8.8 Threat Explorer Deep Dive
Threat Explorer Deep Dive
By the end of this subsection, you will know when to use Threat Explorer vs Advanced Hunting, navigate Campaign View, take bulk remediation actions, and submit suspicious emails for analysis.
When to use Threat Explorer vs Advanced Hunting
| Need | Tool | Why |
|---|---|---|
| Investigate a specific phishing email | Threat Explorer | Visual email timeline, delivery details, click tracking |
| Trace a phishing campaign across recipients | Threat Explorer | Campaign View aggregates related emails |
| Take bulk remediation (delete emails from 50 mailboxes) | Threat Explorer | Built-in soft/hard delete across mailboxes |
| Join email data with sign-in logs | Advanced Hunting | Cross-table KQL joins (Threat Explorer cannot join) |
| Build automated detection rules | Advanced Hunting | Custom detection rules require KQL |
| Query email data across 30+ days | Advanced Hunting | Threat Explorer defaults to 30 days; KQL has full retention |
The Module 13 investigation used both: Threat Explorer for email campaign analysis (scope, recipients, delivery actions) and Advanced Hunting for the KQL queries that joined email data with sign-in logs (the phishing-to-signin correlation in Module 2.3).
Campaign View
Campaign View automatically clusters related phishing or malware emails into campaigns based on shared attributes: sender infrastructure, URL patterns, attachment hashes, and email content similarity.
What Campaign View shows:
- Total emails in the campaign
- Delivery breakdown (delivered, blocked, ZAP’d)
- Recipients who clicked URLs
- Timeline of campaign waves
- Infrastructure used (sender IPs, domains)
This is the visual equivalent of the cross-wave correlation query from Module 13.10 — but built into the portal with no KQL required.
Bulk remediation
When you identify a phishing campaign, you need to remove the emails from all affected mailboxes. Threat Explorer provides bulk actions:
- Filter to the campaign (sender domain, URL, subject, or campaign ID)
- Select all matching emails
- Choose action: Soft delete (move to Recoverable Items) or Hard delete (permanent)
- Confirm and execute
Soft-deleted emails can be recovered from Recoverable Items for up to 14 days. Hard-deleted emails are permanent (after the retention period). If you hard-delete and later discover a false positive, the email is gone. Soft-delete first, confirm the campaign is malicious, then hard-delete if needed.
Email investigation KQL patterns
| |
| Domain | EmailCount | Recipients | DeliveryActions | Subjects |
|---|---|---|---|---|
| northgate-voicemail.com | 23 | 23 | ["Delivered","Replaced"] | ["New voicemail from..."] |
Using Campaign View to connect related emails
Campaign View is the visual equivalent of the cross-wave correlation from Module 13.10 — but built into the portal with no KQL.
What Campaign View shows you:
| Data | Why it matters |
|---|---|
| Total emails in campaign | Your total exposure scope |
| Delivery breakdown | How many reached inboxes vs were blocked |
| Click-through rate | How many users interacted with the phishing URLs |
| Infrastructure | Sender IPs, domains — for IOC extraction |
| Timeline | When each wave was sent — shows the campaign’s progression |
| Top targeted recipients | Which departments or users are being specifically targeted |
| |
| CampaignId | EmailCount | Recipients | Domains | Delivered | Blocked |
|---|---|---|---|---|---|
| CAMP-2026-0314 | 118 | 86 | ["northgate-voicemail.com","northgate-docs.com",...] | 72 | 46 |
Try it yourself
1. Investigate: In Threat Explorer, view the campaign details — sender domain, URL pattern, delivery breakdown, click-through data.
2. Remediate email: Select all campaign emails, soft-delete from all 200 mailboxes.
3. Check clicks: Query UrlClickEvents for users who clicked the phishing URL.
4. Investigate clickers: For each user who clicked, check SigninLogs and AADNonInteractiveUserSignInLogs for token replay (Module 13.5).
5. Contain compromised accounts: Revoke sessions, reset password, force MFA re-registration for any user showing compromise indicators.
6. Block future waves: Create a transport rule blocking the URL pattern.
7. Extract IOCs: Sender domains, URLs, IPs — create custom indicators in Defender for Endpoint.
This is the complete cycle: detect → scope → remediate → investigate → contain → prevent.
Check your understanding
1. You identify a phishing campaign affecting 50 mailboxes. Should you soft delete or hard delete the emails?