Skip to content

Commit 15f151f

Browse files
authored
Merge branch 'public' into user/kvitta/networking_logs
2 parents ed21787 + 66150a3 commit 15f151f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-xdr/alert-grading-playbook-inbox-forwarding-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: conceptual
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 04/03/2024
20+
ms.date: 07/26/2024
2121
---
2222

2323
# Alert classification for suspicious inbox forwarding rules
@@ -29,7 +29,7 @@ ms.date: 04/03/2024
2929

3030
Threat actors can use compromised user accounts for several malicious purposes including reading emails in a user's inbox, creating inbox rules to forward emails to external accounts, sending phishing mails, among others. Malicious inbox rules are widely common during business email compromise (BEC) and phishing campaigns, and it important to monitor them consistently.
3131

32-
This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (TP). You can then take recommended actions for the TP alerts to remediate the attack.
32+
This playbook helps you investigate alerts for suspicious inbox forwarding rules and quickly grade them as either a true positive (TP) or a false positive (FP). You can then take recommended actions for the TP alerts to remediate the attack.
3333

3434
For an overview of alert classification for Microsoft Defender for Office 365 and Microsoft Defender for Cloud Apps, see the [introduction article](alert-classification-playbooks.md).
3535

0 commit comments

Comments
 (0)