🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided MS-102 Domain 3
Domain 3 — Module 4 of 8 50%
19 of 28 overall

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response

MS-102 Study Guide

Domain 1: Deploy and Manage a Microsoft 365 Tenant

  • Establish and Configure Your M365 Tenant
  • Monitor Tenant Health and Network Readiness
  • Adoption Tracking and Microsoft 365 Backup
  • Manage Users, Contacts and External Identities
  • Groups, Shared Mailboxes and Licensing at Scale
  • Automate with PowerShell: Bulk User Operations
  • Roles, Role Groups and Workload Permissions
  • Delegate with Administrative Units and PIM

Domain 2: Implement and Manage Microsoft Entra Identity and Access

  • Prepare for Identity Synchronization
  • Implement Connect Sync and Cloud Sync
  • Monitor and Troubleshoot Identity Sync
  • Authentication Methods and Self-Service Password Reset
  • Password Protection and Authentication Troubleshooting
  • Entra Identity Protection and Risk Policies
  • Conditional Access and MFA Enforcement

Domain 3: Manage Security and Threats by Using Microsoft Defender XDR

  • Defender XDR: Security Posture and Threat Intelligence
  • Investigate Incidents with Advanced Hunting
  • Defender for Office 365: Threat Policies
  • Email Threats, Attack Simulation and Restricted Entities
  • Defender for Endpoint: Onboard and Protect
  • Vulnerability Management
  • Defender for Cloud Apps: Connect and Govern
  • Cloud App Discovery and Activity Monitoring

Domain 4: Manage Compliance by Using Microsoft Purview

  • Sensitive Information Types and Data Classification
  • Retention Labels and Data Lifecycle
  • Sensitivity Labels and Monitoring
  • DLP Policies Across M365 Workloads
  • Endpoint DLP and Alert Response
Domain 3: Manage Security and Threats by Using Microsoft Defender XDR Premium ⏱ ~15 min read

Email Threats, Attack Simulation and Restricted Entities

Investigate email threats with Threat Explorer, run attack simulation training to test user awareness, and manage blocked users and restricted entities.

Hunting email threats and training your humans

☕ Simple explanation

Policies catch threats automatically — but you still need to investigate what gets through, simulate attacks to test your users, and deal with accounts that get compromised.

Threat Explorer is your investigation tool — it shows every email that entered your tenant and lets you trace what happened (delivered, quarantined, blocked, clicked). When you find malicious emails that slipped past defences, you can remediate them directly — soft-delete from mailboxes, move to junk, or hard-delete permanently.

Attack simulation training lets you send fake phishing emails to your own users. Those who fall for it get assigned training modules. Over time, you measure whether click rates drop.

When a compromised account starts sending spam, Exchange blocks it automatically. You manage these blocked users through the Restricted entities page.

This module covers three interconnected capabilities in Defender for Office 365 Plan 2:

  • Threat Explorer — real-time investigation tool with email entity analysis, delivery action tracking, and manual remediation actions (soft/hard delete, move to junk). Requires Plan 2; Plan 1 gets “Real-time detections” with limited functionality.
  • Automated Investigation and Response (AIR) — triggered automatically by certain alerts or manually by admins. AIR expands investigation scope, correlates related emails, and recommends (or auto-executes) remediation actions.
  • Attack simulation training — phishing simulations with multiple payload types (credential harvest, malware attachment, URL-based), integrated training assignment for users who fail, and reporting dashboards to track improvement over time.
  • Restricted entities — users and connectors blocked from sending by the outbound spam filter. Investigation and manual unblocking is required.

Threat Explorer

Threat Explorer (at security.microsoft.com > Email and collaboration > Explorer) is the primary investigation tool for email threats. It provides a searchable, filterable view of all email entering your tenant.

Threat Explorer vs Real-time detections

Threat Explorer vs Real-time Detections
FeatureThreat Explorer (Plan 2)Real-time Detections (Plan 1)
Data retention30 days30 days
Views availableAll email, Malware, Phish, Campaigns, Content malware, URL clicksMalware, Phish, Content malware only
Remediation actionsSoft delete, hard delete, move to junk, move to inboxNo direct remediation — manual action required
Email entity pageFull entity page with headers, URLs, attachments, delivery chainLimited view
Campaign detectionGroups related malicious emails into campaigns for bulk analysisNot available
ExportExport up to 200,000 resultsExport up to 10,000 results

Investigating with Threat Explorer

Elena uses Threat Explorer daily at MedGuard Health. Her standard investigation workflow:

Step 1 — Filter by threat type. Select the “Phish” view to focus on phishing attempts.

