9.8 Threat Explorer Deep Dive
Threat Explorer Deep Dive
By the end of this subsection, you will know when to use Threat Explorer vs Advanced Hunting, navigate Campaign View, take bulk remediation actions, and submit suspicious emails for analysis.
When to use Threat Explorer vs Advanced Hunting
| Need | Tool | Why |
|---|---|---|
| Investigate a specific phishing email | Threat Explorer | Visual email timeline, delivery details, click tracking |
| Trace a phishing campaign across recipients | Threat Explorer | Campaign View aggregates related emails |
| Take bulk remediation (delete emails from 50 mailboxes) | Threat Explorer | Built-in soft/hard delete across mailboxes |
| Join email data with sign-in logs | Advanced Hunting | Cross-table KQL joins (Threat Explorer cannot join) |
| Build automated detection rules | Advanced Hunting | Custom detection rules require KQL |
| Query email data across 30+ days | Advanced Hunting | Threat Explorer defaults to 30 days; KQL has full retention |
The Module 14 investigation used both: Threat Explorer for email campaign analysis (scope, recipients, delivery actions) and Advanced Hunting for the KQL queries that joined email data with sign-in logs (the phishing-to-signin correlation in Module 2.3).
Campaign View
Campaign View automatically clusters related phishing or malware emails into campaigns based on shared attributes: sender infrastructure, URL patterns, attachment hashes, and email content similarity.
What Campaign View shows:
- Total emails in the campaign
- Delivery breakdown (delivered, blocked, ZAP’d)
- Recipients who clicked URLs
- Timeline of campaign waves
- Infrastructure used (sender IPs, domains)
This is the visual equivalent of the cross-wave correlation query from Module 14.10 — but built into the portal with no KQL required.
Bulk remediation
When you identify a phishing campaign, you need to remove the emails from all affected mailboxes. Threat Explorer provides bulk actions:
- Filter to the campaign (sender domain, URL, subject, or campaign ID)
- Select all matching emails
- Choose action: Soft delete (move to Recoverable Items) or Hard delete (permanent)
- Confirm and execute
Soft-deleted emails can be recovered from Recoverable Items for up to 14 days. Hard-deleted emails are permanent (after the retention period). If you hard-delete and later discover a false positive, the email is gone. Soft-delete first, confirm the campaign is malicious, then hard-delete if needed.
Email investigation KQL patterns
| |
| Domain | EmailCount | Recipients | DeliveryActions | Subjects |
|---|---|---|---|---|
| northgate-voicemail.com | 23 | 23 | ["Delivered","Replaced"] | ["New voicemail from..."] |
Using Campaign View to connect related emails
Campaign View is the visual equivalent of the cross-wave correlation from Module 14.10 — but built into the portal with no KQL.
What Campaign View shows you:
| Data | Why it matters |
|---|---|
| Total emails in campaign | Your total exposure scope |
| Delivery breakdown | How many reached inboxes vs were blocked |
| Click-through rate | How many users interacted with the phishing URLs |
| Infrastructure | Sender IPs, domains — for IOC extraction |
| Timeline | When each wave was sent — shows the campaign’s progression |
| Top targeted recipients | Which departments or users are being specifically targeted |
| |
| CampaignId | EmailCount | Recipients | Domains | Delivered | Blocked |
|---|---|---|---|---|---|
| CAMP-2026-0314 | 118 | 86 | ["northgate-voicemail.com","northgate-docs.com",...] | 72 | 46 |
Required role and blast radius
Required role: Security Reader (to view Threat Explorer). Security Administrator or Search and Purge role (to take remediation actions).
Threat Explorer investigation workflows
Threat Explorer is the email investigation tool for Defender for Office 365 P2. It provides real-time views of email threats, URL clicks, and campaign data — with the ability to take remediation actions directly.
Navigate to: Defender portal → Email & collaboration → Explorer.
View 1: All email. Shows every email in the specified time range with filtering by: sender, recipient, subject, delivery action, threat type, detection technology, and URL domain. This is the starting point for any email investigation.
View 2: Phish. Pre-filtered to show only emails classified as phishing. Sorted by delivery time. Shows: sender, recipient, subject, delivery action, detection technology, and whether the user clicked.
View 3: Content malware. Shows malware detected in SharePoint, OneDrive, and Teams files — the Safe Attachments for cloud content detections.
Investigation pattern: campaign scope
When you receive a phishing alert, the first question is: “Is this a single email or a campaign?”
Step 1: In Threat Explorer → Phish view, filter by sender domain or URL domain from the alert. Step 2: Expand the time range to 7-30 days. Look for: multiple emails from the same domain, sent to different recipients, over multiple days. Step 3: Check the Campaign view: Defender automatically clusters related emails into campaigns based on sender, URL, and content similarity.
| |
Remediation from Threat Explorer
When you identify malicious emails that were delivered to inboxes:
Soft delete: Moves the email to the Deleted Items folder. Users can recover it. Use for: confirmed phishing that users may have already read — the email disappears from the inbox without alerting the user.
Hard delete: Permanently removes the email from the mailbox. Users cannot recover it. Use for: confirmed malicious attachments that must not be accessible under any circumstances.
Move to junk: Moves the email to the Junk folder. Use for: suspicious-but-not-confirmed emails where you want to reduce user exposure without permanent deletion.
Remediation workflow in Threat Explorer: Select emails → Actions → “Move to Deleted Items” (soft delete) or “Delete” (hard delete). Remediation applies to all selected emails across all affected mailboxes. Track remediation status: Defender → Action center → Email remediation tab.
| |
Campaign Views — pattern recognition
Campaign Views automatically clusters related phishing or malware emails into campaigns. This saves significant investigation time — instead of manually correlating emails by sender, URL, and content, Defender does the clustering for you.
