Peristiwa
17 Mac, 9 PTG - 21 Mac, 10 PG
Sertai siri perjumpaan untuk membina penyelesaian AI berskala berdasarkan kes penggunaan dunia sebenar dengan rakan pembangun dan pakar.
Daftar sekarangPelayar ini tidak lagi disokong.
Naik taraf kepada Microsoft Edge untuk memanfaatkan ciri, kemas kini keselamatan dan sokongan teknikal yang terkini.
Office 365 attached emails information.
Attribute | Value |
---|---|
Resource types | - |
Categories | Security |
Solutions | SecurityInsights |
Basic log | No |
Ingestion-time transformation | Yes |
Sample Queries | Yes |
Column | Type | Description |
---|---|---|
_BilledSize | real | The record size in bytes |
DetectionMethods | string | Sender email address in the from header, which is visible to email recipients on their email clients. |
FileName | string | Name of the file that the recorded action was applied to. |
FileSize | long | Size of the file in bytes. |
FileType | string | File extension type. |
_IsBillable | string | Specifies whether ingesting the data is billable. When _IsBillable is false ingestion isn't billed to your Azure account |
NetworkMessageId | string | Unique identifier for the email, generated by Office 365. |
RecipientEmailAddress | string | Email address of the recipient, or email address of the recipient after distribution list expansion. |
RecipientObjectId | string | Email recipient unique identifier in Azure AD. |
ReportId | string | Unique identifier for the event. |
SenderDisplayName | string | Sender email address in the from header, which is visible to email recipients on their email clients. |
SenderFromAddress | string | Sender domain in the from header, which is visible to email recipients on their email clients. |
SenderObjectId | string | Sender email address in the from header, which is visible to email recipients on their email clients. |
SHA256 | string | SHA-256 of the file that the recorded action was applied to. |
SourceSystem | string | The type of agent the event was collected by. For example, OpsManager for Windows agent, either direct connect or Operations Manager, Linux for all Linux agents, or Azure for Azure Diagnostics |
TenantId | string | The Log Analytics workspace ID |
ThreatNames | string | Sender email address in the from header, which is visible to email recipients on their email clients. |
ThreatTypes | string | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats. |
TimeGenerated | datetime | Date and time (UTC) when the record was generated. |
Type | string | The name of the table |
Peristiwa
17 Mac, 9 PTG - 21 Mac, 10 PG
Sertai siri perjumpaan untuk membina penyelesaian AI berskala berdasarkan kes penggunaan dunia sebenar dengan rakan pembangun dan pakar.
Daftar sekarangLatihan
Modul
Enhance your email protection using Microsoft Defender for Office 365 - Training
This module examines how Microsoft Defender for Office 365 extends EOP protection through various tools, including Safe Attachments, Safe Links, spoofed intelligence, spam filtering policies, and the Tenant Allow/Block List.