email summary panel, see [The Email summary panel](mdo-email-entity-page.md#the-email-summary-panel).
816+
817+
The following actions are available at the top of the Email summary panel for the Threat protection status report:
818+
819+
- :::image type="icon" source="media/m365-cc-sc-open-icon.png" border="false"::: **Open email entity**: For more information, see [The Email entity page in Microsoft Defender for Office 365](mdo-email-entity-page.md).
820+
- :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action**: For information, see [Threat hunting: The Take action wizard](threat-explorer-threat-hunting.md#the-take-action-wizard).
821+
822+
On the **Threat protection status** page, the :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **[Create schedule](#schedule-recurring-reports)**, :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Request report](#request-on-demand-reports-for-download)**, and :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="false"::: **[Export](#export-report-data)** actions are available.
823+
735824
### Chart breakdown by Delivery status
736825

737826
:::image type="content" source="media/threat-protection-status-report-phishing-delivery-status-view.png" alt-text="The Delivery status view for phishing email and malware email in the Threat protection status report." lightbox="media/threat-protection-status-report-phishing-delivery-status-view.png":::
@@ -754,7 +843,7 @@ In the details table below the chart, the following information is available:
754843
- **Subject**
755844
- **Sender**
756845
- **Recipients**
757-
- **Detection technology**: The same detection technology values from the chart.
846+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
758847
- **Delivery status**
759848
- **Sender IP**
760849
- **Tags**: For more information about user tags, see [User tags](user-tags-about.md).
@@ -811,7 +900,7 @@ In the details table below the chart, the following information is available:
811900
- **Date**
812901
- **Attachment filename**
813902
- **Workload**
814-
- **Detection technology**: The same detection technology values from the chart.
903+
- **Detection technology**: The same detection technology values as described in [View data by Email \> Phish and Chart breakdown by Detection Technology](#view-data-by-email--phish-and-chart-breakdown-by-detection-technology).
815904
- **File size**
816905
- **Last modifying user**
817906

0 commit comments

Comments
 (0)