Skip to content

Latest commit

 

History

History
521 lines (335 loc) · 23.9 KB

view-email-security-reports.md

File metadata and controls

521 lines (335 loc) · 23.9 KB
title f1.keywords ms.author author manager ms.date audience ms.topic ms.service localization_priority search.appverid ms.assetid ms.collection description ms.custom
View email security reports in the Security & Compliance Center
NOCSH
chrisda
chrisda
dansimp
ITPro
conceptual
O365-seccomp
Normal
MET150
MOE150
3a137e28-1174-42d5-99af-f18868b43e86
M365-security-compliance
Learn how to find and use email security reports for your organization. Email security reports are available in the Security & Compliance Center.
seo-marvel-apr2020

View email security reports in the Security & Compliance Center

[!INCLUDE Microsoft 365 Defender rebranding]

A variety of reports are available in the Security & Compliance Center to help you see how email security features, such as anti-spam, anti-malware, and encryption features in Microsoft 365 are protecting your organization. If you have the necessary permissions, you can view these reports in the Security & Compliance Center by going to Reports > Dashboard. To go directly to the Reports dashboard, open https://protection.office.com/insightdashboard.

Reports dashboard in the Security & Compliance Center

Compromised users report

Note

This report is available in Microsoft 365 organizations with Exchange Online mailboxes. It's not available in standalone Exchange Online Protection (EOP) organizations.

The Compromised users report shows shows the number of user accounts that were marked as Suspicious or Restricted within the last 7 days. Accounts in either of these states are problematic or even compromised. With frequent use, you can use the report to spot spikes, and even trends, in suspicious or restricted accounts. For more information about compromised users, see Responding to a compromised email account.

Compromised users widget in the Reports dashboard

The aggregate view shows data for the last 90 days and the detail view shows data for the last 30 days.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Compromised users. To go directly to the report, open https://protection.office.com/reportv2?id=CompromisedUsers.

You can filter both the chart and the details table by clicking Filters and selecting one or more of the following values:

  • Start date and End date

  • Suspicious: The user account has sent suspicious email and is at risk of being restricted from sending email.

  • Restricted: The user account has been restricted from sending email due to highly suspicious patterns.

Report view in the Compromised users report

If you click View details table, you can see the following details:

  • Creation time
  • User ID
  • Action

To go back to the report view, click View report.

Encryption report

The Encryption report is available in EOP (subscriptions with mailboxes in Exchange Online or standalone EOP without Exchange Online mailboxes). Your organization's security team can use information in this report to identify patterns and proactively apply or adjust policies for sensitive email messages. For example:

  • If you see a high number of email messages encrypted by users, you might want to add an encryption policy to automate encryption for certain use cases. For more information, see Define mail flow rules to encrypt email messages in Microsoft 365.

  • If you have a number of encryption templates available but no one is using them, you might explore whether users need feature training.

The aggregate view allows filtering for the last 90 days, while the detail view allows filtering for 10 days.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Encryption report. To go directly to the report, open https://protection.office.com/reportv2?id=EncryptionReport.

To learn more about encryption, see Email encryption in Microsoft 365.

Report view for the Encryption report

You can use the following filters on the chart:

  • View data by: Message Encryption Report and Break down by: Encryption method: The following encryption methods are available:

    • Encryption by user
    • Encryption by policy

    If you click Filters, you can modify the chart with the following filters:

    • Start date and End date
    • Encryption method.
    • Encryption template.
  • View data by: Message Encryption Report and Break down by: Encryption template: The following encryption methods are available:

    • Do not forward
    • Encrypt only
    • OME previous
    • Custom

    If you click Filters, you can modify the chart with the following filters:

    • Start date and End date
    • Encryption method
    • Encryption template
  • View data by: Top 5 recipient domains: This view shows a pie chart with sent message counts for the top 5 recipient domains.

    If you click Filters, you can select a Start date and End date.

