You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-xdr/alert-classification-malicious-exchange-connectors.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Alert classification for malicious exchange connectors
3
-
description: Alert grading recipients from malicious exchange connectors activity and protect their network from malicious attack.
2
+
title: Alert classification for malicious Exchange connectors
3
+
description: Learn how to classify alerts on malicious Exchange connectors activity and protect your network from attacks.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- MET150
20
-
ms.date: 03/11/2024
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for malicious Exchange connectors so that I can take the necessary actions to remediate the attack and protect my network.
Threat actors use compromised exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
30
+
Threat actors use compromised Microsoft Exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
31
31
32
32
This playbook helps in investigating instances where malicious connectors are setup/deployed by malicious actors. Accordingly, they take necessary steps to remediate the attack and mitigate the security risks arising from it. The playbook helps in classifying the alerts as either true positive (TP) or false positive (FP). If alerts are TP, the playbook lists necessary recommended actions for remediating the attack. This playbook is available for security teams who review, handle/manage, and grade the alerts.
33
33
@@ -44,15 +44,15 @@ Connectors are used to route mail traffic between remote email systems and Offic
44
44
45
45
### Malicious Exchange connectors
46
46
47
-
Attackers may compromise an existing exchange connector or compromise an admin, and set up a new connector by sending phish or spam/bulk emails.
47
+
Attackers may compromise an existing Exchange connector or compromise an admin, and set up a new connector by sending phish or spam/bulk emails.
48
48
49
49
The typical indicators of a malicious connector can be found when looking at email traffic and its headers. For example, when email traffic is observed from a connector node with a mismatch in P1 (header sender) and P2 (envelope sender) sender addresses along with no information on Sender's AccountObjectId.
50
50
51
51
This alert tries to identify such instances of mail flow, wherein the mail sending activity seems suspicious adding to that relevant information on sender is unavailable.
52
52
53
53
## Playbook workflow
54
54
55
-
You must follow the sequence to identify malicious exchange connectors:
55
+
You must follow the sequence to identify malicious Exchange connectors:
56
56
57
57
- Identify which accounts are sending emails:
58
58
- Do accounts appear to be compromised?
@@ -69,7 +69,7 @@ You must follow the sequence to identify malicious exchange connectors:
69
69
This section describes the steps to investigate an alert and remediate the security risk due to this incident.
70
70
71
71
- Determine whether the connector demonstrates bad (malicious) behavior.
72
-
- Look for events indicating unusual mail traffic and identify, whether any new exchange connector was added recently.
72
+
- Look for events indicating unusual mail traffic and identify, whether any new and recently added Exchange connector.
73
73
- For mail traffic observed, determine if the email accounts are compromised by inspecting whether the accounts are responsible for unusual mail traffic.
74
74
- Look for mail content containing malicious artifacts (bad links/attachments).
75
75
- Look for domains that are not part of your environment.
Copy file name to clipboardExpand all lines: defender-xdr/alert-classification-password-spray-attack.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- met150
20
-
ms.date: 02/11/2024
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for password spray attacks so that I can take the necessary actions to remediate the attack and protect my network.
Copy file name to clipboardExpand all lines: defender-xdr/alert-classification-playbooks.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.custom:
18
18
- autoir
19
19
- admindeeplinkDEFENDER
20
20
ms.reviewer: evaldm, isco
21
-
ms.date: 02/11/2024
21
+
ms.date: 04/18/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
#customer intent: As a SOC analyst, I want to know how to review and classify alerts by using alert classification playbooks so that I can take the necessary actions to remediate the attack and protect my network.
@@ -89,6 +89,7 @@ See these playbooks for steps to more quickly classify alerts for the following
Copy file name to clipboardExpand all lines: defender-xdr/alert-classification-suspicious-ip-password-spray.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Alert classification for suspicious IP address related to password spraying activity
3
-
description: Alert classification for suspicious IP address related to password spraying activity to review the alerts and take recommended actions to remediate the attack and protect your network.
3
+
description: Investigate and review alerts related to suspicious IP address related to password spraying activity and take recommended actions to protect your network.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- met150
20
-
ms.date: 02/11/2024
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for suspicious IP addresses related to password spray attacks that I can take the necessary actions to remediate the attack and protect my network.
Copy file name to clipboardExpand all lines: defender-xdr/alert-grading-playbook-email-forwarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- met150
20
-
ms.date: 04/03/2024
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to review and classify alerts about suspicious email forwarding activity so that I can take the necessary actions to remediate the attack and protect my network.
Copy file name to clipboardExpand all lines: defender-xdr/alert-grading-playbook-inbox-forwarding-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- met150
20
-
ms.date: 07/26/2024
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to review and classify suspicious inbox forwarding rules alerts so that I can take the necessary actions to remediate the attack and protect my network.
Copy file name to clipboardExpand all lines: defender-xdr/alert-grading-playbook-inbox-manipulation-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
17
17
search.appverid:
18
18
- MOE150
19
19
- met150
20
-
ms.date: 04/05/2023
20
+
ms.date: 04/18/2025
21
21
appliesto:
22
22
- Microsoft Defender XDR
23
23
#customer intent: As a SOC analyst, I want to know how to review and classify suspicious inbox manipulation rules alerts so that I can take the necessary actions to remediate the attack and protect my network.
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
> This advanced hunting API is an older version with limited capabilities. A more comprehensive version of the advanced hunting API is already available in the **[Microsoft Graph security API](/graph/api/resources/security-api-overview)**. See **[Advanced hunting using Microsoft Graph security API](/graph/api/resources/security-api-overview#advanced-hunting)**
0 commit comments