Detectionhightest
Suspicious Inbox Forwarding Identity Protection
Indicates suspicious rules such as an inbox rule that forwards a copy of all emails to an external address
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Azureriskdetection
ProductAzure← raw: azure
Serviceriskdetection← raw: riskdetection
Detection Logic
Detection Logic1 selector
detection:
selection:
riskEventType: 'suspiciousInboxForwarding'
condition: selectionFalse Positives
A legitimate forwarding rule.
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
27e4f1d6-ae72-4ea0-8a67-77a73a289c3d
Status
test
Level
high
Type
Detection
Created
Sun Sep 03
Author
Path
rules/cloud/azure/identity_protection/azure_identity_protection_inbox_forwarding_rule.yml
Raw Tags
attack.t1114.003attack.collection