Details table view for the Encryption report

If you click View details table, the information that's shown depends on the chart you were looking at:

  • Break down by: Encryption method or Break down by: Encryption template: The following information is shown:

    • Date
    • Sender address
    • Encryption template
    • Encryption method
    • Recipient address
    • Subject
  • View data by: Top 5 recipient domains:

    • Date
    • Recipient domain
    • Message count

If you click Filters in a details table view, you can modify the results with the following filters:

  • Start date and End date
  • Encryption method
  • Encryption template

To go back to the report view, click View report.

Mailflow status report

The Mailflow status report contains information about malware, spam, phishing and edge blocked messages. For more details, see Mailflow status report.

Malware detections in email report

The Malware detections in email report shows information about malware detections in incoming and outgoing email messages (malware detected by Exchange Online Protection or EOP). For more information about malware protection in EOP, see Anti-malware protection in EOP.

The aggregate view filter allows for 90 days, while the details table filter only allows for 10 days.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Malware detections in email. To go directly to the report, open https://protection.office.com/reportv2?id=MalwareDetections.

Malware detections in email widget in the Reports dashboard

You can filter both the chart and the details table by clicking Filters and selecting:

  • Start date and End date
  • Inbound
  • Outbound

Report view in the Malware detection in email report

If you click View details table, you can see the following details:

  • Date
  • Sender address
  • Recipient address
  • Message ID: Available in the Message-ID header field in the message header and should be unique. An example value is <08f1e0f6806a47b4ac103961109ae6ef@server.domain> (note the angle brackets).
  • Subject
  • Filename
  • Malware name

To go back to the report view, click View report.

Sent and received email report

The Sent and received email report contains information about malware, spam, mail flow rules (also known as transport rules), and advanced malware detections after email enters the service. For more information, see Sent and received email report.

Spam detections report

The Spam detections report shows spam email messages that were blocked by EOP. Messages are counted individually, not per recipient. For example, if the same spam message was sent to 100 recipients in your organization, it counts as one message.

The aggregate view allows for 90 days filtering, while the details table allows for 10 days filtering.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Spam detections. To go directly to the report, open https://protection.office.com/reportv2?id=SpamDetections.

Spam detections widget in the Reports dashboard

For more information about anti-spam protection, see Anti-spam protection in EOP.

Report view for the Spam detections report

The following charts are available in the report view:

  • Break down by: Action: The following event types are shown:

    • Spam content filtered
    • Spam IP block
    • Spam envelope block
    • Spam DBEB filter: Directory based edge blocking (DBEB)

    When you hover over a day (data point) in the chart, you can see how many items were blocked that day, as well as how those items are categorized.

    Action view in the Spam detections report

  • Break down by:Direction: The following directions are shown:

    • Inbound
    • Outbound

    Direction view in in the Spam detections report

If you click Filters in a report view, you can modify the results with the following filters:

  • Start date and End date
  • Direction values
  • Event type values

Details table view for the Spam detections report

If you click View details table in any report view, the following information is shown:

  • Date
  • Sender address
  • Recipient address
  • Event type
  • Action
  • Subject

If you click Filters in a details table, you can modify the results with the following filters:

  • Start date and End date
  • Direction values
  • Event type values

To go back to the report view, click View report.

Spoof detections report

The Spoof detections report shows how many spoof mail messages were detected, and of those, which ones were considered "good" (spoof mail done for legitimate business reasons). For more information about spoofing, see Anti-spoofing protection in EOP.

The aggregate view of the report allows for 90 days of filtering, while the detail view only allows for ten days of filtering.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Spoof detections. To go directly to the report, open https://protection.office.com/reportv2?id=SpoofMailReport.

Spoof detections widget in the Reports dashboard

When you hover over a day (data point) in the chart, you can see how many spoof mail messages came through.

You can filter both the chart and the details table by clicking Filters and selecting one or more of the following values:

  • Start date and End date

  • Good mail

  • Caught as spam

Report view in the Spoof detections report

If you click View details table, you can see the following details:

  • Date
  • Spoofed sender
  • True sender
  • Sender IP
  • Action
  • Message count

To go back to the report view, click View report.

