Investigating user inboxes
Some investigation tools on the market allow you to investigate activities that put people in your organization at risk and to act to protect your organization. For instance, if you are part of your organization's security team, you can find and investigate any suspicious email messages that were delivered.
Using Microsoft Threat Explorer
One of the tools for investigation is offered by Microsoft, Threat Explorer, which we introduced in the Investigation tools section.
Detailed information on user and license requirements and permissions is available at https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/investigate-malicious-email-that-was-delivered.
Threat Explorer is an influential tool that can serve multiple purposes, such as investigating and responding to suspicious emails by finding and deleting them, identifying the IP address of a malicious email sender, or starting a further investigation...