Solution Architect – Microsoft Security

Derrick Ferrell

March 2, 2026

Hello everyone! I wanted to discuss how email protection operates within the Microsoft Defender XDR. I wanted to share how Defender for Office 365 processes email, how the Zero-Hour Auto Purge helps protect against Business Email compromise (BEC). So, sit back, grab a snack, and join me on this adventure!

This article will showcase some of the powerful features working behind the scenes to keep your organization protected. Before we move into the flow, I do want to call out there ARE differences between Defender for Office 365 Plan 1 and Plan 2. I have a quick reference below to show you a breakdown of feature and function availability.

Defender for Office 365 P1

  • Anti-phishing protection and impersonation detection
  • Anti-spam and anti-malware filtering
  • Safe Links (time-of-click URL protection)
  • Safe Attachments (sandbox analysis of files)
  • Zero-Hour Auto Purge (ZAP) post-delivery remediation
  • Preset security policies (Standard and Strict)
  • Basic investigation visibility through Threat Explorer
  • Real-time threat intelligence protection

Defender for Office 365 P2

  • Anti-phishing protection and impersonation detection
  • Anti-spam and anti-malware filtering
  • Safe Links (time-of-click URL protection)
  • Safe Attachments (sandbox analysis of files)
  • Zero-Hour Auto Purge (ZAP) post-delivery remediation
  • Preset security policies (Standard and Strict)
  • Basic investigation visibility through Threat Explorer
  • Real-time threat intelligence protection
  • Automated Investigation and Response (AIR)
  • Advanced Threat Explorer investigation tools
  • Advanced Hunting using KQL queries
  • Threat Analytics and campaign intelligence reporting
  • Attack Simulation Training (phishing simulations)
  • User risk awareness and training insights
  • Campaign and attacker tracking views
  • Deeper integration with Microsoft Defender XDR investigations

Defender for Office 365 has been around for bit, some of you may remember the product when it was affectionately referred to as Advanced Threat Protection (ATP). Let’s fast forward to now, Defender for Office 365, part of the Defender XDR suite!

A.I. for Mailbox Intelligence proves to be invaluable here due to the constant Microsoft Intelligence updates keeping the A.I. up to speed on Zero-day threats and known threats alike. Mailbox Intelligence learns communication patterns to identify anomalous behavior and contributes signals that can influence detection decisions and post-delivery remediation actions such as Zero-Hour Auto Purge.

Defender for Office 365 and Exchange Online do all the scanning and protection in this scenario. We will take a look at the flow in this section. While illustrated sequentially, these protections operate through parallel inspection engines that continuously reevaluate messages as intelligence evolves.

This is a summary of how the email is going flow.

Article content
Defender for Office 365/Exchange Online Protection Workflow

The email will be received by your domain via the Internet, from here the email starts to pass through filters and policies for scanning. The order of operations in which an email is scanned offers layers of filtering and protection driven by machine learning–driven detection.

Connection Filtering – Checks IP reputation, Block and Allow lists, SMTP behavior analysis, Authentication signals for sender legitimacy

Anti-Malware Scanning – Scans email via file hash matching, signature detection, Heuristic analysis, reputation, and machine learning classification

Anti-Spam – Analyzed by Sender Reputation, Message Characteristics, Authentication Checks, and Machine Learning Classification

Anti-Phishing Analysis – Anti-Phishing: Impersonation Detection, Mailbox Intelligence, Domain Analysis, URL & Content Analysis, Identity Aware Signals (XDR Integration)

Safe Links – URLs are rewritten and evaluated at time-of-click using real-time reputation and behavioral analysis to prevent access to malicious websites

Safe Attachments – An attachment is scanned using Anti-Malware engines, reputation checks and machine learning. The file is then sent to a sandbox and opened inside a virtual isolated environment. The attachment is then analyzed for behavior based on what the file does to the system. The verdict is then assigned based on that outcome. The attachment is either blocked or delivered based on the policy and verdict.

Delivery → Continuous Monitoring (ZAP) – Once an email is delivered, these emails continue to be scanned. If updated threat intelligence later classifies a delivered message as malicious, Zero-Hour Auto Purge automatically removes or quarantines the email.

Now that we know how email is flowing through Defender for Office 365, we see Defensive layers across the policies backed by Machine learning A.I. We will now take a look at how Defender for 365 integrations with Entra Identity and Zero-Hour Auto Purge help combat Business Email Compromise (BEC).

We are almost there! Let’s take a look at how Defender for Office 365 handles Business Email Compromise with Defensive layering.

Business Email Compromise (BEC) attacks succeed by abusing trusted identities, not by delivering malware. Attackers either impersonate users or compromise legitimate accounts and operate within normal business communication.

Because of this, modern protection must evaluate more than the email itself — it must evaluate the risk of the identity behind the message. In a previous article, I had written about vigilance around impersonation based on how Identity theft attempts are rampant.

Defender integrates with Entra Identity Protection to provide identity risk context across the Defender XDR ecosystem.

The flow below is the typical BEC attack chain that Defender for Office 365 will disrupt using the layered defense approach.

Credential Theft – Identity Risk Signals may identify indicators of compromise, enabling automated or administrative remediation through identity protection policies.

