Several event types are on the "mailtrafficatpreport "Which are atp and which are eop capabilities?

%3CLINGO-SUB%20id%3D%22lingo-sub-520477%22%20slang%3D%22en-US%22%3ESeveral%20event%20types%20are%20on%20the%20%22mailtrafficatpreport%20%22Which%20are%20atp%20and%20which%20are%20eop%20capabilities%3F%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-520477%22%20slang%3D%22en-US%22%3E%3CP%3EWhich%20are%20atp%20capabilities%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhich%20are%20eop%20capabilities%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EEmail%20phish%20EventTypes%3A%3C%2FP%3E%3CUL%3E%3CLI%3E%3CP%3EAdvanced%20phish%20filter%20(Indicates%20a%20message%20caught%20by%20the%20Office%20365%20machine%20learning%20model.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EAnti-spoof%3A%20Intra-org%20(Indicates%20an%20internal%20message%20caught%20by%20anti-phish%20spoof%20protection.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EAnti-spoof%3A%20external%20domain%20(Indicates%20an%20external%20message%20caught%20by%20anti-phish%20spoof%20protection.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EDomain%20impersonation*%20(Indicates%20a%20message%20impersonating%20a%20domain%20protected%20by%20an%20anti-phish%20policy.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EUser%20impersonation*%20(Indicates%20a%20message%20impersonating%20a%20user%20protected%20by%20an%20anti-phish%20policy.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EBrand%20impersonation%20(Indicates%20a%20message%20caught%20by%20Office%20365%20phish%20filters%20as%20impersonating%20a%20known%20brand.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EGeneral%20phish%20filter%20(Indicates%20a%20message%20caught%20by%20basic%20Office%20365%20phish%20protection.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EMalicious%20URL%20reputation%20(Indicates%20a%20message%20with%20a%20known%20malicious%20URL%20caught%20by%20Office%20365%20phish%20filters.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EPhish%20ZAP%20(Indicates%20a%20phish%20or%20spam%20message%20detected%20and%20auto-purged%20after%20delivery.)%3C%2FP%3E%3C%2FLI%3E%3C%2FUL%3E%3CP%3EEmail%20malware%20EventTypes%3A%3C%2FP%3E%3CUL%3E%3CLI%3E%3CP%3EAnti-malware%20engine%20(Indicates%20a%20message%20caught%20by%20the%20Office%20365%20anti-malware%20engine.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EATP%20safe%20attachments*%20(Indicates%20a%20message%20with%20a%20malicious%20attachment%20blocked%20by%20ATP.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EATP%20safe%20links*%20(Indicates%20when%20a%20malicious%20link%20is%20blocked%20by%20ATP.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EZAP%20(Indicates%20a%20message%20with%20malware%20detected%20and%20auto-purged%20after%20delivery.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EOffice%20365%20file%20reputation%20(Indicates%20a%20message%20with%20a%20known%20malicious%20file%20blocked.)%3C%2FP%3E%3C%2FLI%3E%3CLI%3E%3CP%3EAnti-malware%20policy%20file%20type%20block%20(Indicates%20when%20the%20Common%20Attachment%20Types%20filter%20blocks%20a%20file.)%3C%2FP%3E%3C%2FLI%3E%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-520477%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECompliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Occasional Contributor

Which are atp capabilities?

 

Which are eop capabilities?

 

Email phish EventTypes:

  • Advanced phish filter (Indicates a message caught by the Office 365 machine learning model.)

  • Anti-spoof: Intra-org (Indicates an internal message caught by anti-phish spoof protection.)

  • Anti-spoof: external domain (Indicates an external message caught by anti-phish spoof protection.)

  • Domain impersonation* (Indicates a message impersonating a domain protected by an anti-phish policy.)

  • User impersonation* (Indicates a message impersonating a user protected by an anti-phish policy.)

  • Brand impersonation (Indicates a message caught by Office 365 phish filters as impersonating a known brand.)

  • General phish filter (Indicates a message caught by basic Office 365 phish protection.)

  • Malicious URL reputation (Indicates a message with a known malicious URL caught by Office 365 phish filters.)

  • Phish ZAP (Indicates a phish or spam message detected and auto-purged after delivery.)

Email malware EventTypes:

  • Anti-malware engine (Indicates a message caught by the Office 365 anti-malware engine.)

  • ATP safe attachments* (Indicates a message with a malicious attachment blocked by ATP.)

  • ATP safe links* (Indicates when a malicious link is blocked by ATP.)

  • ZAP (Indicates a message with malware detected and auto-purged after delivery.)

  • Office 365 file reputation (Indicates a message with a known malicious file blocked.)

  • Anti-malware policy file type block (Indicates when the Common Attachment Types filter blocks a file.)

0 Replies