You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/email-authentication-about.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,7 +180,7 @@ These values are explained at [Authentication-results message header](message-he
180
180
Admins and users can examine the message headers to discover how Microsoft 365 identified the sender as a suspicious spoofed sender or legitimate.
181
181
182
182
> [!TIP]
183
-
> It's important to understand that a composite authentication failure doesn't directly result in a message being blocked. Our system using a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices.
183
+
> It's important to understand that a composite authentication failure doesn't directly result in a message being blocked. Our system uses a holistic evaluation strategy that considers the overall suspicious nature of a message along with composite authentication results. This method is designed to mitigate the risk of incorrectly blocking legitimate email from domains that might not strictly adhere to email authentication protocols. This balanced approach helps distinguish genuinely malicious email from message senders that simply fail to conform to standard email authentication practices.
184
184
185
185
The following examples focus on the results of email authentication only (the `compauth` value and reason). Other Microsoft 365 protection technologies can identify messages that pass email authentication as spoofed, or identify messages that fail email authentication as legitimate.
The graph on the **Efficacy** card visually represents the protection given by Defender for Office 365 against phishing and malware in email messages:
55
+
The graph on the **Phish / Malware Efficacy** card visually represents the protection given by Defender for Office 365 against phishing and malware in email messages:
54
56
55
57
-**Pre-delivery**: Items detected before they reach the recipient's mailbox.
56
58
-**Post-delivery**: Items removed after the item was delivered to the recipient's mailbox via [zero-hour auto purge (ZAP)](zero-hour-auto-purge.md).
@@ -252,175 +254,93 @@ The graph on the **Microsoft 365 Secure Email Gateway performance** card compare
252
254
253
255
## Appendix: Advanced hunting efficacy query in Defender for Office 365 Plan 2
254
256
255
-
Organizations with Defender for Office 365 Plan 2 can use the following query in [advanced hunting](/defender-xdr/advanced-hunting-overview) to generate the same data on the [**Efficacy** card](#efficacy-card).
257
+
Organizations with Defender for Office 365 Plan 2 can use the following query in [advanced hunting](/defender-xdr/advanced-hunting-overview) to generate the same data on the [**Phish / Malware Efficacy** card](#phish--malware-efficacy-card).
256
258
257
259
> [!NOTE]
258
260
> The numbers might differ slightly due to the different refresh rates for advanced hunting vs. reporting data.
259
261
260
262
```kusto
261
263
// This query by default will take the last 30 days of data.
262
-
263
264
// The query and calculation can be tweaked to meet individual needs, and will update over time to get incrementally more accurate.
264
-
265
265
// Ben Harris - Microsoft Defender for Office 365 PM.
266
-
267
266
let _startTime = ago(30d);
268
-
269
267
let _endTime = now();
270
-
271
268
// Get all mailflow detected as clean at time of delivery
272
-
273
269
let EmailEventsClean = materialize(
274
-
275
270
EmailEvents
276
-
277
271
| where Timestamp between (_startTime .. _endTime) and EmailDirection == "Inbound"
278
-
279
272
| where ThreatTypes !contains "Phish" and ThreatTypes !contains "Malware"
280
-
281
273
| project NetworkMessageId,ThreatTypes
282
-
283
274
);
284
-
285
275
// Get all mailflow detected as phish or malware at time of delivery
286
-
287
276
let EmailEventsThreats = materialize(
288
-
289
277
EmailEvents
290
-
291
278
| where Timestamp between (_startTime .. _endTime) and EmailDirection == "Inbound"
292
-
293
279
| where ThreatTypes contains "Phish" or ThreatTypes contains "Malware"
(print StatisticName="Effectiveness Post Delivery", Value=abs(round(((toreal(FN_Admin_Submissions)+toreal(FN_ZAP_Unsuccessful))/(toreal(Mal_Phish_Mailflow)+toreal(FN_ZAP_Successful)+toreal(FN_ZAP_Unsuccessful)+toreal(FN_Admin_Submissions)-toreal(FP_ZAP))*100-100),2))),
0 commit comments