M365 Suspect eDiscovery Usage

M365 Suspect eDiscovery Usage

Detection overview

M365 Suspect eDiscovery Usage

Possible root causes

Malicious Detection

Benign Detection

M365 Suspect eDiscovery Usage

Example scenarios

M365 Suspect eDiscovery Usage

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

M365 Suspect eDiscovery Usage

Steps to investigate

M365 Suspect eDiscovery Usage

MITRE ATT&CK techniques covered

No items found.
M365 Suspect eDiscovery Usage

Related detections

No items found.

FAQs