Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (2024)

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages

Blog / Exchange Online / Microsoft 365

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (1)

Post author:Written By Siegfried JagottPost published:January 17, 2023One comment

Table of Contents

There are various tools available in Exchange Online to investigate messages tagged as Junk-Mail and spoof messages by Microsoft Defender for Office 365 or Exchange Online Protection (EOP).

This article reviews the most important tools, namely Exchange Message Trace, Threat Explorer, Message Header Analyzer, and Advanced Hunting. I also provide some practical advice about how to use Threat Explorer to investigate malware.

Exchange Message Trace vs. Threat Explorer

Message tracking is a crucial task for any Messaging Administrator trying to understand mail flow. It shows you what client or server created an email, and the servers an email transits until it reaches its destination. In Exchange Online, you can use the Message Trace tool to track or trace a message. If you want to get more insights about message tracking through the Message Trace tool, see this article.

When it comes to Junk-Mail, more information than message tracking information is needed. Thus, Message trace is no longer the best tool of choice. You need a tool that also provides you with some insights into the scanning, such as the X-Headers of the SMTP Header. For that reason, Microsoft created Threat Explorer – a tool to investigate why EOP considers an email Junk-Mail or Spoof. To outline the main differences between the two tools, here’s an overview:

  • Exchange Message Trace allows you to have data available for message trace its route as email messages as they travel through Exchange Online. You can determine if a message was received, rejected, deferred, or delivered by the service. It also shows what actions were taken by EOP on the message before it reached its destination. Message Trace also allows you to search and trace messages, tracking data for up to 90 days. If you want to read more details, see this article.
  • Threat Explorer is a tool to help you to investigate and respond to email threats:
    • Find and investigate any malware detected by Microsoft 365.
    • Identify the threat reason and what detection technology was applied.
    • View phishing URL(s) of emails. A phishing URL is a fake website that should look like a legitimate website but wants to trick you into entering your personal information, such as passwords.
    • Start an automated investigation and response process from a view in Threat Explorer.
    • Investigate malicious email.

Threat Explorer also allows you to investigate messages for up to 30 days. For more on Threat Explorer, check out this article written by Tony Redmond.

Both Threat Explorer and Exchange message trace are in the Microsoft 365 Defender admin center. You need to be either a Global Administrator or Security Admin to use Threat Explorer, and a Security Reader to use Exchange message trace. Exchange message trace can also be directly accessed from the modern Exchange Admin Center (EAC).

Cybersecurity Risk Management for Active Directory

Discover how to prevent and recover from AD attacks through these Cybersecurity Risk Management Solutions.

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (2)

The Two flavors of Threat Explorer: Real-time detections and Threat Explorer

Life would have been that easy if there was only one Threat Explorer tool available. However, I must tell you that there are also multiple flavors of Threat explorer available: The “full-features” Threat Explorer and the Real-time detections tool.

  • Real-time detections (figure 1) allow you to view and analyze detections in real-time.
Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (3)
  • Threat Explorer provides all functionality that Real-time detections offer, but even more: You can investigate all emails, not only phish or malware-detected messages, as seen in figure 2. It also allows access to your campaigns, namely coordinated email attacks, including phishing and malware, to test your users. And you can remediate threats (including triggering an Automated Investigation and Response investigation).
Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (4)

Depending on your Microsoft Defender for Office 365 plan (MDO), you will get the tool:

  • MDO Plan 1 (included, for example, in the Business Pro or M365 E3 licenses) will give you the Real-time detections tool.
  • MDO Plan 2 (included, for example, in the M365 E5 license) will give you the Threat Explorer.

Of course, MDO Plan 1 and Plan 2 are also available for purchase separately.

Using Exchange Message Trace and Threat Explorer to investigate Junk-Mail

Let’s look at how to investigate Junk-Mail.

The first step is to identify the message to investigate. The most common method is by searching for the message as part of an Exchange Message trace, or in Threat Explorer.

When using Exchange Message trace, click on the message to see delivery information for the message. To see why a message was filtered by Junk-Mail, click View message in Explorer on the right details pane to investigate the message in Threat Explorer (Figure 3).

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (5)

This option opens Threat Explorer in the Microsoft 365 Defender admin center to examine the message and its delivery details. It will also show you a summary of the delivery details, including Threats and Detection technologies (Figure 4).

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (6)

Most of the time, the overview does not give sufficient information to discover why a check performed by EOP, such as the Spam or Malware filter tagged the message. To dig deeper, click Open email entity to explore details.

Figure 5 shows that the message was scanned and considered SPAM by the Spam Advanced filter. The policy action section shows the name of the policy that tagged the message and the action invoked by that policy, which was to move the message to quarantine.

