1.3 Remediate Risks with Microsoft Defender for Office 365
Remediate Risks with Microsoft Defender for Office 365
Domain 3 — Manage Incident Response: "Investigate and remediate threats by using Microsoft Defender for Office 365, including automatic attack disruption."
Introduction
Email is the #1 initial access vector. Over 90% of successful cyberattacks begin with a phishing email, a malicious attachment, or a business email compromise message. Microsoft Defender for Office 365 is the product that stands between these attacks and your users’ inboxes.
This subsection teaches you to investigate and remediate email-based threats using Defender for Office 365. You will learn how the product detects threats (Safe Links, Safe Attachments, anti-phishing policies), how to use Threat Explorer for email investigation, how to take remediation actions (purge emails, block senders, submit for analysis), and how Automated Investigation and Response (AIR) handles email threats.
Module 8 (not yet built) will cover the detailed configuration of these protection policies. This subsection focuses on investigation and response — what you do when a phishing email gets through.
How Defender for Office 365 detects threats
Defender for Office 365 evaluates every inbound email through multiple detection layers:
| Layer | What it checks | What it catches |
|---|---|---|
| Anti-phishing (impersonation) | Display name similarity to protected users/domains, mailbox intelligence patterns | Executive impersonation, vendor impersonation, domain lookalikes |
| Safe Links | URLs rewritten and scanned at time of click | Malicious URLs, delayed-activation phishing pages |
| Safe Attachments | Attachment detonated in sandbox VM | Zero-day malware, macro-based malware |
| Anti-spam / anti-malware | Sender reputation, content patterns, known malware signatures | Bulk spam, known malware families |
| Zero-Hour Auto Purge (ZAP) | Post-delivery re-evaluation when verdict updates | Threats that passed initial scanning but were later identified |
When detection fires, it generates an alert that flows into the Defender XDR incident queue. A phishing campaign targeting multiple users may generate multiple email alerts that XDR correlates into a single incident.
Threat Explorer — the email investigation interface
Threat Explorer (Email & collaboration → Explorer) is the primary tool for email investigation. It provides:
- All Email view: Every email processed by the tenant, with delivery action, threat verdict, and detection details
- Phish view: Emails classified as phishing, with sender analysis and campaign clustering
- Malware view: Emails with malicious attachments
- URL clicks view: Which users clicked which URLs, with Safe Links verdict
Using Threat Explorer for a phishing investigation
Scenario: An incident contains a phishing alert. You need to determine the campaign scope — how many users received the email, how many were delivered, and how many clicked.
Step 1: In Threat Explorer, filter by sender domain (e.g., northgate-voicemail.com) and time range.
Step 2: The results show every email from that domain. Key columns:
- Delivery action: Delivered, Blocked, Junked, Replaced (ZAP’d)
- Detection technology: What caught it (URL reputation, impersonation, Safe Links, etc.)
- Latest delivery location: Where the email currently sits (Inbox, Junk, Quarantine, Deleted)
Step 3: Click “Email count” to see the total scope. Click individual emails to see recipient, subject, URLs, attachments, and full headers.
| |
| TotalEmails | Delivered | Blocked | Recipients |
|---|---|---|---|
| 23 | 19 | 4 | 23 |
Remediation actions for email threats
| Action | How to perform | When to use |
|---|---|---|
| Soft delete | Threat Explorer → select emails → Move to Deleted Items | Default for confirmed phishing — removes from inbox, recoverable for 14 days |
| Hard delete | Threat Explorer → select emails → Hard delete | Confirmed malware or high-confidence phishing where recovery is not desired |
| Move to Junk | Threat Explorer → select emails → Move to Junk | Lower-confidence spam/phishing — user can review if needed |
| Block sender | Tenant Allow/Block List → add sender domain | Ongoing campaign — prevents future delivery from this sender |
| Submit for analysis | Threat Explorer → select email → Submit to Microsoft | When you believe an email was incorrectly classified (false positive or false negative) |
Soft-deleted emails move to Deleted Items, then to Recoverable Items (14-day retention). Hard-deleted emails are permanently gone after the retention period. If you hard-delete 200 emails and one was a false positive, that business email is unrecoverable. Soft delete first, verify the classification, then hard delete if needed.
Email AIR — automated investigation for email threats
When Defender for Office 365 P2 detects a phishing campaign, Automated Investigation and Response (AIR) can:
- Identify all emails in the campaign (same sender, URL, or attachment hash)
- Determine which mailboxes received the campaign
- Check which users clicked URLs
- Recommend remediation (soft delete from all affected mailboxes)
- Execute remediation (with or without analyst approval, depending on your automation level)
The AIR investigation appears in the incident and in the Action center. Review the investigation findings, verify the scope is correct, and approve or reject the recommended actions.
Try it yourself
Threat Explorer and Advanced Hunting query the same underlying data. Explorer provides a visual interface with filtering and bulk actions. Advanced Hunting provides KQL flexibility for custom analysis. During a phishing investigation, use Explorer for campaign scoping and bulk remediation. Use Advanced Hunting when you need to correlate email data with sign-in or endpoint data (the cross-product join from Module 6.3).
Check your understanding
1. A phishing campaign delivered 19 of 23 emails to inboxes. What is your first remediation action?