Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections

Posted on June 11, 2025June 11, 2025 By CWS

Microsoft has introduced the introduction of two highly effective new knowledge tables to its Defender XDR superior searching capabilities, marking a major enhancement to the platform’s risk detection and investigation capabilities.

The CampaignInfo and FileMaliciousContentInfo tables will present safety operations heart (SOC) groups with deeper visibility into email-based threats and malicious file actions throughout Microsoft 365 environments.

New Superior Looking Tables

CampaignInfo Desk Strengthens Electronic mail Marketing campaign Detection

The CampaignInfo desk represents a serious development in e-mail safety monitoring, containing complete details about e-mail campaigns recognized by Microsoft Defender for Workplace 365.

This desk will combine seamlessly into the present Electronic mail & collaboration schema throughout the superior searching framework, offering safety groups with detailed insights into coordinated e-mail assault campaigns.

The brand new desk will allow SOC analysts to analyze threats extra successfully by offering campaign-specific knowledge, together with distinctive marketing campaign identifiers, marketing campaign names, sorts, and related community message IDs.

Safety groups will be capable of correlate e-mail occasions with marketing campaign knowledge to grasp the scope and impression of coordinated assaults concentrating on their organizations.

FileMaliciousContentInfo Desk Addresses Cloud File Threats

The FileMaliciousContentInfo desk focuses on malicious file detection throughout Microsoft’s cloud collaboration platforms, together with SharePoint On-line, OneDrive, and Microsoft Groups.

This addition addresses the rising want for complete file-based risk monitoring in hybrid work environments the place cloud file sharing has turn out to be important.

This desk will assist safety groups examine file-based threats by offering detailed details about information recognized as malicious by Defender for Workplace 365 throughout the Microsoft 365 ecosystem.

The improved visibility will allow quicker response instances and extra complete risk investigations when coping with malicious content material in cloud storage and collaboration platforms.

Microsoft has outlined a phased rollout schedule for these new capabilities. The Public Preview section will start in early June 2025, with completion anticipated by late June 2025.

Following the preview interval, Common Availability is deliberate for early July 2025, with worldwide deployment anticipated to be accomplished by late July 2025.

The rollout will embrace all Microsoft cloud environments, encompassing Worldwide, Authorities Neighborhood Cloud (GCC), GCC Excessive, and Division of Protection (DoD) deployments.

These new tables will likely be accessible by default, requiring no administrative motion for implementation. SOC groups will instantly achieve entry to enhanced risk searching capabilities by means of the acquainted superior searching interface.

The addition helps Microsoft’s broader technique of offering complete risk visibility throughout the Microsoft 365 safety ecosystem.

Superior searching serves as a essential element of recent risk detection, permitting safety groups to proactively examine as much as 30 days of uncooked knowledge to find risk indicators and entities.

The brand new tables develop this functionality particularly for e-mail marketing campaign evaluation and cloud file risk investigation.

These enhancements reinforce Microsoft Defender XDR‘s place as a complete risk searching platform, becoming a member of current tables that cowl endpoint, identification, and cloud utility safety occasions.

The combination ensures safety groups can preserve a unified method to risk investigation throughout all Microsoft 365 workloads.

Reside Credential Theft Assault Unmask & On the spot Protection – Free Webinar

Cyber Security News Tags:Advanced, Cloud, Defender, Email, Hunting, Microsoft, Protections, Tables, XDR

Post navigation

Previous Post: 5 Lessons from River Island
Next Post: SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Related Posts

First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption Cyber Security News
ChatGPT Vulnerability Lets Attackers Embed Malicious SVGs & Images in Shared Chats Cyber Security News
Building a Cyber Incident Response Plan That Works Cyber Security News
SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are Cyber Security News
North Korean Hackers Weaponized 67 Malicious npm Packages to Deliver XORIndex Malware Cyber Security News
HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems
  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • FBI Shares IoCs for Recent Salesforce Intrusion Campaigns
  • LangChainGo Vulnerability Let Attackers Access Sensitive Files
  • Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mustang Panda With SnakeDisk USB Worm and Toneshell Backdoor Seeking to Penetrate Air-Gap Systems
  • 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now
  • FBI Shares IoCs for Recent Salesforce Intrusion Campaigns
  • LangChainGo Vulnerability Let Attackers Access Sensitive Files
  • Google Launched Behind-the-Scenes Campaign Against California Privacy Legislation; It Passed Anyway

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News