
Summary
The O365 Email Suspicious Behavior Alert is designed to monitor and identify potential compromises of user mailboxes in Office 365 environments. This analytic activates upon detection of specific behaviors such as suspicious email sending patterns, users being restricted from sending emails, unusual email forwarding activities, or instances where the email sending limit has been exceeded. The rule utilizes the O365 Universal Audit Log to capture and analyze relevant events. Given that these incidents can indicate malicious activity within the email ecosystem, it's crucial for organizations to monitor these alerts closely and have a response plan in place. Furthermore, enhancements provided by premium Office 365 capabilities may improve detection efficiency and response mechanisms further. Analysts should remain vigilant for alerts generated by this rule and investigate any anomalies that could signify unauthorized access or data exfiltration attempts.
Categories
- Cloud
- Identity Management
Data Sources
- Pod
- Service
- Cloud Service
- User Account
- Application Log
ATT&CK Techniques
- T1114
- T1114.003
- T1566
Created: 2024-11-14