How does Microsoft 365 detect malware in emails?
Understanding how emails are detected as malware in Microsoft 365 is crucial for admins to optimize their anti-malware policies. This ensures they can minimize risks while allowing legitimate emails to be delivered securely.
Here's an overview of some of the key malware detection technologies in Microsoft 365.
- Anti-malware Engines: These engines scan emails and detect known malware by comparing email attachments and links against a vast library of malware signatures. If an email contains a known malicious file or link, it will be flagged as malware.
- Heuristic and Behavioral Analysis: Even when an attachment or email doesn't match known malware signatures, Microsoft 365 uses heuristic analysis to detect suspicious behavior. Content heuristics can detect suspicious messages based on structure and word frequency within the body of the message using machine learning models.
- Safe Attachments: Safe Attachments in Microsoft Defender provides an additional layer of protection for email attachments by utilizing a virtual environment. Attachments are opened and analyzed for malicious behavior before reaching the recipient's inbox. This ensures that harmful content is detected, even if it passes the initial anti-malware protection scans.
- Safe Links: Safe Links in Microsoft Defender protect users from malicious URLs embedded in emails. It rewrites URLs during mail flow and performs real-time verification when users click on these links.
- Zero-hour Auto Purge (ZAP): Zero-hour Auto Purge (ZAP) in Exchange Online enhances Microsoft 365 email security by automatically detecting and removing malicious emails from user inboxes, even after delivery.