Navigate to: Defender → Email & collaboration → Explorer → Campaign tab.
Each campaign shows: the sender domain, URL domains, affected users, delivery outcomes, and a timeline. Click into a campaign to see all member emails and take bulk remediation actions.
Operational value: When a new phishing email is reported, check Campaign Views first. If the email belongs to an existing campaign: the scope is already known. If it is a new campaign: Campaign Views may identify additional recipient emails that have not yet been reported.
NIST CSF: RS.AN-3 (Forensics are performed), RS.MI-2 (Incidents are mitigated). ISO 27001: A.5.25 (Assessment and decision on information security events). SOC 2: CC7.4 (Detected incidents are communicated and acted upon). Threat Explorer is the investigation and remediation tool that demonstrates active email threat management.
Threat Explorer investigation scenario: Module 12 AiTM
Walk through the Threat Explorer investigation for the Northgate Engineering AiTM campaign:
Step 1: Initial alert. You receive a phishing alert. Open Threat Explorer → Phish view.
Step 2: Find the campaign. Filter by sender domain: northgate-voicemail.com. Time range: 27-28 February. Result: 23 emails to 23 unique recipients.
Step 3: Delivery analysis. Of the 23 emails: 4 were blocked by anti-phishing. 19 were delivered to inboxes. This is the “Delivered” metric from subsection 9.2 — 83% delivery rate indicates the phishing evaded most protection.
Step 4: Click analysis. Switch to URL tracking. Of the 19 delivered emails: 6 users clicked the Safe Links URL. Safe Links allowed the click (the URL was behind a CAPTCHA). This is the Safe Links gap from subsection 9.3.
Step 5: Remediation. Select all 19 delivered emails → Actions → Soft delete. This removes the remaining emails from the 13 users who received but did not click. The 6 clickers need containment (Module 12.7).
Step 6: Block future waves. Actions → Block sender domain: northgate-voicemail.com. Create a transport rule blocking the URL pattern for broader coverage.
| |
This single query reproduces the entire Threat Explorer investigation in KQL — useful when you need the data in Sentinel for cross-product correlation (joining with SigninLogs to find which clickers were compromised).
User-reported phishing
Threat Explorer integrates with user-reported messages. When a user clicks “Report phishing” in Outlook, the email appears in Threat Explorer under the Submissions tab. This creates a human sensor network — users reporting suspicious emails that automated detection missed.
Operational workflow: Review user submissions daily (5 minutes). For each: is it a true phishing email that detection missed? If yes: remediate (soft delete from all recipients), block the sender, and consider whether the anti-phishing threshold should be increased. Is it a false positive (legitimate email the user thought was phishing)? If yes: mark as “not a threat” — this feedback improves Defender’s ML models.
| |
A spike in user reports (3x the daily average) may indicate: an active phishing campaign that detection is missing, or a false positive wave (a legitimate email that looks suspicious). Investigate any spike before it becomes an incident.
Threat Explorer advanced filtering
Beyond basic sender/recipient filtering, Threat Explorer supports complex conditions that accelerate investigation:
Filter by detection technology: Show only emails caught by a specific detection layer. Useful for: assessing Safe Links effectiveness (filter: detection technology = URL detonation), evaluating impersonation protection (filter: detection technology = impersonation), and identifying emails that bypassed all detection (filter: delivery action = delivered, threat types = Phish).
Filter by URL domain: When investigating a phishing URL, filter all emails containing URLs pointing to that domain — across all recipients, all time ranges, and all subjects. This surfaces the complete campaign footprint regardless of how many different email subjects the attacker used.
Filter by sender IP: When investigating a compromised sending infrastructure (e.g., a vendor’s mail server), filter all email from that IP. This shows whether the compromised server sent phishing to other recipients beyond the initial alert.
Export to CSV: For large investigations: export Threat Explorer results to CSV for analysis in Excel or Python. This is useful when the investigation involves hundreds of emails and you need to: sort by recipient department (which department was targeted most?), correlate with HR data (were departing employees targeted differently?), or feed into a SIEM correlation query.
Threat Explorer vs KQL: when to use which
| Scenario | Use Threat Explorer | Use KQL |
|---|---|---|
| Quick investigation (< 5 minutes) | ✓ | |
| Campaign scope (single domain/URL) | ✓ | |
| Remediation (soft/hard delete) | ✓ | |
| Cross-product correlation (email + sign-in + endpoint) | ✓ | |
| Historical analysis (> 30 days) | ✓ | |
| Automated detection (scheduled rule) | ✓ | |
| Custom metrics and reporting | ✓ | |
| Integration with Sentinel incidents | ✓ |
The practical split: Use Threat Explorer for the immediate response (find the emails, remediate them, block the sender). Use KQL for the deeper investigation (correlate with sign-in logs, build detection rules, create the IR report). They complement — not replace — each other.
Try it yourself
1. Investigate: In Threat Explorer, view the campaign details — sender domain, URL pattern, delivery breakdown, click-through data.
2. Remediate email: Select all campaign emails, soft-delete from all 200 mailboxes.
3. Check clicks: Query UrlClickEvents for users who clicked the phishing URL.
4. Investigate clickers: For each user who clicked, check SigninLogs and AADNonInteractiveUserSignInLogs for token replay (Module 14.5).
5. Contain compromised accounts: Revoke sessions, reset password, force MFA re-registration for any user showing compromise indicators.
6. Block future waves: Create a transport rule blocking the URL pattern.
7. Extract IOCs: Sender domains, URLs, IPs — create custom indicators in Defender for Endpoint.
This is the complete cycle: detect → scope → remediate → investigate → contain → prevent.
Check your understanding
1. You identify a phishing campaign affecting 50 mailboxes. Should you soft delete or hard delete the emails?