Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections

Posted on June 11, 2025June 11, 2025 By CWS

Microsoft has introduced the introduction of two highly effective new knowledge tables to its Defender XDR superior searching capabilities, marking a major enhancement to the platform’s risk detection and investigation capabilities.

The CampaignInfo and FileMaliciousContentInfo tables will present safety operations heart (SOC) groups with deeper visibility into email-based threats and malicious file actions throughout Microsoft 365 environments.

New Superior Looking Tables

CampaignInfo Desk Strengthens Electronic mail Marketing campaign Detection

The CampaignInfo desk represents a serious development in e-mail safety monitoring, containing complete details about e-mail campaigns recognized by Microsoft Defender for Workplace 365.

This desk will combine seamlessly into the present Electronic mail & collaboration schema throughout the superior searching framework, offering safety groups with detailed insights into coordinated e-mail assault campaigns.

The brand new desk will allow SOC analysts to analyze threats extra successfully by offering campaign-specific knowledge, together with distinctive marketing campaign identifiers, marketing campaign names, sorts, and related community message IDs.

Safety groups will be capable of correlate e-mail occasions with marketing campaign knowledge to grasp the scope and impression of coordinated assaults concentrating on their organizations.

FileMaliciousContentInfo Desk Addresses Cloud File Threats

The FileMaliciousContentInfo desk focuses on malicious file detection throughout Microsoft’s cloud collaboration platforms, together with SharePoint On-line, OneDrive, and Microsoft Groups.

This addition addresses the rising want for complete file-based risk monitoring in hybrid work environments the place cloud file sharing has turn out to be important.

This desk will assist safety groups examine file-based threats by offering detailed details about information recognized as malicious by Defender for Workplace 365 throughout the Microsoft 365 ecosystem.

The improved visibility will allow quicker response instances and extra complete risk investigations when coping with malicious content material in cloud storage and collaboration platforms.

Microsoft has outlined a phased rollout schedule for these new capabilities. The Public Preview section will start in early June 2025, with completion anticipated by late June 2025.

Following the preview interval, Common Availability is deliberate for early July 2025, with worldwide deployment anticipated to be accomplished by late July 2025.

The rollout will embrace all Microsoft cloud environments, encompassing Worldwide, Authorities Neighborhood Cloud (GCC), GCC Excessive, and Division of Protection (DoD) deployments.

These new tables will likely be accessible by default, requiring no administrative motion for implementation. SOC groups will instantly achieve entry to enhanced risk searching capabilities by means of the acquainted superior searching interface.

The addition helps Microsoft’s broader technique of offering complete risk visibility throughout the Microsoft 365 safety ecosystem.

Superior searching serves as a essential element of recent risk detection, permitting safety groups to proactively examine as much as 30 days of uncooked knowledge to find risk indicators and entities.

The brand new tables develop this functionality particularly for e-mail marketing campaign evaluation and cloud file risk investigation.

These enhancements reinforce Microsoft Defender XDR‘s place as a complete risk searching platform, becoming a member of current tables that cowl endpoint, identification, and cloud utility safety occasions.

The combination ensures safety groups can preserve a unified method to risk investigation throughout all Microsoft 365 workloads.

Reside Credential Theft Assault Unmask & On the spot Protection – Free Webinar

Cyber Security News Tags:Advanced, Cloud, Defender, Email, Hunting, Microsoft, Protections, Tables, XDR

Post navigation

Previous Post: 5 Lessons from River Island
Next Post: SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Related Posts

Android 16 Comes with Advanced Device-level Security Setting Protection for 3 Billion Devices Cyber Security News
Network Intrusion Detection for Emerging 2025 Cyber Threats Cyber Security News
New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
SentinelOne Global Service Outage Root Cause Revealed Cyber Security News
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Defend Against Key Reinstallation Attacks (KRACK)
  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Defend Against Key Reinstallation Attacks (KRACK)
  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News