Account Compromise – If account is compromised, user risk and sign in risk scores will rise based on the potential compromise. Within a Zero Trust model, compromise is assumed until verified otherwise.

Trusted Identity Abuse – The attacker chooses an account that garners organization trust. This is the prime target to make later movements, social engineer, and set up camp within your organization. This can also come in the form of trusted vendors or internal account takeover. This is where Entra Identity shines by detecting abnormal behavior such as impossible travel, Suspicious sign in, anonymous IP usage, etc.

Fraudulent Request (payment/data) – Mailbox Intelligence and Anti-Phishing do the heavy lifting here. This is where the attackers try to catch you off guard with urgency or expedited requests. Impersonation protection and Mailbox Intelligence detect impersonation attempts, lookalike domains, and suspicious language patterns.

Financial or data loss – A campaign against your organization can lead to financial and/or data loss. This is where Zero-Hour Auto Purge helps reduce exposure by automatically removing malicious emails once updated threat intelligence reclassifies the campaign.

Based on this attack chain, this is how Defender for Office 365 and Entra Identity protection analyze and protection against this chain.

  • Identity Risk Signals Detect Early Compromise based on a few factors – Impossible Travel Events, Anonymous or suspicious IP usage Leaked Credentials, Unusual Sign in Behavior, and Device or session anomalies. This may be familiar because other products such as Defender for Cloud apps also look at Identity and application interactions in a similar way with Anomaly detection policies.
  • Identity context changes how Defender for Office 365 analyzes the user’s email and email trust evaluation. The Anti Phishing engines become more aggressive with analysis of the user and related emails. Emails from the compromised account are no longer automatically trusted.
  • Mailbox Intelligence Detects Behavior Anomaly’s This looks internally and externally at the users in question by examining the relationship between sender and the recipient, communication frequency and interaction patterns are analyzed. This stands out and may stand out to a user; the attackers want to catch you off guard during a busy day or add urgent pressure to respond. Users must still practice caution in this area, if it is not expected then question the intent.
  • XDR Correlation Strengthens Detection confidence this is a combination of email behavior, Identity Risk (Entra), Threat Intelligence (Defender for Office 365). This mix of analysis leads to stronger and more accurate detection by feeding this information to the A.I.
  • Zero-Hour Auto Purge Enforces post-delivery protection This means that if the threat intelligence is updated and the email is now considered malicious. Defender for Office 365 updates the email verdicts and removes the email. The email is sent to quarantine for review. This will cause any attackers whose emails may have gained entry loss of persistence and access.
  • Identity Signals Reduce Attacker Dwell Time this translates to faster detection times, automated remediation and cleanup.

Even with layered protection, identity signaling, and automated remediation like Zero-Hour Auto Purge, Business Email Compromise ultimately targets one thing: Human decision-making. Attackers do not need malware when they can manipulate trust, urgency, and normal business processes. Technology can detect risk and remove threats, but people still decide whether to approve payments, share information, or trust a message. This comes down to training to impact the user decision at this stage. Modern security therefore isn’t about removing humans from the process — it’s about augmenting them. Raising awareness in your organization to keep users sharp is recommended. This is where a feature like Attack Simulation can really help (P2 only).

Email campaigns and training will allow you to guide and train users on email interaction. In the scheme of things, Users must remain aware as well as IT administrators. IT administrators will augment themselves with this tool but will still need to investigate. BEC investigations traditionally require:

  • Reviewing message headers Checking sign-in logs
  • Correlating identity risk Validating campaign scope Determining user impact

As protections become more automated, the challenge shifts from detection to understanding and response at scale.

This can take time, effort, and personnel, but you are not without scalable options. This is where Security Copilot will come into the picture. Security Copilot acceleration will help the IT Administrator investigate faster; this is key because time is always a factor in an attack.

Some of the ways Security Copilot can help: Summarizing incidents automatically Correlating identity and email signals Explaining attacker behavior Generating investigation steps Producing remediation guidance.

This really cuts down on data gathering and allows you to get to the heart of the issue quickly.

It would look a little something like this:

Identity Signals detect risk

Defender for Office 365 analyzes communication

ZAP removes malicious emails

Security Copilot explains and contextualizes events

Humans make informed decisions faster

Microsoft Security Copilot’s Phishing Triage Agent helps security teams automatically analyze user-reported phishing emails, explain verdicts, and prioritize real threats within Defender XDR. More on that another time for now, I will leave you with some reference information.

Security Copilot Phishing Triage Agent in Microsoft Defender – Microsoft Defender XDR | Microsoft Learn

As email threats continue to evolve, defending against attacks like Business Email Compromise requires more than blocking malicious messages — it requires continuously validating trust. Defender for Office 365, combined with identity signaling and Zero-Hour Auto Purge, demonstrates how modern XDR security shifts from static protection to ongoing risk evaluation across identities, communications, and behavior. Automation and AI-driven capabilities such as Security Copilot help security teams scale investigation and response, while user awareness and sound business processes remain essential safeguards. In the end, effective security is not achieved by technology alone, but by the collaboration between intelligent systems and informed people working together to reduce risk and respond with confidence.

Thank you for taking the time out of your day to read this, I appreciate you.

Comments

Leave a comment