Office365 is a popular application productivity suite that enables organizations to accelerate communication and business processes. With Office365’s popularity, it has becomes an become a common attack vector for malicious actors and insider threats. As a result, Devo provides out-of-the-box detections to help organizations to understand possible attacks attack vectors and ways to protect their office365 data.

Expand
titlePhish Attempt

Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems.

This detection is triggered when a user reports an email as malware or phishing in Office 365.

Source table ➝ CLOUDcloud.OFFICE365office365.MANAGEMENTmanagement.SECURITYCOMPLIANCECENTERsecuritycompliancecenter

Expand
title365 Sus Mailbox Delegation

Adversaries may use the compromised account to send messages to other accounts in the network of the target organization while creating inbox rules.

Source table → cloud.office365.management.exchange