Email counts are calculated at the time of the investigation. Some counts are recalculated when you open investigation flyouts (based on the underlying query).
The following email count values are calculated at the time of investigation and don't change:
Email clusters on the Email tab.
The email quantity value shown on the email clusters flyout.
The following email count values reflect email messages that were received after the initial analysis of the investigation:
The email count shown at the bottom of the Email tab of the email clusters flyout.
The email count shown in Explorer (Threat Explorer)
For example, an email cluster that shows an original quantity of 10 messages shows an email list total of 15 if five more messages arrive between the investigation analysis phase and when an admin reviews the investigation. Likewise, old investigations might show higher message counts than Threat Explorer queries, because data in Microsoft Defender for Office 365 Plan 2 expires seven days after the end of a trial and 30 days later for paid licenses.
Historical and current email message counts are shown in different views to give the following information:
The email effect at the time of investigation.
The current email effect up to when the remediation is run.
For email, you might see a volume anomaly threat as part of the investigation. A volume anomaly indicates a spike in similar email messages around the investigation event time compared to earlier times. A spike in email traffic together with similarity in certain message properties (for example, subject, message body, sender domain, and sender IP) typically indicates the beginning of email attacks. But bulk email, spam, and legitimate email campaigns commonly share these same message properties.
Investigations from AIR in Defender for Office 365 Plan 2
By default, investigation details from yesterday and today are shown, but you can change the date range.
The following information shown on the Investigations page. You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
ID: The unique ID of the investigation. Select Open in new window to open the details of the investigation as described in the View investigation details section.
To filter the entries, select Filter. The following filters are available in the Filter flyout that opens:
Investigation type section: Select one or more of the following values:
Manual investigation
User-reported messages
Zapped File
Zapped URL
URL verdict change
User compromised
Time range section: Select Start date and End date values. Data is available for the last 72 days.
Status section: Select one or more of the following values described in the Investigation Status values section:
Starting
Running
No Threats Found
Terminated by System
Pending Action
Threats Found
Remediated
Partially Remediated
Terminated by User
Failed
Queued by Throttling
Terminated by Throttling
When you're finished in the Filter flyout, select Apply. To clear the filters, select Clear filters.
Use the Search box to find information on the page. Type text in the box and then press the ENTER key.
Use Export to save the visible information to a CSV file. The default filename is Investigations - Microsoft Defender.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, Investigations - Microsoft Defender (1).csv).
Investigation Status values
The Status values of an investigation indicate the progress of the analysis and actions. As the investigation runs, the Status value is updated to indicate whether threats were found, and whether actions have been approved.
The Status values that are used in investigations are described in the following list:
Failed: At least one investigation analyzer ran into a problem where it couldn't complete properly.
If an investigation fails after remediation actions were approved, the remediation actions might still have succeeded. For more information, view the investigation details.
No Threats Found: The investigation finished and no threats were identified (compromised user accounts, email messages, URLs, or files).
If you suspect something malicious was missed (a false negative), you can take action using Threat Explorer (Explorer).
Partially Investigated (formerly known as Threats found): The automated investigation found issues, but without specific remediation actions to resolve the issues. Occurs when some type of user activity was identified, but no cleanup actions are available. Examples include any of the following user activities:
The investigation found nothing to do. For example:
No malicious URLs, files, or email messages to remediate.
No mailbox activity to fix (for example, turn off forwarding rules or delegation).
If you suspect something malicious was missed (a false negative), you can take action using Threat Explorer (Explorer).
Partially Remediated: The investigation resulted in remediation actions, and some were approved and completed. Other actions are still pending approval.
Pending Action: The investigation found a threat (for example, a malicious email, a malicious URL, or a risky mailbox setting), and an action to remediate the threat is awaiting approval.
The list of pending actions can increase as an investigation runs. View the investigation details to see if other items are still pending completion.
Queued By Throttling: An investigation is being held in a queue. When other investigations complete, queued investigations begin. Throttling helps avoid poor service performance.
Remediated: The investigation finished and all remediation actions were approved (noted as fully remediated).
Approved remediation actions can have errors that prevent the actions from being taken. Regardless of whether remediation actions are successfully completed, the investigation status doesn't change. For more information, view the investigation details.
Running: The investigation process is underway. This status value also occurs when pending actions are approved.
