Microsoft Defender Explorer
Steps to Follow
Access Threat Explorer:
Navigate to the Microsoft 365 Defender portal at https://security.microsoft.com.โMicrosoft Learn
In the navigation pane, select Email & collaboration, then choose Explorer.โMicrosoft Learn
Search for Specific Emails:
Use the search and filter options to locate emails based on criteria such as sender, recipient, subject, or detected threats.โ
For instance, to identify phishing attempts, select the Phish view.โMicrosoft Learn
Analyze Email Details:
Click on individual emails to view detailed information, including:โ
Sender and recipient details
Delivery and filtering information
Detected threats
URLs and attachments
Remediate Threats:
Select the emails you wish to act upon.โ
Click on Take action and choose the desired remediation action, such as Soft Delete or Hard Delete.โMicrosoft Learn
Provide necessary details in the side pane, including a name for the remediation, severity, and description.โMicrosoft Learn
Submit the action for approval.โMicrosoft Learn
Track Remediation Actions:
After submission, monitor the status of your actions in the Action center under the History tab.โ
Use filters like remediation name, approval ID, or status to locate specific actions.โMicrosoft Learn
Best Practices:
Batch Processing: For optimal performance, limit remediation actions to batches of 50,000 emails or fewer.โ
Targeted Remediation: Focus on emails in folders like Inbox, Junk, or Deleted Items to ensure effective remediation.โMicrosoft Learn
Two-Step Approval: Implement a two-step approval process for remediation actions to enhance security and oversight.
REFERENCES
Last updated
Was this helpful?