{"id":40078,"date":"2019-12-10T13:19:35","date_gmt":"2019-12-10T13:19:35","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=285ba85402e8f8ff78affa0deb1db49b"},"modified":"2019-12-10T13:19:35","modified_gmt":"2019-12-10T13:19:35","slug":"microsoft-launches-office-365-phishing-campaign-tracker","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/microsoft-launches-office-365-phishing-campaign-tracker\/","title":{"rendered":"Microsoft launches Office 365 phishing campaign tracker"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet-0\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">10 Dec, 2019<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Microsoft has devised a phishing campaign dashboard for its <a href=\"https:\/\/www.itpro.co.uk\/desktop-software\/19337\/office-365-review\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/desktop-software\/19337\/office-365-review\">Office 365 <\/a>Advanced Threat Protection (ATP) module to give customers a broader overview of phishing threats beyond just individual attacks.<\/p>\n<p>The <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Introducing-campaign-views-in-Office-365-Advanced-Threat\/ba-p\/1054954\"  data-cke-saved-href=\"https:\/\/techcommunity.microsoft.com\/t5\/Security-Privacy-and-Compliance\/Introducing-campaign-views-in-Office-365-Advanced-Threat\/ba-p\/1054954\">newly-announced \u2018campaign views\u2019 tool<\/a> provides additional context and visibility around phishing campaigns. This aims to give businesses under constant threat from <a href=\"https:\/\/www.itpro.co.uk\/security\/29093\/what-is-phishing\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/29093\/what-is-phishing\">phishing attempts<\/a> a fuller story of how attackers came to target an organisation, and how well attempts were resisted.\u00a0<\/p>\n<p>Security teams with access to the dashboard can see summary details about a broader campaign, including when it started, any activity patterns and a timeline, as well as how far-reaching the campaign was and how many victims it claimed.\u00a0<\/p>\n<p>The \u2018Campaign views\u2019 tool also provides a list of IP addresses and senders used to orchestrate the attack, as well as the URLs manifested in the attack. Moreover, security staff will be able to assess which messages were blocked, delivered to junk or quarantine, or allowed into an inbox.<\/p>\n<p>\u201cIt\u2019s no secret that most cyberattacks are initiated over an email. But it\u2019s not just one email &#8211;\u00a0it\u2019s typically a swarm of email designed to maximize the impact of the attack,\u201d said Microsoft group program manager with Office 365 security Girish Chander.\u00a0<\/p>\n<p>\u201cThe common pattern or template across these waves of email defines their attack \u2018campaign\u2019, and attackers are getting better and better at morphing attacks quickly to evade detection and prevention.\u00a0<\/p>\n<p>\u201cBeing able to spot the forest for the trees &#8211; or in this case the entire email campaign over individual messages &#8211; is critical to ensuring comprehensive protection for the organization and users as it allows security teams to spot weaknesses in defenses quicker, identify vulnerable users and take remediation steps faster, and harvest attacker intelligence to track and thwart future attacks.\u201d<\/p>\n<p>Office 365\u2019s ATP tool is an email filtration system that safeguards an organisation against malicious threats posed by email messages, links and any collaboration tools.\u00a0<\/p>\n<p>With the additional information at hand, Microsoft is hoping that security teams within organisations can more effectively help compromised users, and improve the overall security setup by eliminating any configuration flaws.\u00a0<\/p>\n<p>Related campaigns to those targeting the organisation can also be investigated, and the teams can help hunt down threats that use the same indicators of compromise.<\/p>\n<p>The \u2018campaign views\u2019 dashboards are available to customers with a suite\u00a0of Office 365 plans including ATP Plan 2, Office 365 E5, Microsoft 365 E5 Security, and Microsoft 365 E5.<\/p>\n<p>These new features have started rollout out into public preview, with Microsoft suggesting the features are expected to be available more generally over the next few days and weeks. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        10 Dec, 2019    <\/p>\n<p>      Microsoft has devised a phishing campaign dashboard for its Office 365 Advanced Threat Protection (ATP) module to give customers a broader overview of phishing threats beyond just individ&#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-40078","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=40078"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40078\/revisions"}],"predecessor-version":[{"id":40079,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/40078\/revisions\/40079"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=40078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=40078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=40078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}