You are a security operations team lead at a company that recently upgraded to Microsoft Defender for Office 365 Plan 2. There has been an incident involving a suspicious email that some employees reported. You need to use the tools available in your subscription to investigate and mitigate this threat efficiently. Which feature of Microsoft Defender for Office 365 Plan 2 should you use to perform an automated investigation and response to this email threat?