
Hi @Swarada Jalukar
Thank you for posting your question in the Microsoft Q&A forum.
To generate sample events for Threat Intelligence in Microsoft Defender for Office 365, you can simulate detections in a controlled manner. These simulations trigger the protection mechanisms, resulting in logs that appear as Threat Intelligence records.
Note: Always conduct testing in a non-production environment or with test accounts to avoid disrupting real users.
Two primary methods to generate events: phishing simulations and malware testing. These will produce logs viewable in the Microsoft Defender portal.
- Simulate Phishing Events for AuditLogRecordType 28 Phish or 41 Safe Links Use the built-in Attack simulation training feature in the Microsoft Defender portal. This sends realistic phishing emails to targeted users, triggering detections and logging user interactions.
- Simulate Malware Events for AuditLogRecordType 28 Malware Send an email with the EICAR test file attached. EICAR is a harmless string recognized by antivirus engines as a test "virus," allowing safe testing without real malware. Defender for Office 365 will detect, quarantine, and log it.
To stimulate an attack, please follow the steps in this article:
You can check events in the Defender portal's Threat Explorer (Email & collaboration > Explorer) for real-time views of phish/malware data.
I hope this information helps.
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.