Find and investigate malicious email that was delivered in Office 365

Office 365 Advanced Threat Protection enables you to investigate activities that put your users at risk and take action to protect your organization. For example, if you are part of your organization's security team, you can find and investigate suspicious email messages that were delivered to your users. You can do this by using Threat Explorer (or real-time detections).

Before you begin...

Make sure that the following requirements are met:

Dealing with suspicious emails

Malicious attackers may be sending mail to your users to try and phish their credentials and gain access to your corporate secrets! To prevent this, you should use the threat protection services in Office 365, including Exchange Online Protection and Advanced Threat Protection. However, there are times when an attacker could send mail to your users containing a URL and only later on make that URL point to malicious content (malware, etc.).

Alternately, you may realize too late that a user in your organization has been compromised, and while that user was compromised, an attacker used that account to send email to other users in your company. As part of cleaning up both of these scenarios, you may want to remove email messages from user inboxes. In situations like these, you can leverage Threat Explorer (or real-time detections) to find and remove those email messages!

Where re-routed emails are located after actions are taken

So where do problem emails go, and what tools help investigators understand what happened to them? Threat Explorer fields report information that will help Admins decode problem email events.

View the email headers and download the email body

Email header preview, and download of the email body are helpful email threat management features available in Threat Explorer. Admins will be able to analyse and download headers and emails for threats. Access to use this feature is controlled by roles-based access control (RBAC), to reduce the risk of exposure of user email contents.

A new role, called 'Preview' must be added into another Office 365 role group (for example into sec operations, or sec admin) to grant the ability to download mails and preview headers in all-emails view.

To see the flyout with your email download and email header preview options:

  1. Go to and sign in using your work or school account for Office 365. This takes you to the Security & Compliance Center.

  2. In the left navigation, choose Threat management > Explorer.

  3. Click on a subject in the Threat Explorer table.

This will open the flyout, where both header preview and email download links are positioned.


Use both the tables that follow together. One tells you the RBAC required, the other, the location where rights should be granted.

Activity RBAC rolegroup with access 'Preview' role needed?
Use Threat Explorer (and real-time detections) to analyze threats ​ Office 365 Global Administrator,
Security Administrator,
Security Reader
Use Threat Explorer (and real-time detections) to view headers for emails ​as well as preview and download quarantined emails Office 365 Global Administrator,
Security Administrator,
Security Reader
Use Threat Explorer to view headers and download emails delivered to mailboxes Office 365 Global Administrator, 
Security Administrator,
Security Reader,

RBAC rolegroup Where users are assigned to them
Global Admin Office 365 Admin Center
Security Admin Security & Compliance Center
Security Reader Security & Compliance Center
Security & Compliance Center


Remember, 'Preview' is a role and not a rolegroup and that role must be added to a Rolegroup afterwards.

Threat Explorer flyout with download and preview links on the page.

Check the delivery action and location

Threat Explorer real-time detections has added the Delivery Action and Delivery Location fields in the place of Delivery Status. This results in a more complete picture of where your emails land. Part of the goal of this change is to make hunting easier for Security Ops people, but the net result is knowing the location of problem emails at a glance.

Delivery Status is now broken out into two columns:

  • Delivery action - What is the status of this email?
  • Delivery location - Where was this email routed as a result?

Delivery action is the action taken on an email due to existing policies or detections. Here are the possible actions an email can take:

  • Delivered – email was delivered to inbox or folder of a user and the user can directly access it.
  • Junked – email was sent to either user’s junk folder or deleted folder, and the user has access to emails in their Junk or Deleted folder.
  • Blocked – any emails that's quarantined, that failed, or was dropped. This is completely inaccessible by the user!
  • Replaced – any email where malicious attachments are replaced by .txt files that state the attachment was malicious.

