Skip to content

Commit

Permalink
Merge pull request #2459 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 01/16, 11:00 AM IST
  • Loading branch information
aditisrivastava07 authored Jan 16, 2025
2 parents 2b768c3 + 2f2a7db commit dd40065
Show file tree
Hide file tree
Showing 2 changed files with 29 additions and 2 deletions.
4 changes: 3 additions & 1 deletion defender-office-365/mdo-email-entity-page.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ f1.keywords:
ms.author: chrisda
author: chrisda
manager: deniseb
ms.date: 4/12/2024
ms.date: 01/16/2025
audience: ITPro
ms.topic: conceptual
ms.service: defender-office-365
Expand Down Expand Up @@ -196,6 +196,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:

- **Threat detection details** section: Information about threats detected in the message:
- **Threat classification**: AI determination of the threat. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
- **Threats**: The primary threat is indicated by :::image type="icon" source="media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
- **Confidence level**: Values are **High**, **Medium**, or **Low**.
- **Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
Expand Down Expand Up @@ -511,6 +512,7 @@ The following sections are available on the Email summary panel for all features
- **Delivery action**
- **Detection technologies**
- **Primary override : Source**
- **Threat classification**

- **Email details** section:
- **Sender display name**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ author: chrisda
manager: deniseb
audience: ITPro
ms.topic: conceptual
ms.date: 10/07/2024
ms.date: 01/15/2025
ms.localizationpriority: medium
ms.collection:
- m365-security
Expand Down Expand Up @@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
|Latest delivery location¹|Same values as **Original delivery location**</li></ul>|
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
Expand Down Expand Up @@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident

Hovering over a data point in the chart shows the count for each detection technology.

#### Threat classification chart pivot in the All email view in Threat Explorer

The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).

Hovering over a data point in the chart shows the count for each classification.

#### Full URL chart pivot in the All email view in Threat Explorer

The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
Expand Down Expand Up @@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
- **Data loss prevention rule**
- **Threat type**<sup>\*</sup>
- **Detection technology**
- **Threat classification**
- **Attachment Count**
- **URL Count**
- **Email size**
Expand Down Expand Up @@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
|**Sender domain**|||
|**Sender IP**|||
|**Delivery action**|||
|**Threat classification**|||
|**Detection technology**|||

The available chart pivots are described in the following subsections.
Expand Down Expand Up @@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t

Hovering over a data point in the chart shows the count for each delivery action.

#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections

The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).

Hovering over a data point in the chart shows the count for each classification.

#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections

The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
Expand Down Expand Up @@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
|**Data loss prevention rule**|||
|**Threat type**<sup>\*</sup>|||
|**Detection technology**|||
|**Threat classification**|||
|**Attachment Count**|||
|**URL Count**|||
|**Email size**|||
Expand Down Expand Up @@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|||
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|||
|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|||
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|||
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|||
|Latest delivery location|Same values as **Original delivery location**</li></ul>|||
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|||
Expand Down Expand Up @@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
|**Sender IP**|||
|**Delivery action**|||
|**Detection technology**|||
|**Threat classification**|||
|**Full URL**|||
|**URL domain**|||
|**URL domain and path**|||
Expand Down Expand Up @@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident

Hovering over a data point in the chart shows the count for each detection technology.

#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections

The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).

Hovering over a data point in the chart shows the count for each classification.

#### Full URL chart pivot in the Phish view in Threat Explorer

The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
Expand Down Expand Up @@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
|**Data loss prevention rule**|||
|**Threat type**<sup>\*</sup>|||
|**Detection technology**|||
|**Threat classification**|||
|**Attachment Count**|||
|**URL Count**|||
|**Email size**|||
Expand Down

0 comments on commit dd40065

Please sign in to comment.