You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-office-365/mdo-email-entity-page.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
ms.author: chrisda
6
6
author: chrisda
7
7
manager: deniseb
8
-
ms.date: 4/12/2024
8
+
ms.date: 01/16/2025
9
9
audience: ITPro
10
10
ms.topic: conceptual
11
11
ms.service: defender-office-365
@@ -196,6 +196,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
196
196
The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:
197
197
198
198
-**Threat detection details** section: Information about threats detected in the message:
199
+
-**Threat classification**: AI determination of the threat. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
199
200
-**Threats**: The primary threat is indicated by :::image type="icon" source="media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
200
201
-**Confidence level**: Values are **High**, **Medium**, or **Low**.
201
202
-**Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
@@ -511,6 +512,7 @@ The following sections are available on the Email summary panel for all features
Copy file name to clipboardExpand all lines: defender-office-365/threat-explorer-real-time-detections-about.md
+26-1Lines changed: 26 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: chrisda
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: conceptual
10
-
ms.date: 10/07/2024
10
+
ms.date: 01/15/2025
11
11
ms.localizationpriority: medium
12
12
ms.collection:
13
13
- m365-security
@@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
181
181
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
182
182
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
183
183
|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
184
+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
184
185
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
185
186
|Latest delivery location¹|Same values as **Original delivery location**</li></ul>|
186
187
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
@@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
279
280
280
281
Hovering over a data point in the chart shows the count for each detection technology.
281
282
283
+
#### Threat classification chart pivot in the All email view in Threat Explorer
284
+
285
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
286
+
287
+
Hovering over a data point in the chart shows the count for each classification.
288
+
282
289
#### Full URL chart pivot in the All email view in Threat Explorer
283
290
284
291
The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
@@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
340
347
-**Data loss prevention rule**
341
348
-**Threat type**<sup>\*</sup>
342
349
-**Detection technology**
350
+
-**Threat classification**
343
351
-**Attachment Count**
344
352
-**URL Count**
345
353
-**Email size**
@@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
681
689
|**Sender domain**|✔||
682
690
|**Sender IP**|✔||
683
691
|**Delivery action**|✔|✔|
692
+
|**Threat classification**|✔|✔|
684
693
|**Detection technology**|✔|✔|
685
694
686
695
The available chart pivots are described in the following subsections.
@@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t
721
730
722
731
Hovering over a data point in the chart shows the count for each delivery action.
723
732
733
+
#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections
734
+
735
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
736
+
737
+
Hovering over a data point in the chart shows the count for each classification.
738
+
724
739
#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
725
740
726
741
The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
@@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
778
793
|**Data loss prevention rule**|✔|✔|
779
794
|**Threat type**<sup>\*</sup>|✔|✔|
780
795
|**Detection technology**|✔|✔|
796
+
|**Threat classification**|✔|✔|
781
797
|**Attachment Count**|✔|✔|
782
798
|**URL Count**|✔|✔|
783
799
|**Email size**|✔|✔|
@@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
895
911
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|✔|✔|
896
912
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|✔|✔|
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|✔|✔|
898
915
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|✔|✔|
899
916
|Latest delivery location|Same values as **Original delivery location**</li></ul>|✔|✔|
900
917
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|✔||
@@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
947
964
|**Sender IP**|✔||
948
965
|**Delivery action**|✔|✔|
949
966
|**Detection technology**|✔|✔|
967
+
|**Threat classification**|✔|✔|
950
968
|**Full URL**|✔||
951
969
|**URL domain**|✔|✔|
952
970
|**URL domain and path**|✔||
@@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
989
1007
990
1008
Hovering over a data point in the chart shows the count for each detection technology.
991
1009
1010
+
#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections
1011
+
1012
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
1013
+
1014
+
Hovering over a data point in the chart shows the count for each classification.
1015
+
992
1016
#### Full URL chart pivot in the Phish view in Threat Explorer
993
1017
994
1018
The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
@@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
0 commit comments