Taking action in Microsoft 365 Threat Explorer

In my last post, I outlined how you can identify malicious items in Microsoft 36 Threat Explorer. In today’s post, we’ll take a look at the possible actions you can take once you have found suspicious emails.

You can read the post here.