Step 2 — Narrow the time range. Default is the last 7 days. For incident response, narrow to the specific delivery window.

Step 3 — Analyse delivery actions. Filter by:

Delivery ActionMeaning
DeliveredEmail reached the user’s mailbox (may need remediation)
JunkedMoved to Junk Email folder automatically
BlockedRejected at the perimeter — never reached the mailbox
ReplacedAttachment replaced by Safe Attachments (Dynamic Delivery)
QuarantinedHeld in quarantine — user or admin must release or delete

Step 4 — Open the email entity page. For any suspicious email, click through to see:

  • Full email headers (sender IP, authentication results, message routing)
  • URLs contained in the email (with Safe Links click data)
  • Attachments (with Safe Attachments detonation results)
  • Similar emails (other messages from the same sender or campaign)

Step 5 — Take remediation action. Select one or more emails and apply:

Remediation ActionWhat It DoesWhen to Use
Soft deleteMoves email to the Recoverable Items folder (hidden from user) — recoverable by adminsStandard remediation for phishing that reached mailboxes
Hard deletePermanently removes email — not recoverableSevere threats, malware, or when soft delete is insufficient
Move to junkMoves to Junk Email folderBorderline emails — spam/bulk that were incorrectly delivered to inbox
Move to inboxRestores a quarantined or deleted email to inboxFalse positive remediation — a legitimate email was incorrectly quarantined
💡 Exam tip: Remediation action permissions

Soft delete and move to junk can be performed by users with the Search and Purge role. Hard delete requires the same role. The default Security Administrator role does NOT include Search and Purge — it must be explicitly assigned. The exam may ask which role is needed to perform email remediation in Threat Explorer.

Automated Investigation and Response (AIR)

AIR extends investigation beyond a single email by automatically correlating related signals and recommending remediation actions.

How AIR triggers

AIR investigations start in two ways:

  1. Automatically — certain alerts trigger AIR (e.g., “A potentially malicious URL click was detected,” “Phish delivered due to an override”)
  2. Manually — an admin selects emails in Threat Explorer and chooses “Trigger investigation”

What AIR does

  1. Expands scope — finds other emails from the same sender, with the same URLs, or matching the same campaign
  2. Correlates signals — checks if users who received the email also showed risky sign-in activity or ran suspicious processes on their endpoints
  3. Recommends actions — proposes remediation (soft-delete all related emails, block the sender, remove forwarding rules set by the attacker)
  4. Executes or awaits approval — depending on your automation level:
Automation LevelBehaviour
Full automationAIR executes all recommended actions automatically
Semi-automationAIR executes some actions (low-impact) and queues others for admin approval
No automationAll actions queued for admin approval

Elena runs MedGuard at semi-automation — email remediation runs automatically, but actions affecting user accounts or devices require her approval.

ℹ️ Deep dive: AIR investigation graph

Each AIR investigation produces an investigation graph showing:

  • Root alert — the trigger that started the investigation
  • Related entities — users, mailboxes, devices, URLs, and files connected to the threat
  • Evidence — specific artifacts collected (email headers, file hashes, process trees)
  • Recommended actions — each with a status (pending approval, completed, failed)
  • Investigation status — Running, Awaiting action (admin needs to approve), Remediated, Partially remediated, or Failed

The investigation remains in the Action center for 30 days. Admins can review all pending actions, approve or reject them, and see the full chain of evidence supporting each recommendation.

Attack simulation training

Attack simulation training lets you send simulated phishing emails to your own users to measure susceptibility and assign training to those who fall for it.

