
Summary
This detection rule aims to identify suspicious user actions related to inbox forwarding rules within Azure's Identity Protection service. Specifically, it targets cases where users set up forwarding rules that send copies of their emails to external addresses, which is often indicative of potential account compromise or data exfiltration attempts. The rule checks risk event types labeled as 'suspiciousInboxForwarding' to trigger alerts, providing security teams with valuable insights into potentially harmful behaviors linked to user identities. Mitigating such risks is crucial as they often precede larger security incidents. This summary of the rule underscores the importance of maintaining effective monitoring capabilities to safeguard sensitive information against unauthorized access and data theft through email systems.
Categories
- Cloud
- Identity Management
- Endpoint
Data Sources
- User Account
- Application Log
Created: 2023-09-03