Skip to content

Commit e0cc6cc

Browse files
authored
Merge pull request #4286 from MicrosoftDocs/chrisda
Chrisda to Main
2 parents 40b1215 + 638fef8 commit e0cc6cc

File tree

4 files changed

+34
-31
lines changed

4 files changed

+34
-31
lines changed

defender-office-365/anti-phishing-protection-tuning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You can also use the [configuration analyzer](configuration-analyzer-for-securit
5757

5858
- On a monthly basis, run [Secure Score](/defender-xdr/microsoft-secure-score) to assess your organization's security settings.
5959

60-
- For messages that end up in quarantine by mistake (false positives), or for messages that are allowed through (false negatives), we recommend that you search for those messages in [Threat Explorer and real-time detections](threat-explorer-real-time-detections-about.md). You can search by sender, recipient, or message ID. After you locate the message, go to details by clicking on the subject. For a quarantined message, look to see what the "detection technology" was so that you can use the appropriate method to override. For an allowed message, look to see which policy allowed the message.
60+
- For messages that end up in quarantine by mistake (false positives), or for messages that are allowed through (false negatives), we recommend that you search for those messages in [Threat Explorer and real-time detections](threat-explorer-real-time-detections-about.md). You can search by sender, recipient, or message ID. After you locate the message, go to details by clicking on the subject. For a quarantined message, use the **Detection technology** value to find an appropriate method to override. For an allowed message, view which policy allowed the message.
6161

6262
- Email from spoofed senders (the From address of the message doesn't match the source of the message) is classified as _phishing_ in Defender for Office 365. Sometimes spoofing is benign, and sometimes users don't want messages from specific spoofed sender to be quarantined. To minimize the impact to users, periodically review the [spoof intelligence insight](anti-spoofing-spoof-intelligence.md), [entries for spoofed senders in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md#use-the-microsoft-defender-portal-to-view-entries-for-spoofed-senders-in-the-tenant-allowblock-list), and the [Spoof detections report](reports-email-security.md#spoof-detections-report). After you review allowed and blocked spoofed senders and make any necessary overrides, you can confidently [configure spoof intelligence in anti-phishing policies](anti-phishing-policies-about.md#spoof-settings) to **Quarantine** suspicious messages instead of delivering them to the user's Junk Email folder.
6363

defender-office-365/campaigns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The available properties and their associated values are described in the follow
174174
|Delivery action|Select one or more values¹: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**</li></ul>|
175175
|Additional action|Select one or more values¹: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
176176
|Directionality|Select one or more values¹: <ul><li>**Inbound**</li><li>**Intra-irg**</li><li>**Outbound**</li></ul>|
177-
|Detection technology|Select one or more values¹: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li></ul>|
177+
|Detection technology|Select one or more values¹: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**LLM content analysis**: Analysis by Microsoft's purpose-built large language models to detect harmful email.</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation**: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.</li<li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
178178
|Original delivery location|Select one or more values¹: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
179179
|Latest delivery location|Same values as **Original delivery location**</li></ul>|
180180
|System overrides|Select one or more values¹: <ul><li>**Allowed by user policy**</li><li>**Blocked by user policy**</li><li>**Allowed by organization policy**</li><li>**Blocked by organization policy**</li><li>**File extension blocked by organization policy**</li><li>**None**</li></ul>|

defender-office-365/reports-email-security.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -489,6 +489,7 @@ In the **View data by Email \> Phish** and **Chart breakdown by Detection Techno
489489
- **Impersonation brand**: Sender impersonation of well-known brands.
490490
- **Impersonation domain**<sup>\*</sup>: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
491491
- **Impersonation user**<sup>\*</sup>: Impersonation of protected senders that you specified in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) or learned through mailbox intelligence.
492+
- **LLM content analysis**: Analyis by Microsoft's purpose-built large language models to detect harmful email.
492493
- **Mailbox intelligence impersonation**<sup>\*</sup>: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
493494
- **Mixed analysis detection**: Multiple filters contributed to the message verdict.
494495
- **Spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
@@ -623,14 +624,14 @@ On the **Threat protection status** page, the :::image type="icon" source="media
623624
624625
In the **View data by Email \> Malware** and **Chart breakdown by Detection Technology** view, the following information is shown in the chart:
625626

