Track and respond to emerging threats with campaigns in Microsoft Defender for Office 365
Campaigns can be used to track and respond to emerging threats because campaigns allow you to investigate a coordinated email attack against your organization. As new threats target your organization, Microsoft Defender for Office 365 will automatically detect and correlate malicious messages.
What you will need
- Microsoft Defender for Office 365 Plan 2 (included in E5 plans).
- Sufficient permissions (Security Reader role).
- Five to ten minutes to perform these steps.
What is a campaign in Microsoft Defender for Office 365
A campaign is a coordinated email attack against one or many organizations. Email attacks that steal credentials and company data are a large and lucrative industry. As technologies to stop attacks grow and multiply, attackers modify their methods to continue their success.
Microsoft leverages vast amounts of anti-phishing, anti-spam, and anti-malware data across the entire service to help identify campaigns. We analyze and classify the attack information according to several factors, for example:
- Attack source: The source IP addresses and sender email domains.
- Message properties: The content, style, and tone of the messages.
- Message recipients: How recipients are related, for example, recipient domains, recipient job functions (such as admins and executives), company types (such as large, small, public, and private), and industries.
- Attack payload: Malicious links, attachments, or other payloads in the messages.
A campaign might be short-lived, or could span several days, weeks, or months with active and inactive periods. A campaign might be launched against your specific organization, or your organization might be part of a larger campaign across multiple companies.
To learn more about the data available within a campaign, read Campaign Views in Microsoft Defender for Office 365.
Watch the Exploring campaign views video
Investigating a suspicious email campaign using threat reports
In the event that a campaign has targeted your organization and you'd like to learn more about the impact:
- Navigate to the campaign page.
- Select the campaign name that you would like to investigate.
- Upon the flyout opening, select Download threat report.
- Open the threat report and it will provide more information surrounding the campaign. The information in the report includes:
- Executive summary: High-level summary of the type of campaign and the number of users targeted in your organization.
- Analysis: Timeline chart of when the campaign started, the count of messages targeting your organization, and the destination and verdicts of the messages.
- Attack origin: Top sending IP addresses and domains with a count of messages that were delivered to inboxes in your organization. This allows you to investigate who is targeting your organization.
- Email template and payload: The subject line of the emails that were part of the campaign and URLs (and their frequency) present as part of the campaign.
- Recommendations: Recommendations for next steps to remediate messages.
Investigate inboxed messages that are part of a email threat campaign
- Navigate to the campaign page.
- Scroll through the list of campaigns in the Details view, below the graph.
- Select the campaign name you want to investigate. If the campaign has a click count of more than zero, that indicates that a user in your organization clicked on a URL or downloaded a file from the email.
- The campaign flyout displays more information about the campaign, the graph displays a timeline of the campaign from campaign start to end date, and the horizontal flow diagram displays the stages of the campaign from its origin, the verdict, and the current location of the messages.
- Below the flow diagram, select the URL clicks tab to display information regarding the click. Here you can see the user that clicked on a URL, if the user is tagged as a priority account user, the URL itself, and the time of click.
- If you want to learn more about the inboxed and clicked messages, select Explore messages > Inboxed messages. A new tab will open and navigate to Threat Explorer.
- In the details view of Explorer you can reference Latest delivery to determine if a message is still in the inbox or was moved into quarantine by system ZAP. To get more details about the specific message, select the message. The flyout provides extra information. Upon selecting the Open email entity page on the top left of the flyout, a new tab will open and give you further information about the message.
- If you would like to take an action and move the messages out of the inbox, you can select the message and then select Message actions > Move to junk folder. This will ensure your user doesn't continue to interact with the malicious message that could result in a potential breach.
To learn more, read, Campaign Views in Microsoft Defender for Office 365.