Using Office 365 Threat Explorer and threat trackers
In this section, we will examine how Threat Explorer and threat trackers can be used by Microsoft 365 administrators to review and interpret threats that may be targeting their environment. First, we will look at Threat Explorer.
Using Threat Explorer
Threat Explorer provides Microsoft 365 administrators with detailed information on threats detected within their environment, including malware and phishing. You can access Threat Explorer from the Security & Compliance Center by navigating to Threat Management | Explorer. Threat Explorer shows you a chart that is color-coded and includes attacks that have targeted your Microsoft 365 environment, as in the following screenshot:
Directly beneath the chart, you will see three tabs, where you can view the top malware families, a list of emails with malware that has been received, and a map that shows the...