Threat protection status report

The Threat protection status report is available in both EOP and Office 365 ATP; however, the reports contain different data. For example, EOP customers can view information about malware detected in email, but not information about malicious files detected by ATP for SharePoint, OneDrive, or Microsoft Teams.

The report provides the count of email messages with malicious content, such as files or website addresses (URLs) that were blocked by the anti-malware engine, zero-hour auto purge (ZAP), and ATP features like Safe Links, Safe Attachments, and ATP anti-phishing. You can use this information to identify trends or determine whether organization policies need adjustment. It's important to understand that if a message is sent to five recipients we count it as five different messages and not one message.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Threat protection status. To go directly to the report, open one of the following URLs:

Threat protection status widget in the Reports dashboard

By default, the chart shows data for the past 7 days. If you click Filters, you can select a 90 day date range (trial subscriptions might be limited to 30 days). The details table view allows filtering for 30 days.

Report view for the Threat protection status report

The following views are available:

  • View data by: Overview: The following detection information is shown:

    • Email malware
    • Email phish
    • Content malware

    Overview view in the Threat protection status report

  • View data by: Content > Malware1: The following information is shown for Office 365 ATP organizations:

    • Anti-malware engine
    • File detonation

    Content malware view in the Threat protection status report

  • View data by: Message Override: The following override reason information is shown:

    • On-premises skip
    • IP Allow
    • Mail flow rule
    • Sender allow
    • Domain allow
    • ZAP not enabled
    • Junk Mail folder not enabled
    • User Safe Sender
    • User Safe Domain

    Message override view in the Threat protection status report

  • Break down by: Detection technology and View data by: Email > Phish: The following information is shown:

    • ATP-generated URL reputation1
    • Advanced phish filter
    • Anti-spoof: DMARC failure
    • Anti-spoof: Intra-org
    • Anti-spoof: external domain
    • Brand impersonation
    • Domain impersonation1
    • EOP URL reputation
    • General phish filter
    • Others
    • Phish ZAP2
    • URL detonation1
    • User impersonation1

    Detection technology view for phishing email in the Threat protection status report

  • Break down by: Detection technology and View data by: Email > Malware: The following information is shown:

    • ATP-generated file reputation1
    • Anti-malware engine1
    • Anti-malware policy file type block
    • File detonation1
    • Malicious file reputation
    • Malware ZAP2
    • Others

    Detection technology view for malware in the Threat protection status report

  • Break down by: Policy type and View data by: Email > Phish or View data by: Email > Malware: The following information is shown:

    • Anti-malware
    • Safe Attachment1
    • Anti-phish
    • Anti-spam
    • Mail flow rule (also known as a transport rule)
    • Others

    Policy type view for phishing email in the Threat protection status report

  • Break down by: Delivery status and View data by: Email > Phish or View data by: Email > Malware: The following information is shown:

    • Delivery failed
    • Dropped
    • Forwarded
    • Hosted mailbox: Custom folder
    • Hosted mailbox: Deleted items
    • Hosted mailbox: Inbox
    • Hosted mailbox: Junk
    • On-premises server: Delivered
    • Quarantine

    Delivery status view for phishing email in the Threat protection status report

1 Office 365 ATP only

2 Zero-hour auto purge (ZAP) isn't available in standalone EOP (it only works in Exchange Online mailboxes).

If you click Filters, the filters available depends on the chart you were looking at:

For Content > Malware, you can modify the report by Start date and End date, and the Detection value.

