Compromised Email Account

Description

Resolution for users experiencing a compromised Office 365 email account. Estimated time to resolution: 1hr+.

Issue Synopsis

An Office 365 email account was breached and unauthorized emails were sent from the account. 

Resolution Summary

Documentation provided for breach remediation along with how to configure Office 365 and SaaS Alerts integration with RocketCyber.

Step-by-Step Instructions

1. Gather Essential Information

  • Identify the affected email account

  • Document the breach time and date

  • Verify if the user or group is monitored in RocketCyber

  • Confirm whether alerts were generated in SaaS Alerts or RocketCyber

2. Immediate Remediation Steps

A. Investigate the Breach

B. Remove Malicious Rules and Forwarding

C. Audit the Account and Data

3. Secure the Environment

A. Update Access Policies

B. Device and User Management

C. Apply Microsoft 365 Security Best Practices

4. Address Monitoring and Integration Gaps

  • Confirm if RocketCyber is enabled for monitoring.

  • Ensure all users and groups are listed in RocketCyber for proper incident tracking

Warnings and Callouts

  • Note that RocketCyber SOC does not actively monitor SaaS Alerts unless accounts are integrated

  • SaaS Alerts provide automated detection but may not be monitored by SOC until integration is complete with RocketCyber

  • If integration is not configured correctly, future breaches may go undetected

Useful Links

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section