How to Investigate Phishing Attacks in Microsoft 365 – Admin Playbook

How to Investigate Phishing Attacks in Microsoft 365 ? Phishing attacks are the number one entry point for Microsoft 365 account compromise.

A single successful phishing email can lead to credential theft, mailbox abuse, data exfiltration, and lateral movement inside your tenant.

This admin playbook explains how to properly investigate a phishing attack in Microsoft 365, using Microsoft Defender, Exchange Online, audit logs, and PowerShell — exactly how real incidents are handled.

What Triggers a Phishing Investigation?

You should immediately start an investigation if:

  • Users report suspicious emails
  • A user clicked a phishing link
  • Credentials were entered on a fake login page
  • Multiple users received the same malicious email
  • Defender for Office 365 raised a phishing alert
  • You see unusual sign-ins after an email event

Step 1: Contain the Threat Immediately

Before deep investigation, stop further damage.

Immediate actions:

  • Block sender domain or address
  • Remove the email from all mailboxes
  • Disable compromised accounts (if credentials exposed)

Where to act:

Microsoft 365 Defender → Email & collaboration → Explorer
Phishing Attacks in Microsoft 365
Defender Portal

Step 2: Identify the Phishing Email (Message Trace)

Go to:

Exchange Admin Center → Mail flow → Message trace

Check:

  • Sender address & domain
  • Sending IP
  • Spam verdict
  • Number of recipients
  • Delivery status

This confirms how many users were impacted.

Step 3: Investigate Email Headers

Open one phishing email and analyze headers.

Look for:

  • Suspicious sender domain
  • Failed SPF / DKIM / DMARC
  • Mismatched “From” and “Return-Path”
  • Sender IP reputation
  • Check whether sender IP is blocked in how many RBL Using MX tool

📌 Header analysis often reveals spoofing or impersonation techniques.

Step 4: Use Microsoft Defender Threat Explorer

Go to:

Microsoft 365 Defender → Explorer

Filter by:

  • Threat type: Phish
  • Sender domain
  • URL or attachment hash

Check:

  • Click activity
  • Delivery actions
  • User interaction (clicked / opened) 
Phishing-attack-microsoft-365

Phishing attack

Step 5: Identify Affected Users

Determine:

  • Who received the email
  • Who clicked the link
  • Who entered credentials

If credentials were entered:


Assume account compromise

Immediate response:

  • Reset password
  • Revoke sign-in sessions
  • Enforce MFA

Step 6: Review Sign-In Logs (CRITICAL)

Go to:

Microsoft Entra ID → Monitoring & Health → Sign-in logs

Check:

  • Sign-ins after phishing timestamp
  • New IP addresses
  • Impossible travel
  • Legacy authentication usage

Step 7: Check for Mailbox Abuse

Attackers often abuse mailbox access.

Check Inbox Rules

Delete rules that:

  • Forward emails externally
  • Hide security notifications
  • Auto-delete emails

Check Mailbox Forwarding

Remove if found:

Step 8: Audit User Activity (Evidence Collection)

Go to:

Microsoft Purview → Audit

Search activities:

  • MailboxLogin
  • FileAccessed
  • Add-MailboxPermission
  • Set-InboxRule

This helps determine:

  • Data exposure
  • Lateral movement
  • Compliance impact 

Step 9: Block the Phishing Infrastructure

Add blocks:

  • Sender domain
  • Sending IP
  • URLs
  • Attachments

Where:


Defender → Email & collaboration → Policies & rules → Threat policies → Rules section → Tenant Allow/Block

This prevents repeat attacks. If you are using any third-party email security gateway then you have to blocked sender domain, IP, URL and attachment on that portal.

Step 10: Strengthen Security After the Incident

Mandatory controls:

  • Enforce MFA for all users
  • Disable legacy authentication
  • Configure anti-phishing policies
  • Enable Safe Links & Safe Attachments
  • Train users on phishing awareness

Most phishing incidents repeat if post-incident hardening is skipped.

Phishing Investigation Checklist (Quick View)

  • Identify phishing email
  • Remove email from all mailboxes
  • Identify affected users
  • Reset passwords & revoke sessions
  • Review sign-in logs
  • Remove inbox rules & forwarding
  • Audit user actions
  • Block sender & URLs
  • Strengthen security
  • Enforce MFA
  • Block users from time Travelling

Frequently Asked Questions (FAQs)

How fast should phishing be investigated?

Immediately. Delays increase risk of account takeover. 

Should users forward phishing emails?

No. Use Report Phishing or submit via admin tools.

Is deleting the email enough?

No. Always check sign-ins and mailbox rules.

Do I need Defender for Office 365?

Not mandatory, but highly recommended for enterprise security.

Pro Tip (From Real Incidents)

If phishing succeeded once:

  • The environment is already exposed
  • Attackers may return using similar tactics

Always treat phishing as tenant-wide risk, not a user mistake.

Final Thoughts

Phishing is no longer just spam — it’s a full-scale identity attack. A structured investigation approach helps you contain threats, protect users, and prevent recurrence.

This playbook reflects how real Microsoft 365 security incidents are handled.

Vishal Prajapati is a Microsoft 365 administrator and technology enthusiast with hands-on experience managing and supporting modern cloud-based environments. He works extensively with Microsoft 365 services and focuses on helping administrators understand complex concepts through clear, practical, and real-world guidance.

Leave a Comment