← Back to SOC feed Coverage →

Teams Phish ZAP

kql MEDIUM Azure-Sentinel
T1566
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-12T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use ZAPed Teams messages to deliver phishing content, leveraging the trust of legitimate communication channels. SOC teams should proactively hunt for this behavior to identify and mitigate potential phishing campaigns before they lead to credential compromise or data exfiltration.

KQL Query

//Zero-hour auto purge (ZAP) took action on Teams messages containing Phish after delivery
MessagePostDeliveryEvents
| where ActionType == 'Phish ZAP' 

Analytic Rule Definition

id: 9d6594d8-1d0b-42c7-9dab-2a2c1db5c330
name: Teams Phish ZAP
description: |
  This query helps hunt for Teams messages with Phish threats that have been ZAPed.
description-detailed: |
  This query helps hunt for Teams messages with Phish threats that have been ZAPed, using Microsoft Defender for Office 365 and Advance hunting in Microsoft Defender XDR
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - MessagePostDeliveryEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  //Zero-hour auto purge (ZAP) took action on Teams messages containing Phish after delivery
  MessagePostDeliveryEvents
  | where ActionType == 'Phish ZAP' 
version: 1.0.0

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Email and Collaboration Queries/Microsoft Teams protection/Teams Phish ZAP.yaml