Skip to content

Commit b0ebfed

Browse files
authored
Merge pull request #3546 from MicrosoftDocs/Teams-chrisda
Update mdo-support-teams-sec-ops-guide.md
2 parents 29ae6d8 + 06e7767 commit b0ebfed

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,11 @@ SecOps team members can proactively hunt for potentially malicious Teams message
8282
- **Content malware** tab: This tab contains files detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. You can use the [available filters](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-content-malware-view-in-threat-explorer-and-real-time-detections) to hunt on detection data.
8383
- **URL click** tab: This tab contains all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams. You can use the [available filters](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-url-clicks-view-in-threat-explorer) to hunt on detection data.
8484

85-
<!---
8685
- On the **Advanced hunting** page in the Defender portal at <https://security.microsoft.com/v2/advanced-hunting>. The following hunting tables are available for Teams-related threats:
86+
87+
> [!NOTE]
88+
> The hunting tables are currently in Preview.
89+
8790
- [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table): Contains raw data about every internal and external Teams message that included a URL. Sender address, Sender display name, Sender type, and more are available in this table.
8891
- [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table): Contains raw data about ZAP events on Teams messages.
8992
- [MessageUrlInfo](/defender-xdr/advanced-hunting-messageurlinfo-table): Contains raw data about URLs in Teams messages.
@@ -103,4 +106,3 @@ SecOps team members can proactively hunt for potentially malicious Teams message
103106
```
104107

105108
[Community queries in advanced hunting](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/use-community-queries-to-hunt-more-effectively-across-email-and-collaboration-th/4254664) also offers Teams query examples.
106-
--->

0 commit comments

Comments
 (0)