Edit

Share via


Security Operations Guide for Teams protection in Microsoft Defender for Office 365

After you configure Microsoft Teams protection in Microsoft Defender for Office 365, you need to integrate Teams protection capabilities into your Security Operations (SecOps) response processes. This process is critical to ensure a high-quality, reliable approach to protect, detect, and respond to collaboration-related security threats.

Involving the SecOps team during the deployment/pilot phases ensures your organization is ready to deal with threats. Teams protection capabilities in Defender for Office 365 are natively integrated into the existing Defender for Office 365 and Defender XDR SecOps tools and work flows.

Another important step is to ensure SecOps team members have the appropriate permissions to do their tasks.

Integrate user reported Teams messages into SecOps incident response

When users report Teams messages as potentially malicious, the reported messages are sent to Microsoft and/or the reporting mailbox as defined by the user reported settings in Defender for Office 365.

The Teams message reported by user as security risk alert is automatically generated and correlated to Defender XDR Incidents.

We strongly recommend that SecOps team members start triage and investigation from the Defender XDR incidents queue in the Microsoft Defender portal or SIEM/SOAR integration.

Tip

Currently, Teams message reported by user as security risk alerts don't generate automated investigation and response (AIR) investigations.

SecOps team members can review submitted Teams message details in the following locations in the Defender portal:

SecOps team members can also use block entries in the Tenant Allow/Block List to block the following indicators of compromise:

Enable SecOps to proactively manage false negatives in Microsoft Teams

SecOps team members can use threat hunting or information from external threat intelligence feeds to proactively respond to false negative Teams messages (bad messages allowed). They can use the information to proactively block threats. For example:

Tip

As previously described, admins can't proactively submit Teams messages to Microsoft for analysis. Instead, they submit user reported Teams messages to Microsoft (converting the user submission to an admin submission).

Enable SecOps to manage false positives in Microsoft Teams

SecOps team members can triage and respond to false positive Teams messages (good messages blocked) on the Quarantine page in Defender for Office 365 at https://security.microsoft.com/quarantine.

Teams messages detected by zero-hour auto protection (ZAP) are available on the Teams messages tab. SecOps team members can take action on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.

Tip

Teams messages released from quarantine are available to senders and recipients in the original location in Teams chats and channel posts.

Enable SecOps to hunt for threats and detections in Microsoft Teams

SecOps team members can proactively hunt for potentially malicious Teams messages, URL clicks in Teams, and file detected as malicious. You can use this information to find potential threats, analyze patterns, and develop custom detections in Defender XDR to automatically generate incidents.

  • On the Explorer page (Threat Explorer) in the Defender portal at https://security.microsoft.com/threatexplorerv3:

    • Content malware tab: This tab contains files detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. You can use the available filters to hunt on detection data.
    • URL click tab: This tab contains all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams. You can use the available filters to hunt on detection data.
  • On the Advanced hunting page in the Defender portal at https://security.microsoft.com/v2/advanced-hunting. The following hunting tables are available for Teams-related threats:

    Note

    The hunting tables are currently in Preview.

    • MessageEvents: Contains raw data about every internal and external Teams message that included a URL. Sender address, Sender display name, Sender type, and more are available in this table.
    • MessagePostDeliveryEvents: Contains raw data about ZAP events on Teams messages.
    • MessageUrlInfo: Contains raw data about URLs in Teams messages.
    • UrlClickEvents: Contains raw data about every allowed or blocked URL click by users in Teams clients.

    SecOps team members can join these hunting tables with other workload tables (for example, EmailEvents or Device-related tables) to gain insight into end to end user activities.

    For example, you can use the following query to hunt for allowed clicks on URLs in Teams messages that were removed by ZAP:

    MessagePostDeliveryEvents 
    | join MessageUrlInfo on TeamsMessageId 
    | join UrlClickEvents on Url 
    | join EmailUrlInfo on Url 
    | where Workload == "Teams" and ActionType1 == "ClickAllowed" 
    | project TimeGenerated, TeamsMessageId, ActionType, RecipientDetails, LatestDeliveryLocation, Url, ActionType1
    

    Community queries in advanced hunting also offers Teams query examples.