Payload types

Payload TypeWhat It SimulatesUser Action Measured
Credential harvestFake login page that captures username and passwordUser enters credentials on the fake page
Malware attachmentEmail with a harmless file that simulates a malicious attachmentUser opens the attachment
Link in attachmentEmail with an attachment containing a URLUser opens attachment and clicks the URL
Link to malwareEmail with a URL that simulates a malware downloadUser clicks the URL
Drive-by URLEmail with a URL to a page that auto-executes code (simulated)User visits the page
OAuth consent grantEmail requesting OAuth app consentUser grants consent to the fake app

Creating a simulation

Elena sets up a quarterly phishing simulation at MedGuard:

  1. Choose a technique — Credential harvest (the most realistic and common real-world attack)
  2. Select a payload — Microsoft provides a library of pre-built payloads, or Elena creates a custom one mimicking a healthcare portal login page
  3. Target users — Elena targets all clinical staff (nurses, doctors, pharmacists) and excludes the security team
  4. Configure landing page — the page users see after clicking the phishing link. It explains that this was a simulation and links to training.
  5. Assign training — users who click the link or enter credentials are automatically assigned training modules (e.g., “How to spot phishing,” “Protecting patient data”)
  6. Set schedule — launch immediately or schedule for a specific date and time
  7. Enable notifications — optional notification to users who complete training

Simulation reporting

MetricWhat It Tells You
Compromised ratePercentage of targeted users who entered credentials or performed the target action
Click ratePercentage who clicked the simulated phishing link
Report ratePercentage who reported the email as phishing using the Report Message add-in
Training completion ratePercentage of assigned users who completed the assigned training modules

Elena tracks these metrics quarterly. MedGuard’s compromised rate dropped from 22% to 8% over three simulation cycles — demonstrating the value of the program to compliance leadership.

Training campaigns

Beyond one-off simulations, you can create ongoing training campaigns that:

  • Assign training modules to all users (not just those who fail simulations)
  • Track completion status with due dates
  • Send automated reminders to users who haven’t completed training
  • Report completion rates by department, location, or user group
💡 Exam tip: Simulation licensing and roles

Attack simulation training requires Defender for Office 365 Plan 2 (or M365 E5). The Attack Simulation Administrator role is needed to create and manage simulations. The Attack Payload Author role is needed to create custom payloads. These are separate from Security Administrator — the exam may test which role is needed for simulation management vs payload creation.

Restricted entities

When Exchange Online detects that a user account is sending outbound spam or phishing (typically because the account is compromised), it automatically blocks the user from sending further email.

Why users get restricted

CauseWhat Happens
Compromised account sending spamAttacker uses stolen credentials to send bulk spam. Outbound spam filter detects the anomalous sending pattern.
Compromised account sending phishingAttacker sends phishing emails to external recipients using the compromised account.
Forwarding rule to external addressAttacker creates a mailbox forwarding rule that redirects all incoming email to an external address — outbound filter may trigger on the volume.
Sending limits exceededUser exceeds Exchange Online sending limits (10,000 recipients per day for cloud mailboxes). Usually indicates compromise, occasionally legitimate mass emailing gone wrong.

Unblocking a restricted user

The restricted user appears in the Defender portal at Email and collaboration > Review > Restricted entities.

Elena’s unblocking process at MedGuard:

  1. Investigate the compromise — check sign-in logs for suspicious activity, review mailbox rules for attacker-created forwarding, check sent items for spam
  2. Remediate the compromise — force password change, revoke active sessions, remove malicious forwarding rules, re-register MFA
  3. Remove the user from Restricted entities — click the user and select “Unblock.” The user can send email again within approximately 1 hour.
  4. Monitor for recurrence — if the user is re-restricted, the compromise wasn’t fully remediated
ℹ️ Deep dive: Restricted connectors

In addition to user accounts, inbound or outbound connectors can also be restricted. If a partner connector is compromised and starts relaying spam through your tenant, Exchange Online blocks the connector. Restricted connectors appear on the same Restricted entities page. Remediation involves fixing the partner’s compromised infrastructure and then unblocking the connector.

The exam may mention connectors in the context of hybrid environments — an on-premises server with a compromised connector could trigger tenant-level sending restrictions if the volume is severe enough.

