microsoft/microsoft365 Dashboards
Email IOC detections
Widget | Description | Type |
---|---|---|
Details of IOC matches for URLs found in email.
logscale
| Table | |
Number of IOC matches by confidence threshold over time for
sending SMTP server IP address.
logscale
| Time Chart | |
Details of IOC matches for sender domains used in emails
logscale
| Table | |
Details of IOC matches for sending SMTP server IP address.
logscale
| Table | |
Number of IOC matches by confidence threshold over time for
domains of URLs found in email.
logscale
| Time Chart | |
Number of IOC matches by confidence threshold over time for sender
domains. This includes only the sender in the SMTP FROM header.
logscale
| Time Chart | |
Number of IOC matches by confidence threshold over time for URLs
found in email.
logscale
| Time Chart | |
Details of IOC matches for domains of URLs found in email.
logscale
| Table | |
Falcon LogScale includes an integration with CrowdStrike's Falcon
Intelligence to provide Falcon LogScale customers with a built-in
database of Indicators of Compromise (IOCs). Customers can search
their logs for matches against the IOC database and see relevant
threat information for each IOC found.
Find
out more. This dashboard checks a number of email
attributes against the IOC database with the
ioc:lookup() function. Click on the ⫶
button on each IOC detection to start investigating on it.
| Note |
Email forwarding rules
Widget | Description | Type |
---|---|---|
Newly created or updated Mailbox forwarding rules. The events do
not include the impacted mailbox to which forwarding has been
applied.
logscale
| Event List | |
Updated Inbox rules that forward email. Covers 'ForwardTo,
'ForwardAsAttachmentTo' and 'RedirectTo' rule types.
logscale
| Event List | |
Updated Transport rules that forward email. Covers rules for
'ModerateMessageByUser', 'RedirectMessageTo', 'AddToRecipients'
logscale
| Event List | |
Newly created Transport rules that forward email. Covers rules for
'ModerateMessageByUser', 'RedirectMessageTo' and 'AddToRecipients'
logscale
| Event List | |
Newly created Inbox rules that forward email. Covers 'ForwardTo,
'ForwardAsAttachmentTo' and 'RedirectTo' rule types.
logscale
| Event List |
Email investigation
Widget | Description | Type |
---|---|---|
Copy/paste a NetworkMessageId into the
similarly named parameter, press Apply parameters and the
recipients for the email will be shown.
logscale
| Table | |
Summary information for all emails that have a
DeliveryAction of
Blocked. Note -
ThreatType,
DetectionMethod and
Confidencelevel are not present if the email
was blocked by a rule added by customer or user (i.e. only shown
for emails blocked by Microsoft rules). To see the details of a
blocked message copy/paste a NetworkMessageId into the similarly
named parameter, press Apply parameters and the Email
summary and Email details widgets
will populate with the information for the message.
logscale
| Table | |
Summary information for all emails. NetworkMessageId is a unique
ID applied by Microsoft to each email. Emails to multiple
recipients will have the same NetworkMessageId but could have
different delivery status per recipient. The Any
delivery? column indicates Yes if
the delivery status (i.e. DeliveryAction
field) for any recipient was Delivered The
Any URL clicked? column indicates
Yes if any recipient of the message clicked
any URL contained within the email. To see the delivery status and
any URLs clicked per recipient, copy/paste a NetworkMessageId into
the similarly named parameter, press Apply parameters and the
details will be shown in the below widget Email
details.
logscale
| Table | |
Copy/paste a URL into the similarly named parameter and press
Apply parameters to see the user principle name (AccountUPN) of
the account that clicked the URL, along with the time of click.
The widget Recipients of URL will also
populate with the NetworkMessageId, URL and recipient email
address.
logscale
| Event List | |
Copy/paste a URL into the similarly named parameter and press
Apply parameters to see which recipients received an email with
that URL present. The widget Users who clicked
URL will also populate with the user principal name
(AccountUPN) name of the account that clicked the URL, along with
the time of click. Copy/paste a NetworkMessageId into the
similarly named parameter and press Apply parameters to see more
information about the email the URL came from.
logscale
| Event List | |
To see details for an email, copy/paste a
NetworkMessageId into the similarly named
parameter, and press Apply parameters. The
From row refers to the sender in the FROM
SMTP header (which is the sender users will see), and the
MailFrom row refers to that of the MAIL FROM
header (which is the address the server will use to return a
non-delivery report to if the email cannot be delivered).
logscale
| Table | |
Copy/paste a NetworkMessageId into the
similarly named parameter, press Apply parameters and any URLs in
the email will be shown here.
logscale
| Table | |
To see detailed information for an email, paste the NetworkMessageId into similarly named parameter above and press Apply parameters. | Note | |
To see detailed information for an email, type the URL into the similarly named parameter above and press Apply parameters. Currently searching for: {{parameters[URL]}} | Note |
Email overview
Widget | Description | Type |
---|---|---|
Looks at the sending SMTP servers, as well as URLs in the email
body, to find indicators of compromise (IOC). This widget only
looks at delivered emails (to supplement the info on blocked
emails above it). If you would like more details on IOC detections
in your emails in general, see the included IOC dashboard. The
indicators come from CrowdStrike.
logscale
| Time Chart | |
Top 10 email sender addresses (includes all email)
logscale
| Table | |
Emails blocked by Microsoft365 because they were determined to be
a threat.
logscale
| Time Chart | |
Volume of emails by mail flow type/direction.
logscale
| Time Chart | |
Top sender/receiver pairs for all email. Shows the unique
sender/receiver pairs of email addresses that exchange the most
number of emails (includes all emails - ‘good' and ‘bad').
logscale
| Table | |
Displays a list of blocked spam Outlook email by tenant ID.
logscale
| Single Value | |
Top 10 recipient email address (includes all email)
logscale
| Table |
Email threat summary
Widget | Description | Type |
---|---|---|
Volume of email threats, by threat type, over time
logscale
| Time Chart | |
Breakdown of threats by threat type
logscale
| Pie Chart | |
Top 50 receivers of email threats with the number of threats
received
logscale
| Table | |
Total number of email threats per day with trend line over the
selected time span
logscale
| Single Value | |
Top 10 SMTP server IP addresses that are sending email threats
identified by Microsoft
logscale
| Table | |
Top 10 senders of email threats found by Microsoft
logscale
| Table |