Delivery location shows the results of policies and detections that run post-delivery. It's linked to a Delivery Action. This field was added to give insight into the action taken when a problem mail is found. Here are the possible values of delivery location:

  • Inbox or folder – The email is in inbox or a folder (according to your email rules).
  • On-prem or external – The mailbox doesn’t exist on cloud but is on -premises.
  • Junk folder – The email in in the Junk folder of a user.
  • Deleted items folder – The email in the Deleted items folder of a user.
  • Quarantine – The email in quarantine, and is not in a user’s mailbox.
  • Failed – The email failed to reach the mailbox.
  • Dropped – The email gets lost somewhere in the Mailflow.

View the timeline of your email

Email Timeline another field in Threat Explorer will also ake hunting easier for admins. Instead of spending valuable time checking where the email might have gone, when, while investigating an event, when multiple events happen at, or close to, the same time on an email, those events will show up in a timeline view. Some events that happen post-delivery to your mail will be captured in the 'Special action' column. Combining information from the timeline of the mail with the special action taken on the mail post-delivery gives admins insight into policies and threat handling (such as where the mail was routed, and, in some cases, what the final assessment was).

Find and delete suspicious email that was delivered


Threat Explorer (sometimes called Explorer), is a powerful report that can serve multiple purposes, such as finding and deleting messages, identifying the IP address of a malicious email sender, or starting an incident for further investigation. The following procedure focuses on using Explorer to find and delete malicious email from recipients mailboxes.

To see the changes to the former Delivery Status field (now Delivery Action and Delivery Location):

  1. Go to and sign in using your work or school account for Office 365. This takes you to the Security & Compliance Center.

  2. In the left navigation, choose Threat management > Explorer.

Threat Explorer with Delivery Action and Delivery Location fields.

You may notice the new 'Special actions' column in this graphic. This feature is aimed at telling admins the outcome of processing an email. Special actions may be updated at the end of Threat Explorer's email timeline, which is a new feature aimed at making the hunting experience better for admins.

Email timeline cuts down on randomization because there is less time spent checking different locations to try to understand events that happened since the email arrived. When multiple events happen at, or close to, the same time on an email, those events will show up in a timeline view. Some events that happen post-delivery to your mail will be captured in the 'Special actions' column. Combining the information from the email timeline of that mail with the Special actions taken on the mail post-delivery will give admins insight into how their policies work, where the mail was finally routed, and, in some cases, what the final assessment was. The Special actions column can be accessed in the same place as Delivery action and Delivery location, but to see an email timeline:

  1. Click on the subject of the email.
  2. On the panel that appears, click Email timeline. (It will appear among other headings on the panel like 'Summary' or 'Details', et cetera.)

Once you've opened the email timeline, you should see a table that tells you the post-delivery events for that mail, or, in the case of no further events for the email, you should see a single event for the original delivery that will state a result like Blocked with a verdict like Phish. The tab also has the option to export the entire email timeline, and this will export all the details on the tab and details on the email (things like Subject, Sender, Recipient, Network, and Message ID).

  1. In the View menu, choose All email.
    Use the View menu to choose between Email and Content reports

  2. Notice the labels that appear in the report, such as Delivered, Unknown, or Delivered to junk.
    Threat Explorer showing data for all email
    (Depending on the actions that were taken on email messages for your organization, you might see additional labels, such as Blocked or Replaced.)

  3. In the report, choose Delivered to view only emails that ended up in users' inboxes.
    Clicking "Delivered to junk" removes that data from view

  4. Below the chart, review the Email list below the chart.
    Below the chart, view a list of email messages that were detected

  5. In the list, choose an item to view more details about that email message. For example, you can click the subject line to view information about the sender, recipients, attachments, and other similar email messages.
    You can view additional information about an item, including details and any attachments

  6. After viewing information about email messages, select one or more items in the list to activate + Actions.

  7. Use the + Actions list to apply an action, such as Move to deleted items. This will delete the selected messages from the recipients' mailboxes.
    When you select one or more email messages, you can choose from several available actions

Office 365 Advanced Threat Protection Plan 2

Protect against threats in Office 365

View reports for Office 365 Advanced Threat Protection