Restricted entities vs restricted tenant

ScopeWhat is BlockedResolution
Restricted userA single user account is blocked from sendingAdmin unblocks in Restricted entities after remediation
Restricted connectorA specific mail flow connector is blockedAdmin unblocks after fixing the connector configuration
Restricted tenantThe entire tenant is blocked from sending externallyCritical — Microsoft support may need to be involved. Caused by massive outbound spam from multiple accounts

Scenario: Elena responds to a phishing campaign

A wave of phishing emails targeting MedGuard’s clinical staff is detected by Defender for Office 365:

  1. Threat Explorer shows 47 emails with the same sender domain delivered to 35 unique mailboxes over the past 2 hours
  2. Elena selects all 47 emails and triggers soft delete — removing them from user mailboxes
  3. An AIR investigation auto-triggers, expanding the scope to find 12 additional related emails from a slightly different sender address
  4. AIR recommends soft-deleting the 12 additional emails and blocking the sender domain — Elena approves both actions
  5. Elena runs an advanced hunting query to check if any users clicked the URLs in the phishing emails:
    EmailUrlInfo
    | where Timestamp > ago(4h)
    | where Url has "phishing-campaign-domain"
    | join kind=inner EmailEvents on NetworkMessageId
    | where DeliveryAction == "Delivered"
    | project RecipientEmailAddress, Url, Timestamp
  6. Three users clicked the URL. Elena checks their sign-in logs and finds one account showing signs of credential compromise. She forces a password reset and session revocation.
  7. After remediation, Elena schedules an attack simulation using a similar payload to test whether clinical staff can recognise this type of phishing in the future.

Key concepts to remember

Question

What is the difference between soft delete and hard delete in Threat Explorer?

Click or press Enter to reveal answer

Answer

Soft delete moves the email to the Recoverable Items folder (hidden from the user) — it is recoverable by admins. Hard delete permanently removes the email — it is not recoverable. Use soft delete for standard phishing remediation. Use hard delete for severe threats like active malware or when regulatory requirements demand permanent removal.

Click to flip back

Question

What are the three automation levels for AIR in Defender for Office 365?

Click or press Enter to reveal answer

Answer

1) Full automation — AIR executes all recommended actions automatically. 2) Semi-automation — low-impact actions execute automatically, high-impact actions require admin approval. 3) No automation — all actions are queued for admin approval. Semi-automation is the most common choice for organisations that want speed with oversight.

Click to flip back

Question

Name three payload types available in attack simulation training.

Click or press Enter to reveal answer

Answer

1) Credential harvest — fake login page that captures username and password. 2) Malware attachment — harmless file simulating a malicious attachment. 3) Link to malware — URL simulating a malware download. Others include: link in attachment, drive-by URL, and OAuth consent grant.

Click to flip back

Question

What happens when a user is added to the Restricted entities list?

Click or press Enter to reveal answer

Answer

The user is blocked from sending outbound email. This happens automatically when the outbound spam filter detects the account is sending spam or phishing (typically due to account compromise). An admin must investigate the compromise, remediate it (password reset, remove malicious forwarding rules, revoke sessions), and then manually unblock the user in the Defender portal. Sending resumes within approximately 1 hour after unblocking.

Click to flip back

Question

Which role is required to create attack simulation training payloads vs manage simulations?

Click or press Enter to reveal answer

Answer

Attack Payload Author role is needed to create custom payloads. Attack Simulation Administrator role is needed to create and manage simulation campaigns. These are separate from Security Administrator. Both roles require Defender for Office 365 Plan 2 licensing.

Click to flip back

Knowledge check

Knowledge Check

Elena discovers through Threat Explorer that 23 phishing emails were delivered to MedGuard mailboxes. She selects all 23 and applies soft delete. An AIR investigation auto-triggers and finds 8 more related emails. What happens next with the AIR-discovered emails?

Knowledge Check

Priya wants to measure phishing awareness across GlobalReach's 20,000 users. She plans to run a credential harvest simulation targeting all employees. The IT security team should be excluded. What metric best indicates improvement over multiple simulation cycles?

Knowledge Check

A MedGuard user account is restricted from sending email. Elena investigates and finds an attacker created a forwarding rule sending all incoming email to an external Gmail address. After removing the forwarding rule, resetting the password, revoking sessions, and re-registering MFA, Elena unblocks the user. Two hours later, the user is restricted again. What did Elena most likely miss?

Knowledge Check

Marcus needs to investigate an email at Oakwood Financial using Threat Explorer, but he only has Defender for Office 365 Plan 1. What limitation will he encounter?

🎬 Video coming soon


Next up: Continue with Domain 3 — the next modules cover Defender for Endpoint and Defender for Cloud Apps to complete your threat management coverage for the MS-102 exam.

← Previous

Defender for Office 365: Threat Policies

Next →

Defender for Endpoint: Onboard and Protect

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.