Skip to content

Commit dd40065

Browse files
Merge pull request #2459 from MicrosoftDocs/main
Publish main to live, 01/16, 11:00 AM IST
2 parents 2b768c3 + 2f2a7db commit dd40065

File tree

2 files changed

+29
-2
lines changed

2 files changed

+29
-2
lines changed

defender-office-365/mdo-email-entity-page.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 4/12/2024
8+
ms.date: 01/16/2025
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
@@ -196,6 +196,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
196196
The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:
197197

198198
- **Threat detection details** section: Information about threats detected in the message:
199+
- **Threat classification**: AI determination of the threat. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
199200
- **Threats**: The primary threat is indicated by :::image type="icon" source="media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
200201
- **Confidence level**: Values are **High**, **Medium**, or **Low**.
201202
- **Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
@@ -511,6 +512,7 @@ The following sections are available on the Email summary panel for all features
511512
- **Delivery action**
512513
- **Detection technologies**
513514
- **Primary override : Source**
515+
- **Threat classification**
514516

515517
- **Email details** section:
516518
- **Sender display name**

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 10/07/2024
10+
ms.date: 01/15/2025
1111
ms.localizationpriority: medium
1212
ms.collection:
1313
- m365-security
@@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
181181
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
182182
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
183183
|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
184+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
184185
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
185186
|Latest delivery location¹|Same values as **Original delivery location**</li></ul>|
186187
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
@@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
279280

280281
Hovering over a data point in the chart shows the count for each detection technology.
281282

283+
#### Threat classification chart pivot in the All email view in Threat Explorer
284+
285+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
286+
287+
Hovering over a data point in the chart shows the count for each classification.
288+
282289
#### Full URL chart pivot in the All email view in Threat Explorer
283290

284291
The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
@@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
340347
- **Data loss prevention rule**
341348
- **Threat type**<sup>\*</sup>
342349
- **Detection technology**
350+
- **Threat classification**
343351
- **Attachment Count**
344352
- **URL Count**
345353
- **Email size**
@@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
681689
|**Sender domain**|||
682690
|**Sender IP**|||
683691
|**Delivery action**|||
692+
|**Threat classification**|||
684693
|**Detection technology**|||
685694

686695
The available chart pivots are described in the following subsections.
@@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t
721730

722731
Hovering over a data point in the chart shows the count for each delivery action.
723732

733+
#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections
734+
735+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
736+
737+
Hovering over a data point in the chart shows the count for each classification.
738+
724739
#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
725740

726741
The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
@@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
778793
|**Data loss prevention rule**|||
779794
|**Threat type**<sup>\*</sup>|||
780795
|**Detection technology**|||
796+
|**Threat classification**|||
781797
|**Attachment Count**|||
782798
|**URL Count**|||
783799
|**Email size**|||
@@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
895911
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|||
896912
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|||
897913
|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|||
914+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|||
898915
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|||
899916
|Latest delivery location|Same values as **Original delivery location**</li></ul>|||
900917
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|||
@@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
947964
|**Sender IP**|||
948965
|**Delivery action**|||
949966
|**Detection technology**|||
967+
|**Threat classification**|||
950968
|**Full URL**|||
951969
|**URL domain**|||
952970
|**URL domain and path**|||
@@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
9891007

9901008
Hovering over a data point in the chart shows the count for each detection technology.
9911009

1010+
#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections
1011+
1012+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
1013+
1014+
Hovering over a data point in the chart shows the count for each classification.
1015+
9921016
#### Full URL chart pivot in the Phish view in Threat Explorer
9931017

9941018
The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
@@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
10651089
|**Data loss prevention rule**|||
10661090
|**Threat type**<sup>\*</sup>|||
10671091
|**Detection technology**|||
1092+
|**Threat classification**|||
10681093
|**Attachment Count**|||
10691094
|**URL Count**|||
10701095
|**Email size**|||

0 commit comments

Comments
 (0)