Exchange User Mailbox Forwarding
This Playbook is part of the Cortex Response And Remediation Pack.#
Supported versions
Supported Cortex XSOAR versions: 6.10.0 and later.
This playbook addresses the following alerts:
- Exchange user mailbox forwarding.
- Suspicious Exchange user mailbox forwarding.
Playbook Stages:
Triage:
- Collect initial information about the internal user and the associated external forwarding address.
Investigation:
- Check IOCs Reputation:
- Analyze the reputation of IP addresses, email addresses, and domains associated with the alert.
- Get External Email Statistics:
- Retrieve statistics of email interactions between the internal user and the external forwarding address over the last 2 days, including:
- Number of emails sent to and received from the external address.
- Number of users interacting with the external address.
- Retrieve statistics of email interactions between the internal user and the external forwarding address over the last 2 days, including:
- Check if User is Risky:
- Assess the internal user's risk score using:
- Core Risk Evaluation: Identify high-risk users and extract reasons behind elevated risk levels.
- Azure Risk Indicators: Retrieve Azure risk scores, detections, and recent security alerts for the internal user.
- Assess the internal user's risk score using:
- Check for Azure Alerts:
- Perform an advanced hunting query in Microsoft 365 Defender to extract recent Azure alerts associated with the internal user.
Containment:
- Provide a manual task for an analyst to review the findings and determine the appropriate response.
- Possible actions:
- Disable the user in Azure AD to prevent further unauthorized actions.
- Disable mailbox forwarding for the user in Exchange Online.
- Disable both user and forwarding.
- Take no action.
- If the user is disabled, revoke active sessions to ensure immediate containment.
Requirements: For the best results, it's recommended to ensure these integrations are configured and working:
Cortex Core - Investigation and Responsefor Core user risk evaluation.Azure Risky Usersfor retrieving Azure-based user risk scores and detections.Microsoft 365 Defenderfor advanced hunting queries and extracting Azure alerts.Microsoft Graph Userfor disabling user accounts and revoking active sessions.Exchange Online EWSfor disabling mailbox forwarding.Security And Compliance V2for fetching email interaction statistics.
Dependencies#
This playbook uses the following sub-playbooks, integrations, and scripts.
Sub-playbooks#
- O365 - Security And Compliance - Search
Integrations#
- Cortex Core - IR
- AzureRiskyUsers
- Microsoft 365 Defender
- Microsoft Graph User
- EWSO365
- SecurityAndComplianceV2
Scripts#
- GetTime
- SetAndHandleEmpty
Commands#
- azure-risky-users-list
- azure-risky-users-risk-detections-list
- closeInvestigation
- core-get-cloud-original-alerts
- core-list-risky-users
- domain
- ews-mail-forwarding-disable
- ip
- microsoft-365-defender-advanced-hunting
- msgraph-user-account-disable
- msgraph-user-session-revoke
Playbook Inputs#
There are no inputs for this playbook.
Playbook Outputs#
There are no outputs for this playbook.
Playbook Image#