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (7)

The Analysis tab provides you with the most interesting information about why the message was detected as malware or spam. The tab is divided into sections that provide you with the following information:

SectionsWhat you find in this sectionBest practices to look out for
Threat detection detailsLists all threats and their respective detection technology that apply to this message.Identify the primary threat. If you have more threats listed here, the primary threat defines the action. As a rule of thumb: phishing threats rate higher than spam.
Email detection detailsLists details on Overrides, Mailbox rules, Connectors, Transport Rule(s) involved, Policy (including a link), and the Policy Action. This section is the most important section as it will provide you with the most details. It shows you all Filter policies involved, and provides you with the Exchange Transport Rule(s) GUIDs of these policies. This allows you to use the Get-HostedContentFilterPolicy cmdlet to identify the policy responsible for the action.

Note: It also should show you BCL and SCL levels, but in my environments, this did not work. The workaround for SCL is to run a Message Header Analysis.

Sender-Recipient detailsLists sender details, including sending IP, domain name, and creation details.Look out for domain spoofing where the Sender domain is different to the P2 sender.
AuthenticationLists Internet Domain ownership authentication information, namely Domain-based Message Authentication (DMARC), DomainKeys identified mail (DKIM), and Sender Policy Framework (SPF).

In addition, MDO calculates the Compauth 3-digit number using the From: domain as the basis for evaluation. Technically, it includes SPF, DKIM and DMARC to determine whether the message is authenticated.

This is an important section to identify any domain spoofing, especially when DMARC, DKIM and SPF are configured restrictive thus fail the checks.

Understanding the Compauth result is also key, it can be pass, fail, softpass, or none. If it fails, you should look out for spoofing as the Sender domain might be different to the P2 sender (see Sender-Recipient details section).

Related entitiesLists an overview of attachments and links included in the message and if there are any threats found.URLs that point to a different domain than the Sender domain might indicate that it’s a malicious message.

To support your investigation, you can also use the right pane of the Threat Explorer to expose the message header in plain text. It allows you to copy the header to paste it into Microsoft Message Header Analyzer (MHA), to expose SMTP header insights such as Spam Confidence Level and other details (figure 6). MHA is an add-on web-based tool, and its main function is to interpret and display message headers in a more consumable way.

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (8)

What about Advanced Hunting?

In addition to the previously mentioned tools, you can also use Advanced hunting in Microsoft Defender for Office 365 admin center to investigate messages. Advanced hunting is probably the most advanced, expert-level tool to investigate messages. You can filter any messages, including searches of message content. Another advantage is that you can take action on your search results, so you can identify messages that were moved by EOP to the Junk-Mail folder and move these messages back to the users’ Inboxes.

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (9)

Just scratching the surface

Understanding how to identify Junk-Mail and Spoof Messages is not an easy task. In the future, I might return to the theme to dive into the details of some of the topics discussed here, like using Advanced hunting. If you want to watch my discussions and demos on Junk-Mail filtering, a recording of my Microsoft Exchange Community (MEC) session “Use Advanced Message Tracking to identify Junk Mail or Spoofing” is online. Let me know what topics you’d like to hear about by posting a comment!

The Microsoft 365 Kill Chain and Attack Path Management

An effective cybersecurity strategy requires a clear and comprehensive understanding of how attacks unfold. Read this whitepaper to get the expert insight you need to defend your organization!

Tags: Exchange Online, Exchange Online Protection

About the Author

Siegfried Jagott

About the Author

Siegfried is a Microsoft MVP for Office Apps and Services.He has great expertise in Office 365 implementations with a special focus on Security, Messaging and Identity for international customers.

Comments

  1. Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (11)

    Tony 30 Jan 2023Reply

    Awesome and informative post. Thanks for sharing.

Leave a Reply

Using Advanced Message Tracking to identify Junk-Mail and Spoof Messages (2024)

FAQs

How do you identify and delete spam and junk mails? ›

On your computer, open Gmail. In the main menu, on the left, click More. Spam. Check the box next to the email that you want to remove.

What scan emails and URLs to identify impersonation and malicious files? ›

Mimecast Technology for Addressing an Impersonation Attack

Mimecast scans all inbound, outbound and internal email to provide URL protection against malicious links, as well as attachment protection that scours attached documents for potential malware.

How is junk Mail detected? ›

Gmail spam filters are primarily based on machine learning algorithms. They use user feedback and spam complaints to improve spam detection constantly. Spam filters examine factors such as IP addresses, authentication protocols behind bulk email sender domains, and domains and subdomains themselves.

How do I check my junk Mail on Android? ›

How to find your Gmail Spam folder on the mobile app
  1. Open the Gmail app on your iPhone, iPad, or Android device.
  2. Select the icon of three lines in the top-left corner to open the main menu. ...
  3. Scroll down, if needed, and tap Spam. ...
  4. Your Spam messages will appear in that folder.
Sep 16, 2021

How to check if mail is spam or not? ›

Do a spam test
  1. Head to www.mail-tester.com and copy the email address in the white box.
  2. Go back to your mailing draft and send a test mailing to this email address.
  3. Navigate back to Mail Tester and click “Then check your score”
  4. The number you get is your score.

