Question: 1/50
You are investigating a suspected phishing incident in Microsoft 365 Defender. You want to identify all recipients of the suspicious email and see the delivery actions (delivered, blocked, quarantined). Which feature should you use?
Threat Explorer (Explorer) in Microsoft Defender for Office 365
Microsoft Sentinel Workbooks
Defender for Cloud regulatory compliance dashboard
Microsoft Purview eDiscovery (Standard) search