Investigating Suspicious Emails Using KQL
1. Understand the Data Sources
2. Identify Suspicious Emails
EmailEvents
| where ThreatTypes has "Malware" or ThreatTypes has "Phish"
| project Timestamp, SenderFromAddress, RecipientEmailAddress, Subject, ThreatTypes, AttachmentCount, UrlCount, EmailAction, ThreatNames
| sort by Timestamp descExample Query: Find Emails from Suspicious Senders
3. Correlate with Threat Intelligence
4. Investigate Clicked Links
5. Analyse Endpoint Activity
6. Review Security Alerts
7. Visualise and Summarise Findings
8. Automate Investigation
Key Tips
Last updated