Starting: The investigation has been triggered and is waiting to start running.
Terminated By System: The investigation stopped. For example:
Pending actions have expired (available for a maximum of one week).
Too many actions. For example, too many users clicking on malicious URLs can exceed the investigation's ability to run all the analyzers, so the investigation halts.
If an investigation halts before actions were taken, try using Threat Explorer (Explorer) to find and address threats.
Terminated By Throttling: An investigation automatically stops after it's been queued for too long, it stops.
View investigation details from AIR in Defender for Office 365 Plan 2
When you select Open in new window in the ID column of an entry on the Investigations page at https://security.microsoft.com/airinvestigation, a new page opens with the investigation details.
The tile of the page is the Investigation (name) value on the Investigations page. For example, Clicked url Verdict changed to malicious - <URL>.
The subtitle of the page contains the ID and status of the investigation. For example, Investigation #660b79 is complete - Remediated.
The rest of the details page contains several tabs that contain detailed information about the investigation. Some tabs are common to all investigations. Other tabs are available based on the nature and status of the investigation.
The tabs are described in the following subsections.
Investigation graph tab in the investigation details
On the investigation details page, the Investigation graph tab is the default tab that visually represents the current state and results of the investigation.
On the Investigation graph tab, the Investigation summary pane contains the following details:
Investigation status time line section:
Started
Ended: This value is present only for the following Status values:
No threats found
Partially remediated
Remediated
Terminated by system
Terminated by throttling
Terminated by user
Threats found
Failed
Duration
Total pending time: This value is present only for investigations that had pending actions awaiting approval that were eventually approved or expired.
Investigation details section:
Status: The status of the investigation. If the value is No threats found, no other values are present in the section.
Alert severity: The value Low, **Medium, or High.
Category: The alert category.
Detection source: Typically, the value is MDO.
The graph pane contains a visual representation of the elements and activities in the investigation. Some elements are common to all investigations, while others depend on the nature and progress of the investigation.
Alert received: Shows the related alerts. Select
to go to the Alerts tab for more information.
Mailbox: Shows the related mailboxes. Select
to go to the Mailboxes tab for more information.
Entities analyzed: Shows the number and type of related entities that were analyzed during the investigation. For example:
URLs
Email messages
Files
Email clusters, which might include the number of malicious and the number of remediated.
Select
to go to the Entities tab for more information.
Evidence: Shows the number of entities found. Select
to go to the Evidence tab for more information.
Pending approval: Shows how long the system has been waiting for an admin to do the suggested manual remediation action (for example, soft delete an email message). Select
to go to the Pending actions tab for more information.
After an admin does the action, this item is replaced by Waited for user approval.
Waited for user approval: Shows how long it took for an admin to do the suggested manual remediation action. Select
to go to the Pending actions history tab for more information.
Result: This item is available after the investigation is finished, and is duplicated in the following locations on the page:
In the center of the graph. Select the icon to go to the Log tab.
In the page title.
In the Investigation summary pane > Investigation details section > Status value.
For example:
Remediated
Terminated by system:
No threats found
Partially investigated
Some findings might require review. Use the Evidence and Entities tabs to manually investigate and remediate any potential issues.
Partially remediated
A problem prevented the remediation of some malicious entities. Use the Evidence and Entities tabs to manually investigate and remediate any potential issues.
Alerts tab in the investigation details
On the investigation details page, the Alerts tab shows the alerts related to the investigation.
You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. The default columns are marked with an asterisk *:
Alert name*
Tags*
Severity*
Incident Name*
Incident ID*
Status*
Category*
Impacted assets
User*
Service Source*
Detection source
Investigation state*
Last activity*
Classification*
Determination
Assigned to*
Clicking on the Alert name value in a row takes you to the details page for the alert. This details page is the same as clicking on the Alert name value in the corresponding entry on the Alerts page at https://security.microsoft.com/alerts. For more information, see Analyze an alert.
Clicking anywhere else in the row other than the Alert name value or the check box next to the first column opens a details flyout for the alert. This details flyout is the same as clicking anywhere in the row other than the Alert name value or the check box next to the first column on the corresponding entry on the Alerts page at https://security.microsoft.com/alerts.