How to identify malicious email? ›

Most common red flags that signify a dangerous/malicious email
  1. The email doesn't address you by name. This is more important than you may think. ...
  2. Attachments are executable files. ...
  3. Hyperlinks are masked. ...
  4. The email contains requests for personal information.

What is the most common form of malicious email attachment? ›

Phishing emails are one of the most common sources of malicious attachments. These emails impersonate legitimate organizations or individuals and trick recipients into opening malicious attachments using social engineering tactics such as urgency, fear, or curiosity.

What does a malicious URL look like? ›

Hyphens and symbols are common in malicious links.

Legitimate websites don't often have hyphens or symbols in their domain names. As with the examples noted in point #1, scammers will use these elements along with known brands to try to trick you.

Does Gmail allow scripting? ›

Does Gmail Allow Scripting? Gmail does not support virus scans and scripting.

How are spam emails identified? ›

To identify spam emails, look for signs such as unfamiliar senders, generic greetings, urgent requests for personal information or payment, suspicious links or attachments, and poorly written content.

How do I check my computer for junk mail? ›

In Gmail, the junk mail folder is called Spam. If you're using a computer, you'll see the Spam folder in the left panel. If you don't see it, click More below the folder list. In the Gmail mobile app, tap the menu at the top-left to view your folders, then tap Spam.

How do I find hidden junk files on Android? ›

On Android, the Files app from Google does something similar. Open Files. At the bottom, you'll see Clean. Tap that to see a list of junk clogging up your phone — old screenshots, downloaded files and lots more.

How to check junk messages? ›

To access spam messages on an Android phone, you can follow these steps:Open the Messages app on your Android phone. Tap on the three-line hamburger menu in the top-left corner. Tap on "Spam & Blocked" from the menu options.

Is it better to block or delete spam? ›

While filtering addresses some spam emails, you should outright block spam email addresses that are persistent, dangerous, or fake. And remember to report any internet scams you come across, such as Apple ID phishing scams and other threats.

How do I stop spam emails permanently? ›

Thankfully, there are steps you can take to help prevent spam emails from ending up in your inbox:
  1. Mark as spam. ...
  2. Delete spam emails. ...
  3. Keep your email address private. ...
  4. Use a third-party spam filter. ...
  5. Change your email address. ...
  6. Unsubscribe from email lists.

Why am I suddenly getting lots of spam emails? ›

You may suddenly start receiving a lot of spam emails for several reasons. Someone may have added your email address to a mailing list, you may have clicked on a spam email (which signals to the sender that your email address is active) or someone may have sold or shared your email address to third-party marketers.

References

Top Articles
How to Watch The Proud Family: Louder and Prouder on Disney+ - TechNadu
60+ Happy Valentine’s Day Wishes 2023, Quotes, Images & WhatsApp Status For Your Beloved Partner
Craigslist Niles Ohio
Craigslist Vans
THE 10 BEST River Retreats for 2024/2025
Urinevlekken verwijderen: De meest effectieve methoden - Puurlv
Was sind ACH-Routingnummern? | Stripe
Our Facility
R/Altfeet
Koop hier ‘verloren pakketten’, een nieuwe Italiaanse zaak en dit wil je ook even weten - indebuurt Utrecht
Caliber Collision Burnsville
6001 Canadian Ct Orlando Fl
People Portal Loma Linda
10 Free Employee Handbook Templates in Word & ClickUp
Grace Caroline Deepfake
Belly Dump Trailers For Sale On Craigslist
Teenleaks Discord
Pricelinerewardsvisa Com Activate
Cambridge Assessor Database
使用 RHEL 8 时的注意事项 | Red Hat Product Documentation
Vintage Stock Edmond Ok
Scotchlas Funeral Home Obituaries
Aaa Saugus Ma Appointment
Allybearloves
Bekijk ons gevarieerde aanbod occasions in Oss.
Sullivan County Image Mate
Jail View Sumter
Kimoriiii Fansly
Buhl Park Summer Concert Series 2023 Schedule
Calvin Coolidge: Life in Brief | Miller Center
Taktube Irani
Ixlggusd
Craigslist Com Humboldt
Great Clips On Alameda
Compress PDF - quick, online, free
The Blackening Showtimes Near Regal Edwards Santa Maria & Rpx
D3 Boards
The Complete Guide To The Infamous "imskirby Incident"
The Syracuse Journal-Democrat from Syracuse, Nebraska
Www Craigslist Com Brooklyn
Columbia Ms Buy Sell Trade
B.C. lightkeepers' jobs in jeopardy as coast guard plans to automate 2 stations
Questions answered? Ducks say so in rivalry rout
Cocaine Bear Showtimes Near Cinemark Hollywood Movies 20
CrossFit 101
Sandra Sancc
Huntsville Body Rubs
6463896344
53 Atms Near Me
What Is The Gcf Of 44J5K4 And 121J2K6
Renfield Showtimes Near Regal The Loop & Rpx
Tenichtop
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 5835

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.