Security

Microsoft Defender Email Security Benchmark Results

3 min read

Summary

Microsoft’s latest email security benchmark shows that Defender for Office 365 continues to handle most core threat protection, with Zero-hour Auto Purge removing an average of 70.8% of malicious emails after delivery and outperforming the secure email gateways tested on high-severity threats. The report also finds that integrated cloud email security partners add some value—mainly for marketing and bulk email filtering—helping security teams decide where layered tools meaningfully improve a Microsoft 365 email security stack.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft’s latest email security benchmark offers useful data points for security teams evaluating native protection, secure email gateways (SEGs), and integrated cloud email security (ICES) tools. For administrators responsible for Microsoft 365 security posture, the update helps clarify where layered defenses add value and where Microsoft Defender for Office 365 is doing most of the heavy lifting.

What’s new in the benchmark

Microsoft’s newest telemetry, covering recent months, reinforces several trends across email security deployments:

  • Microsoft Defender post-delivery remediation remains significant: Defender’s Zero-hour Auto Purge (ZAP) removed an average of 70.8% of malicious email post-delivery.
  • ICES solutions provide incremental benefit: When combined with Defender, ICES partners improved filtering of marketing and bulk email by an average of 13.7%.
  • Limited uplift for spam and malicious mail: The additional filtering gains from ICES tools were smaller for higher-risk email categories, averaging 0.29% for spam and 0.24% for malicious messages in the latest reporting period.
  • SEG comparison remains favorable to Defender: Microsoft says Defender missed fewer high-severity threats than the SEG products evaluated in the study.

ICES ecosystem expansion

Microsoft also used the announcement to reinforce support for its ICES partner ecosystem. The current integrated partners are:

  • Darktrace
  • KnowBe4
  • Cisco
  • VIPRE Security Group

These integrations surface partner detections directly in the Microsoft Defender portal, including areas such as Quarantine, Explorer, email entity pages, advanced hunting, and reporting. The practical goal is to support defense-in-depth without forcing SOC teams to jump between separate consoles.

Why this matters for IT and security admins

For Microsoft 365 and security administrators, the benchmark data suggests a few clear takeaways:

  • Post-delivery protection matters because threats still reach inboxes despite pre-delivery filtering.
  • Layering tools can help, but the benefit varies by message type and may be more operationally useful for reducing inbox clutter than materially improving malicious email detection.
  • Unified workflows reduce analyst friction, especially when third-party detections are visible in Defender rather than isolated in another management plane.

Admins should consider the following actions:

  1. Review your current Microsoft Defender for Office 365 configuration, including ZAP, Safe Links, Safe Attachments, and reporting.
  2. Assess whether an ICES deployment is providing measurable value beyond Defender, especially for spam, malicious mail, and user productivity.
  3. Use benchmark data during renewal or architecture reviews to validate whether existing SEG or ICES investments align with your organization’s threat profile.
  4. Monitor the Defender ICES ecosystem if your team wants partner protections without losing a single-pane-of-glass experience.

Microsoft says it will continue publishing benchmark updates regularly, giving organizations more transparency into how email protections perform at scale.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

SecurityMicrosoft Defender for Office 365email securityICESSEG

Related Posts

Security

Dirty Frag Linux Vulnerability Raises Root Risk

Microsoft has warned of active exploitation involving the newly disclosed Dirty Frag Linux local privilege escalation vulnerability, which can help attackers move from a low-privileged account to root. The issue affects kernel networking components such as esp4, esp6, and rxrpc, making it especially important for administrators to review module exposure, restrict local access, and prepare for vendor kernel patches.

Security

AI Agent RCE Flaws in Semantic Kernel Explained

Microsoft Defender researchers disclosed two fixed vulnerabilities in Semantic Kernel that could let prompt injection escalate into host-level remote code execution in AI agents. The findings matter because they show how unsafe tool parameter handling in agent frameworks can turn natural language inputs into code execution paths, raising the stakes for organizations building or securing AI-powered apps.

Security

Microsoft Entra Passkeys: 2026 Passwordless Updates

Microsoft outlined major passkey and account recovery updates across Entra ID, Windows, External ID, and Microsoft Password Manager as part of World Passkey Day. The changes matter for IT teams because they expand phishing-resistant sign-in options, improve recovery security, and continue the retirement of weaker authentication methods such as security questions.

Security

Microsoft AI SOC Report 2026: KuppingerCole Leader

Microsoft says it has been named an Overall Leader and Market Leader in KuppingerCole Analysts’ 2026 Emerging AI Security Operations Center report. The announcement highlights Microsoft’s push beyond traditional SOAR toward AI-driven, agent-assisted security operations in Sentinel and Security Copilot to help SOC teams improve speed, consistency, and scale.

Security

ClickFix macOS Campaign Delivers Infostealers

Microsoft has identified a new ClickFix-style campaign targeting macOS users with fake troubleshooting and utility instructions hosted on blogs and content platforms. Instead of downloading apps, victims are tricked into running Terminal commands that bypass typical macOS app checks and deploy infostealers such as Macsync, SHub Stealer, and AMOS.

Security

AiTM Phishing Campaign Targets Microsoft 365 Users

Microsoft has detailed a large-scale adversary-in-the-middle (AiTM) phishing campaign that used fake code-of-conduct investigations to steal authentication tokens. The attack combined polished social engineering, staged CAPTCHA pages, and a legitimate Microsoft sign-in flow, highlighting why phishing-resistant protections and stronger email defenses matter.