Mastering Email Forwarding Rules in Microsoft 365

property
value
tags
azure-cloud,cloud-attacks,cloud-forensics,email-compromise,microsoft-ual
url
original_word_count
1480

Article Excerpt

In this blog, we present various scenarios in which threat actors can utilise email forwarding rules and the associated evidence in the UAL. Additionally, we have created a comprehensive mind map that summarises the contents of the blog for use in incident detection and response investigations.

Long Summary

This article provides an overview of the threat actor technique of email forwarding rules and the associated evidence in the Unified Audit Log (UAL). It outlines the various scenarios in which a threat actor can utilise email forwarding rules, including the creation of a new mailbox rule, modification or deletion of an existing mailbox rule, creation of a new transport rule, modification or deletion of an existing transport rule, and a security alert generated. It also provides examples of the UAL entries generated for each scenario.

The article explains that there are two types of rules: mailbox rules, which can be configured by the Owner/Admin/Delegate of a mailbox, and transport rules, which can only be configured by users with administrative roles/permissions. It also explains that the UAL is a crucial log for incident response in Microsoft 365 tenants, as it captures both user and admin initiated actions.

The article then provides examples of UAL entries generated for each scenario, such as the ClientIP, Parameters, UserId, ObjectId, RuleOperation, RuleAction, Identity, AppId, and Data fields. It also explains that the Security & Compliance center’s built-in alerts can be used to identify unusual activity in the UAL.

To summarise the contents of the blog, the article provides a mind map that includes the different scenarios and UAL evidence. It also provides further reading resources on BEC and email forwarding rules.

In conclusion, this article provides a comprehensive overview of the threat actor technique of email forwarding rules and the associated evidence in the UAL. It outlines the various scenarios in which a threat actor can utilise email forwarding rules, and provides examples of the UAL entries generated for each scenario. It also explains how the Security & Compliance center’s built-in alerts can be used to identify unusual activity in the UAL. The article provides a mind map that summarises the contents of the blog for use in incident detection and response investigations.

Short Summary

πŸ““ Mastering Email Forwarding Rules in Microsoft 365

πŸ‘‰πŸ½ In this blog, Invictus Incident Response presents various scenarios in which threat actors can utilise email forwarding rules and the associated evidence in the UAL. Additionally, they have created a comprehensive mind map that summarises the contents of the blog for use in incident detection and response investigations. πŸ‘‰πŸ½ Overview of threat actor techniques for data exfiltration using email forwarding rules πŸ‘‰πŸ½ Scenarios where threat actors can utilize email forwarding rules πŸ‘‰πŸ½ Types of rules: mailbox and transport rules πŸ‘‰πŸ½ Importance of Unified Audit Log (UAL) for incident response in Microsoft 365 tenants πŸ‘‰πŸ½ UAL entries generated for each scenario. Different UAL logs are generated depending on the method used to configure the rules (O365 Admin Portal, Powershell, Graph API, Outlook Client, OWA) πŸ‘‰πŸ½ Use of Security & Compliance center's built-in alerts to identify unusual activity πŸ‘‰πŸ½ Mind map provided to summarize contents of blog for incident detection and response investigations πŸ‘‰πŸ½ Explanation of ClientIP, Parameters, UserId, ObjectId, RuleOperation, RuleAction, Identity, AppId, and Data fields πŸ‘‰πŸ½ Further reading resources on BEC and email forwarding rules πŸ‘‰πŸ½ Comprehensive overview of email forwarding rules and associated evidence in UAL.

#EmailForwardingRules #UnifiedAuditLog #Microsoft365 #IncidentResponse #DetectionAndResponse