627+
- **Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
628+
- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
626629
- **File detonation**<sup>\*</sup>: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
627630
- **File detonation reputation**<sup>\*</sup>: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
628631
- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
629-
- **Anti-malware engine**<sup>\*</sup>: Detection from anti-malware.
630-
- **URL malicious reputation**
631632
- **URL detonation**<sup>\*</sup>: [Safe Links](safe-links-about.md) detected a malicious URL in the message during detonation analysis.
632633
- **URL detonation reputation**<sup>\*</sup>: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
633-
- **Campaign**<sup>\*</sup>: Messages identified as part of a [campaign](campaigns.md).
634+
- **URL malicious reputation**
634635

635636
<sup>\*</sup> Defender for Office 365 only
636637

Lines changed: 28 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Understanding detection technology within the email entity page in Microsoft Defender for Office 365
3-
description: Guide to understanding the detection technology shown on the email entity page in Microsoft Defender for Office 365, what the detection technologies mean, how they're triggered, and how to resolve false positives (see the admin submission video).
3+
description: Guide to understanding the detection technology shown on the Email entity page in Microsoft Defender for Office 365. What the detection technologies mean, how they're triggered, and how to resolve false positives (see the admin submission video).
44
author: chrisda
55
ms.author: chrisda
66
manager: deniseb
@@ -16,41 +16,43 @@ ms.collection:
1616

1717
# Understanding detection technology in the email entity page of Microsoft Defender for Office 365
1818

19-
If a threat is detected on the Microsoft Defender for Office 365 [*email entity page*](../mdo-email-entity-page.md), threat information will display on the left-hand flyout. This panel will also show you the **detection technology** that led to that verdict.
19+
If a threat is detected on the Microsoft Defender for Office 365 [*email entity page*](../mdo-email-entity-page.md), threat information displays on the left-hand flyout. This panel also shows you the **detection technology** that led to that verdict.
2020

2121
This article is all about helping you **understand the different detection technologies**, how they work, and how to avoid any false alarms. Stay tuned for the Admin Submissions video at the end.
2222

2323
## Detection technology details table
2424

25-
To resolve false positives like the ones listed in the table below, you should always start with an **admin submission**, which will also prompt you to add an entry into the Tenant Allow/Block List (TABL). This entry adds a temporary override signal to the filters that determined the message was *malicious*, while filters are updated (if that's appropriate). See the articles below for more information on Admin submissions & TABL.
25+
To resolve false positives like the ones listed in the following table, you should always start with an **admin submission**, which also prompts you to add an entry into the Tenant Allow/Block List. This entry adds a temporary override signal to the filters that determined the message was *malicious*, while filters are updated (if that's appropriate). See the following articles for more information on admin submissions and the Tenant Allow/Block List.
2626

2727
- [Submissions: Report good email to Microsoft](../submissions-admin.md)
2828
- [Tenant Allow/Block List](../tenant-allow-block-list-about.md)
2929