For Message Override, you can modify the report with the following filters:

  • Start date and End date
  • Override Reason
  • Tag: filter by tag to return users or groups that have had a specific tag applied. For more information about user tags, see User tags.
  • Domain

For all other views, you can modify the report with the following filters:

  • Start date and End date
  • Detection
  • Protected by: ATP or EOP
  • Tag: filter by tag to return users or groups that have had a specific tag applied. For more information about user tags, see User tags.
  • Domain

Details table view for the Threat protection status report

If you click View details table, the information that's shown depends on the chart you were looking at:

  • View data by: Content > Malware:

    • Date
    • Location
    • Directed by
    • Malware name

If you click Filters in this view, you can modify the report by Start date and End date, and the Detection value.

  • View data by: Message Override:

    • Date
    • Subject
    • Sender
    • Recipients
    • Detected by
    • Override Reason
    • Source of Compromise
    • Tags

If you click Filters in this view, you can modify the report with the following filters:

  • Start date and End date
  • Override Reason
  • Tag: filter by tag to return users or groups that have had a specific tag applied. For more information about user tags, see User tags.
  • Domain
  • Recipients (Note that this filterable property is only available in the details table view)

View data by: Overview: No View details table button is available.

  • All other charts:

    • Date
    • Subject
    • Sender
    • Recipients
    • Detected by
    • Delivery Status
    • Source of Compromise
    • Tags

If you click Filters, you can modify the report with the following filters:

  • Start date and End date
  • Detection
  • Protected by (Office 365 ATP only): ATP or EOP
  • Tag: filter by tag to return users or groups that have had a specific tag applied. For more information about user tags, see User tags.
  • Domain
  • Recipients (Note that this filterable property is only available in the details table view)

Top malware report

The Top malware report shows the various kinds of malware that was detected by anti-malware protection in EOP.

To view the report, open the Security & Compliance Center, go to Reports > Dashboard and select Top malware. To go directly to the report, open https://protection.office.com/reportv2?id=TopMalware.

Top malware widget in the Reports dashboard

When you hover over a wedge in the pie chart, you can see the name of a kind of malware and how many messages were detected as having that malware.

Top malware report view

If you click View details table, you can see the following details:

  • Top malware
  • Count

If you click Filters in the report view or details table view, you can specify a date range with Start date and End date.

URL threat protection report

The URL threat protection report is available in Office 365 Advanced Threat Protection (ATP). For more information, see URL threat protection report.

User-reported messages report

The User-reported messages report shows information about email messages that users have reported as junk, phishing attempts, or good mail by using the Report Message add-in.

Details are available for each message, including the delivery reason, such a spam policy exception or mail flow rule configured for your organization. To view details, select an item in the user-reports list, and then view the information on the Summary and Details tabs.

The User-Reported Messages report shows messages users labeled as junk, not junk, or phishing attempts.

To view this report, in the Security & Compliance Center, do one of the following:

  • Go to Threat management > Dashboard > User-reported messages.

  • Go to Threat management > Review > User-reported messages.

In the Security & Compliance Center, choose Threat management > Review > User reported messages

Important

In order for the User-reported messages report to work correctly, audit logging must be turned on for your Office 365 environment. This is typically done by someone who has the Audit Logs role assigned in Exchange Online. For more information, see Turn Microsoft 365 audit log search on or off.

What permissions are needed to view these reports?

To view and use the reports, you need to be a member of the specified role group in the Security & Compliance Center and in Exchange Online.

  • In the Security & Compliance Center, you need to be a member of one of the following role groups:

    -Organization Management -Security Administrator (you can also do this in the Azure Active Directory admin center -Security Reader

    For more information, see Permissions in the Security & Compliance Center.

  • In Exchange Online, you need to be a member of one of the following role groups:

    -Organization Management -View-only Organization Management -View-Only Recipients -Compliance Management

For more information, see Permissions in Exchange Online and Manage role groups in Exchange Online.

What if the reports aren't showing data?

If you are not seeing data in your reports, double-check that your policies are set up correctly. To learn more, see Protect against threats.

Related topics

Anti-spam and anti-malware protection in EOP

Smart reports and insights in the Security & Compliance Center

View mail flow reports in the Security & Compliance Center

View reports for Office 365 Advanced Threat Protection