Query Details
# Defender for Office 365 - Authentication Details ## Query Information ### Description Use the below queries to get Authentication details from e-mail send thorugh Microsoft Defender for Office 365 #### References - [Advanced Hunting: Surfacing more email data from Microsoft Defender for Office 365](https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/advanced-hunting-surfacing-more-email-data-from-microsoft/ba-p/2678118) ### Microsoft 365 Defender Check for spoofing attempts on the domain with SPF fails ```kql EmailEvents |where Timestamp > ago (1d) and DetectionMethods contains "spoof" and SenderFromDomain has "contoso.com" | project Timestamp, AR=parse_json(AuthenticationDetails) , NetworkMessageId, EmailDirection, Subject, SenderFromAddress, SenderIPv4,ThreatTypes, DetectionMethods, ThreatNames | evaluate bag_unpack(AR) | where SPF == "fail" ```
This query is used to check for spoofing attempts on a specific domain (contoso.com) within the last day. It retrieves email events that have the "spoof" detection method and extracts authentication details. The query then filters for emails with SPF (Sender Policy Framework) authentication that has failed.

Alex Verboon
Released: November 23, 2023
Tables
Keywords
Operators