3030
|The Detection technology|How it reaches a verdict|Notes|
31-
| -------- | -------- | -------- |
32-
|Advanced filter|Machine learning models based detection on email & contents, to detect phish & spam|
33-
|Antimalware protection|Detection from signature based anti-malware||
34-
|Bulk|Detection for advertising / marketing and similar message types with their relative complaint levels|[Step-by-Step guide on how to tune bulk thresholds](tune-bulk-mail-filtering-walkthrough.md)|
35-
|Campaign|Messages identified and grouped as part of a malware or phish campaign|[Learn more about campaigns](track-and-respond-to-emerging-threats-with-campaigns.md)|
36-
|Domain reputation|The message was sent from a domain that was identified as spam or phish domain, based on internal or external signals||
37-
|File detonation|Safe Attachments detected a malicious attachment during detonation within a sandbox||
38-
|File detonation reputation|File attachments previously detected by Safe Attachments during detonation||
39-
|File reputation|The message contains a file that was previously identified as malicious by other sources||
40-
|Fingerprint matching|The message resembles a previously detected malicious or spam message||
41-
|General filter|Phishing or spam signals based on analyst heuristics||
42-
|Impersonation brand|Sender impersonation of well-known brands||
43-
|Impersonation domain|Impersonation of sender domains that you own or specified for protection in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
44-
|Impersonation user|Impersonation of protected senders that you specified in anti-phishing policies|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
45-
|IP reputation|The message was sent from an IP that was identified as potentially malicious||
46-
|Mailbox intelligence impersonation|Sender detected as impersonating an address in the user's personal sender map|[Mailbox intelligence impersonation protection](../anti-phishing-policies-about.md)|
47-
|Mixed analysis detection|Multiple filters contributed to the verdict for this message||
48-
|Spoof DMARC|The message failed DMARC authentication|[How Microsoft 365 handles inbound email that fails DMARC](../email-authentication-dmarc-configure.md)|
49-
|Spoof external domain|Spoof intelligence detected email spoofing of a domain that is external to your organization||
50-
|Spoof intra-org|Spoof intelligence detected email spoofing of a user or domain that is internal to your organization||
51-
|URL detonation|Safe Links detected a malicious URL in the message during detonation within a sandbox||
52-
|URL detonation reputation|URLs previously detected by Safe Links during detonation||
53-
|URL malicious reputation|The message contains a URL that was previously identified as malicious or spam by other sources||
31+
|---|---|---|
32+
|Advanced filter|Machine learning models to detect phishing and spam.||
33+
|Antimalware protection|Detection from signature based anti-malware.||
34+
|Bulk|Detection for advertising/marketing and similar message types with their relative bulk complaint levels (BCL).|[Step-by-Step guide on how to tune bulk thresholds](tune-bulk-mail-filtering-walkthrough.md)|
35+
|Campaign|Messages identified and grouped as part of a malware or phishing campaign.|[Learn more about campaigns](track-and-respond-to-emerging-threats-with-campaigns.md)|
36+
|Domain reputation|The message was sent from a domain that was identified as spam or phishing domain, based on internal or external signals.||
37+
|File detonation|Safe Attachments detected a malicious attachment during detonation within a sandbox.||
38+
|File detonation reputation|File attachments previously detected by Safe Attachments during detonation.||
39+
|File reputation|The message contains a file that was previously identified as malicious by other sources.||
40+
|Fingerprint matching|The message resembles a previously detected malicious or spam message.||
41+
|General filter|Phishing or spam signals based on analyst heuristics.||
42+
|Impersonation brand|Sender impersonation of well-known brands.||
43+
|Impersonation domain|Impersonation of sender domains that you own or specified for protection in anti-phishing policies.|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
44+
|Impersonation user|Impersonation of protected senders that you specified in anti-phishing policies.|[Impersonation insight overview](../anti-phishing-mdo-impersonation-insight.md)|
45+
|IP reputation|The message was sent from an IP that was identified as potentially malicious.||
46+
|LLM content analysis|Analysis by Microsoft's purpose-built large language models to detect harmful email.||
47+
|Mailbox intelligence impersonation|Sender detected as impersonating an address in the user's personal sender map.|[Mailbox intelligence impersonation protection](../anti-phishing-policies-about.md)|
48+
|Mixed analysis detection|Multiple filters contributed to the verdict for this message.||
49+
|Spoof DMARC|The message failed DMARC authentication.|[How Microsoft 365 handles inbound email that fails DMARC](../email-authentication-dmarc-configure.md)|
50+
|Spoof external domain|Spoof intelligence detected email spoofing of a domain that is external to your organization.||
51+
|Spoof intra-org|Spoof intelligence detected email spoofing of a user or domain that is internal to your organization.||
52+
|URL detonation|Safe Links detected a malicious URL in the message during detonation within a sandbox.||
53+
|URL detonation reputation|URLs previously detected by Safe Links during detonation.||
54+
|URL malicious reputation|The message contains a URL that was previously identified as malicious or spam by other sources.||
5455

5556
## Watch a video on submitting messages to Microsoft to learn more
57+
5658
> [!VIDEO https://www.youtube.com/embed/ta5S09Yz6Ks]

0 commit comments

Comments
 (0)