Skip to main content

Phishing Alerts Investigation

This Playbook is part of the PhishingAlerts Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook investigates and remediates potential phishing incidents produced by either an email security gateway or a SIEM product. It retrieves original email files from the email security gateway or email service provider and generates a response based on the initial severity, hunting results, and the existence of similar phishing incidents in XSOAR. No action is taken without an initial approval given by the analyst using the playbook inputs.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Process Email - Generic v2
  • Phishing Alerts - Check Severity
  • Detonate File - Generic
  • Extract Indicators From File - Generic v2
  • Email Headers Check - Generic
  • Threat Hunting - Generic
  • Search And Delete Emails - Generic v2
  • Block Indicators - Generic v3
  • Entity Enrichment - Phishing v2

Integrations#

This playbook does not use any integrations.

Scripts#

  • SearchIncidentsV2

Commands#

  • linkIncidents
  • closeInvestigation

Playbook Inputs#


NameDescriptionDefault ValueRequired
RoleThe default role to assign the incident to.AdministratorRequired
SearchAndDeleteWhether to enable the "Search and Delete" capability.
For a malicious email, the Search and Delete sub-playbook looks for other instances of the email and deletes them pending analyst approval.
TrueOptional
BlockIndicatorsWhether to enable the "Block Indicators" capability.
For a malicious email, the Block Indicators sub-playbook blocks all malicious indicators in the relevant integrations.
FalseOptional
AuthenticateEmailWhether the authenticity of the email should be verified using SPF, DKIM, and DMARC.TrueOptional
OnCallSet to True to assign only to analysts on the current shift. Requires Cortex XSOAR v5.5 or later.FalseOptional
SearchAndDeleteIntegrationDetermines which product and playbook is used to search and delete the phishing email from user inboxes.
Set this to "O365" to use the O365 - Security And Compliance - Search And Delete playbook.
Set this to "EWS" to use the Search And Delete Emails - EWS playbook.
EWSOptional
O365DeleteTypeThe method to delete emails using the O365 - Security And Compliance - Search And Delete playbook. Can be "Soft" (recoverable), or "Hard" (unrecoverable). Leave empty to decide manually for each email incident.
This is only applicable if the SearchAndDeleteIntegration input is set to O365.
SoftOptional
O365ExchangeLocationExclusionThe exchange location. Determines from where to search and delete emails searched using O365 playbooks. Use the value 'All' to search all mailboxes, use 'SingleMailbox' to search and delete the email only from the recipient's inbox, or use 'Manual' to decide manually for every incident. Note: Searching all mailboxes may take a significant amount of time. This input is only applicable if the SearchAndDeleteIntegration input is set to O365.SingleMailboxOptional
SOCEmailAddressThe SOC email address to set if the playbook handles phishing alerts.demistoadmin@demisto.intOptional
escalationRoleThe role to assign the incident to if the incident severity is critical.Optional
blockedAlertActionValueA comma-separated list of optional values the email security device returns for blocked\denied\etc. emails.block, deny, denied, deleteOptional
SensitiveMailboxesListThe name of a list that contains the organization's sensitive users.lists.sensitiveMailboxesListOptional
SearchThisWeekWhether to search for similar emails in a week's time range or for all time.trueOptional
CheckMicrosoftHeadersCheck Microsoft headers for BCL/PCL/SCL scores and set the "Severity" and "Email Classification" accordingly.TrueOptional
AutoBlockIndicatorsPossible values: True/False. Default: True.
Should the given indicators be automatically blocked, or should the user be given the option to choose?

If set to False - no prompt will appear, and all provided indicators will be blocked automatically.
If set to True - the user will be prompted to select which indicators to block.
TrueOptional
UserVerificationPossible values: True/False.
Whether to provide user verification for blocking IPs.

False - No prompt will be displayed to the user.
True - The server will ask the user for blocking verification and will display the blocking list.
FalseOptional

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Phishing Alerts Investigation