Office365 is a popular application productivity suite that enables organizations to accelerate communication and business processes. With Office365’s popularity, it has becomes an become a common attack vector for malicious actors and insider threats. As a result, Devo provides out-of-the-box detections to help organizations to understand possible attacks attack vectors and ways to protect their office365 data.
Expand | ||
---|---|---|
| ||
Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. This detection is triggered when a user reports an email as malware or phishing in Office 365. Source table ➝ |
Expand | ||
---|---|---|
| ||
Adversaries may use the compromised account to send messages to other accounts in the network of the target organization while creating inbox rules. Source table → |