The actions that are available at the top of the alert details flyout depend on the nature of the alert contain the same actions that are available in the details flyout of the corresponding alert on the Alerts page at https://security.microsoft.com/alerts. For example, alerts named Email messages containing malicious URL removed after delivery have the following actions available in the alert details flyout:
Manage alert: Opens a Manage alert flyout where you can view and modify details about the incident. For more information, see Manage alerts.
View messages in Explorer: Opens Explorer (Threat Explorer) in the All email view filtered by the Alert ID. For more information about the All email view of Threat Explorer, see All email view in Threat Explorer.
More actions > Link alert to another incident: In the Link alert to another incident flyout that opens, configure the following options:
Select one of the following values:
Create a new incident
Link to an existing incident: In the Incident name or ID box that appears, start typing a value to find and select the existing incident.
Comment: Enter an optional comment.
When you're finished in the Link alert to another incident flyout, select Save
More actions > Ask Defender Experts. Opens an Ask Defender Experts flyout. For more information, see Collaborate with experts on demand.
Mailboxes tab in the investigation details
On the investigation details page, the Mailboxes tab is available if any mailboxes were inspected as part of the investigation.
You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Username
Risk level
Risk
Risky activities
Upn
Urn
Clicking anywhere in a row other than the check box next to the first column opens a mailbox details flyout with the following information:
On the investigation details page, the Evidence tab shows the suspicious entities that were analyzed, and the results of the analysis.
You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. The default columns are marked with an asterisk *:
First seen*
Entity*
Verdict*
Remediation status*
Status details
Impacted assets*
Detection origin*
Threats
To filter the entries, select Filter. The following filters are available in the Filter flyout that opens:
Entity: Type some or all of the entity name in the box.
Verdict: The values you can select depend on the Verdict values on the tab.
Detection origin: The values you can select depend on the Detection origin values on the tab.
When you're finished in the Filter flyout, select Apply. To clear the filters, select Clear filters.
Clicking anywhere in a row other than the check box next to the first column opens a details flyout. What's available in the flyout depends on the nature of the evidence (email message, file, URL, etc.).
Entities tab in the investigation details
On the investigation details page, the Entities tab shows details about the different types of entities that were encountered and analyzed during the investigation.
The Entities tab is organized by a view selection pane (a summary view and a view for each entity type) and a corresponding details table for that view:
Evidence summary view: This is the default view.
You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Entity type (you can't deselect this value): Contains the same values as the view selection pane, depending on the incident. For example:
Files
URLs
Email submissions
Emails
IP addresses
Email clusters
The following columns show the count for each entity type (row):
Total
Remediated
Malicious
Suspicious
Verified
No threats found
Unknown
Not found
Unremediated
Partially Remediated
Clicking anywhere in a row anywhere other than the check box next to the Entity type column takes you to the related view from the selection page (for example, Emails).
Files view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. The default columns are marked with an asterisk *:
Verdict*
Remediation status*
Status details
File path*
File name* (you can't deselect this value)
Device*
URLs view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Verdict
Remediation status
Address (you can't deselect this value)
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
Original URL
Detection section
Domain details section
Registrant contact info section
URL prevalence (last 30 days) section
The following actions for the URL are also available in the flyout:
Open URL page
Submit for analysis
Manage indicator
View in Explorer
Go hunt
Email submissions view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Verdict
Remediation status
Subject
Sender
Recipient
Reported by
Report type
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
Email submission details section
The Go hunt action for the email submission is also available in the flyout.
Emails view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Verdict
Remediation status
Email Received Date (you can't deselect this value)
Delivery Status
Subject
Sender
Recipient
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
Email details section
Select More details about email to view the Email entity page in Defender for XDR.
The following actions for the email message are also available in the flyout:
Go hunt
Open in Explorer
IP addresses view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Verdict
Remediation status
Address (you can't deselect this value)
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
IP details section
Detection section
IP observed in organization devices section
The following actions for the IP addresses are also available in the flyout:
Open IP address page
Add indicator
Open cloud app IP settings
Investigate in Activity log
Go hunt
Email Clusters view: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Verdict
Remediation status
Mail cluster name (you can't deselect this value)
Threats
Email count
Malware
Phish
High confidence phish
Spam
Delivered
Junked
Replaced
Blocked
Mailbox
Not in mailbox
On-prem/External
Volume anomaly
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
Email cluster details section
Threats section
Latest delivery locations section
Original delivery locations section
The following actions for the email cluster are also available in the flyout:
Go hunt
Open in Explorer
Log tab in the investigation details
On the investigation details page, the Log tab shows all actions that were taken during the investigation.
