- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detect when a user configures an inbox rule to move or delete email.
Monitor Microsoft 365 Exchange audit logs to look for the operation New-InboxRule
or Set-InboxRule
. Attackers might set up email rules to hide incoming emails in a compromised user mailbox to hide their activities. They may delete emails or mark them as read and move emails to less noticeable folders like ‘Conversation History’. In addition, the rule may be set up to look for keywords like ‘hack’, ‘phishing’ or ‘invoice’.
{{@usr.email}}
.{{@usr.email}}
is not aware of the inbox rule:{{@usr.email}}
using the Cloud SIEM - User Investigation dashboard.@threat_intel.results.subcategory:tor
with @threat_intel.results.category:tor
.