Compromise Remediation
Single pane of glass review of common Indicators of Compromise (IoC)
Last updated
Was this helpful?
Single pane of glass review of common Indicators of Compromise (IoC)
Last updated
Was this helpful?
Upon page load, CIPP will run an analysis on the user to identify common Indicators of Compromise (IoC). Once that analysis is returned, review the information presented and determine if the user has been compromised. The analysis performs the checks listed in the table below. A green check will indicate that information was found for the check and needs review.
Note: This page is intended to surface information about potential information that should be reviewed when a compromise is suspected. The existence of information in one of the indicators should not be interpreted as an absolute sign of compromise but rather as a useful tool to help quickly surface the basic information that should be reviewed during your investigation.
Mailbox Rules
This will present any mailbox rules found for the client.
Recently added users
This will display any newly created users in the tenant.
New Applications
This will display any newly registered enterprise applications.
Mailbox permission changes
This will identify any suspicious mailbox permission changes.
and review the indicated mailboxes for the permissions data.
MFA Devices
This will identify any MFA devices for review, including when the type of device and the datetime when it was registered.
Password Changes
This will display any recent password changes for the tenant.
Refresh Data
This will refresh the analysis for the user and update the Indicators of Compromise checks.
Remediate User
This action will block user sign-in, reset the user's password, disconnect all current sessions, remove all MFA methods for the user, and disable all inbox rules for the user.
Download Report
This will download a JSON file for the checks completed in the analysis.
We value your feedback and ideas. Please raise any on GitHub.