You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. The default columns are marked with an asterisk *:
ID
Action type
Action*
Status*
Device name*
Description*
Comments
Time created
Execution start time*
Duration*
Pending duration
Queued Duration
Use Export to save the visible information to a CSV file. The default filename is AirLogs.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, AirLogs (1).csv).
Clicking anywhere in a row other than the check box next to the first column opens a summary flyout that contains the following information:
Status
Create
Execution start
Duration
Description
Tip
To see details about other entries without leaving the details flyout, use Previous item and Next item at the top of the flyout.
Pending approval tab in the investigation details
On the investigation details page, the Pending approval tab shows pending actions that are waiting for approval to complete (for example, soft deleting messages).
The Pending approval tab is organized by a view selection pane (a view for each action type) and a corresponding details table for that view:
Soft delete emails: You can sort the entries in the details table by clicking on an available column header. Select Customize columns to change the columns that are shown. The default columns are marked with an asterisk *:
Investigation ID
First seen
Details
Email count
Malware
Phish
High Confidence Phish
Spam
Delivered
Junked
Replaced
Blocked
Mailbox
Not in mailbox
On-prem/External
Mailbox
Entity type
Threat type
Subject
Use Export to save the visible information to a CSV file. The default filename is AirActions.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, AirActions (1).csv).
Clicking anywhere in a row other than the check box next to the first column opens a details flyout that contains the following information:
Email cluster details section
Verdict
Remediation status
Email count
Name
Volume anomaly
Query time
Threats section:
Threats: Summarizes the threats found in the email cluster. For example, MaliciousUrl, HighConfPhish, Volume anomaly.
Counts for the following threat types found in the email cluster:
Malware
Phish
High Confidence Phish
Spam
Latest delivery location section: Counts for the following delivery locations for messages in the email cluster:
Mailbox
Not in mailbox
On-prem/External
Original delivery locations section: Counts for the following original delivery locations for messages in the email cluster:
Delivered
Junked
Replaced
Blocked
The following actions for the email messages are also available in the flyout:
Go hunt
Open in Explorer
Approve and Reject are described in the next subsection.
Approve actions on the Pending approval tab in the investigation details
On the Pending approval tab on the investigation details page, select a pending action by clicking anywhere in the row other than the check box next to the first column.
The details flyout that opens is named after the pending action (for example, Soft delete emails). Read the information in the flyout, and then select one of the following values:
Approve.
Reject.
Tip
Approving and/or rejecting all actions in the investigation fully closes it (the Status value becomes Remediated). Failing to approve and/or reject all actions in the investigation doesn't fully close it (the Status value remains Partially Remediated).
You don't need to approve every action. If you don't agree with the recommended action or your organization doesn't choose certain types of actions, you can reject the action or take no action.
Pending actions history tab in the investigation details
On the investigation details page, the Pending actions history tab shows pending actions that were completed.
You can sort the entries by clicking on an available column header. Select Customize columns to change the columns that are shown. By default, all available columns are selected:
Action type
Wait time
Entity
Status
Handled by
Time
Use Export to save the visible information to a CSV file. The default filename is AirActions.csv, and the default location is the local Downloads folder. If an exported report already exists in that location, the filename is incremented (for example, AirActions (1).csv).
Clicking on the Entity value in a row opens a details flyout with the following information about the email cluster:
Email cluster details section
Threats section
Latest delivery locations section
Original delivery locations section
The following actions for the email cluster are also available in the flyout:
Go hunt
Open in Explorer
Clicking anywhere in a row other than the check box next to the first column or the Entity value opens an action history details flyout that contains the following information:
Summary section:
Status
Create
Execution start
Description
View details about an alert related to an investigation
How to steps to analyze and approve AIR actions directly from the Action Center. When alerts are triggered, Automated Investigation and Response (AIR) determines the scope of impact of a threat in your organization and provided recommended remediation actions.
Admins can learn about the automatic feedback response feature that sends the results of automated investigation and response (AIR) to user reported phishing messages.