diff --git a/defender-office-365/threat-explorer-real-time-detections-about.md b/defender-office-365/threat-explorer-real-time-detections-about.md
index e1077714f3..c5f0998e6e 100644
--- a/defender-office-365/threat-explorer-real-time-detections-about.md
+++ b/defender-office-365/threat-explorer-real-time-detections-about.md
@@ -7,7 +7,7 @@ author: chrisda
manager: deniseb
audience: ITPro
ms.topic: conceptual
-ms.date: 10/07/2024
+ms.date: 01/15/2025
ms.localizationpriority: medium
ms.collection:
- m365-security
@@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
|Additional action|Select one or more values:
- **Automated remediation**
- **Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).
- **Manual remediation**
- **None**
- **Quarantine release**
- **Reprocessed**: The message was retroactively identified as good.
- **ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).
|
|Directionality|Select one or more values: - **Inbound**
- **Intra-org**
- **Outbound**
|
|Detection technology|Select one or more values: - **Advanced filter**: Signals based on machine learning.
- **Antimalware protection**
- **Bulk**
- **Campaign**
- **Domain reputation**
- **File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.
- **File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.
- **File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.
- **Fingerprint matching**: The message closely resembles a previous detected malicious message.
- **General filter**
- **Impersonation brand**: Sender impersonation of well-known brands.
- **Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)
- **Impersonation user**
- **IP reputation**
- **Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).
- **Mixed analysis detection**: Multiple filters contributed to the message verdict.
- **spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).
- **Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.
- **Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.
- **URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.
- **URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.
|
+|Threat classification|Select one or more values: - **Business inteligence**
- **Contact establishment**
- **Gift card**
- **Invoice**
- **Payroll**
- <**PII gathering**/li>
- **Task**
For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
|Original delivery location|Select one or more values: - **Deleted Items folder**
- **Dropped**
- **Failed**
- **Inbox/folder**
- **Junk folder**
- **On-prem/external**
- **Quarantine**
- **Unknown**
|
|Latest delivery location¹|Same values as **Original delivery location**|
|Phish confidence level|Select one or more values: |
@@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
Hovering over a data point in the chart shows the count for each detection technology.
+#### Threat classification chart pivot in the All email view in Threat Explorer
+
+The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
+
+Hovering over a data point in the chart shows the count for each classification.
+
#### Full URL chart pivot in the All email view in Threat Explorer
The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
@@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
- **Data loss prevention rule**
- **Threat type**\*
- **Detection technology**
+- **Threat classification**
- **Attachment Count**
- **URL Count**
- **Email size**
@@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
|**Sender domain**|✔||
|**Sender IP**|✔||
|**Delivery action**|✔|✔|
+|**Threat classification**|✔|✔|
|**Detection technology**|✔|✔|
The available chart pivots are described in the following subsections.
@@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t
Hovering over a data point in the chart shows the count for each delivery action.
+#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections
+
+The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
+
+Hovering over a data point in the chart shows the count for each classification.
+
#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
@@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
|**Data loss prevention rule**|✔|✔|
|**Threat type**\*|✔|✔|
|**Detection technology**|✔|✔|
+|**Threat classification**|✔|✔|
|**Attachment Count**|✔|✔|
|**URL Count**|✔|✔|
|**Email size**|✔|✔|
@@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
|Additional action|Select one or more values: - **Automated remediation**
- **Dynamic Delivery**
- **Manual remediation**
- **None**
- **Quarantine release**
- **Reprocessed**
- **ZAP**
|✔|✔|
|Directionality|Select one or more values: - **Inbound**
- **Intra-org**
- **Outbound**
|✔|✔|
|Detection technology|Select one or more values: - **Advanced filter**
- **Antimalware protection**
- **Bulk**
- **Campaign**
- **Domain reputation**
- **File detonation**
- **File detonation reputation**
- **File reputation**
- **Fingerprint matching**
- **General filter**
- **Impersonation brand**
- **Impersonation domain**
- **Impersonation user**
- **IP reputation**
- **Mailbox intelligence impersonation**
- **Mixed analysis detection**
- **spoof DMARC**
- **Spoof external domain**
- **Spoof intra-org**
- **URL detonation**
- **URL detonation reputation**
- **URL malicious reputation**
|✔|✔|
+|Threat classification|Select one or more values: - **Business inteligence**
- **Contact establishment**
- **Gift card**
- **Invoice**
- **Payroll**
- <**PII gathering**/li>
- **Task**
For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|✔|✔|
|Original delivery location|Select one or more values: - **Deleted Items folder**
- **Dropped**
- **Failed**
- **Inbox/folder**
- **Junk folder**
- **On-prem/external**
- **Quarantine**
- **Unknown**
|✔|✔|
|Latest delivery location|Same values as **Original delivery location**|✔|✔|
|Phish confidence level|Select one or more values: |✔||
@@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
|**Sender IP**|✔||
|**Delivery action**|✔|✔|
|**Detection technology**|✔|✔|
+|**Threat classification**|✔|✔|
|**Full URL**|✔||
|**URL domain**|✔|✔|
|**URL domain and path**|✔||
@@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
Hovering over a data point in the chart shows the count for each detection technology.
+#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections
+
+The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
+
+Hovering over a data point in the chart shows the count for each classification.
+
#### Full URL chart pivot in the Phish view in Threat Explorer
The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
@@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
|**Data loss prevention rule**|✔||
|**Threat type**\*|✔|✔|
|**Detection technology**|✔|✔|
+|**Threat classification**|✔|✔|
|**Attachment Count**|✔|✔|
|**URL Count**|✔|✔|
|**Email size**|✔|✔|