Welcome back to our series on safeguarding against Business Email Compromise (BEC) within Office 365. Previously, we've explored the rise of BEC attacks, their operational tactics, and essential configuration settings for protection. In this fourth installment, we delve into Office 365's logging and auditing capabilities, crucial for detecting BEC threats. Upcoming posts will guide employees on recognizing BEC targeting (Part 5) and speculate on the structure of BEC attackers (Part 6).
This series zeroes in on BEC, offering targeted recommendations. For comprehensive Office 365 security guidance, refer to the CIS Benchmark for Microsoft 365 or Microsoft’s Secure Score. SecureSky provides Office 365 assessments and MDR services to bolster your security posture against threats.
1. Mailbox Auditing: Activate mailbox auditing to log mailbox access and actions, providing visibility into unauthorized activities. Enable Mailbox Auditing.
2. Office 365 Audit Log Search: Utilize Audit Log Search for a 90-day historical analysis by privileged personnel, aiding in security investigations. Audit Log Search menu is presented in the following screenshot:
3. Email Flow Phishing Protection: Customize mail flow rules to shield users from phishing, including notifications for external emails, blocking unscannable attachments, and flagging emails with suspicious content or URL shorteners.
The Mail flow rule creation menu is presented in the following screenshot:
4. Alert Policies: Activate all default alert policies appropriate to your licensing level to monitor for unusual activities indicative of security breaches.
All default alert policies for the purchased licensing level (more default alerts exist at higher tiers) should be enabled in Office 365 environments, as presented in the following screenshot:
5. Risky Sign-In and User Detection: Implement Azure AD Identity Protection policies to evaluate sign-in risks and enforce security measures like MFA for suspicious login attempts.
A policy should be created for risky sign-ins in Azure Active Directory Identity Protection, as presented in the following screenshot:
Azure Active Directory Identity Protection User Risk Policy
When configured, user and sign in risk policies generate alerts based on the following sign in characteristics:
An example alert is presented in the following screenshot:
Effective BEC detection in Office 365 necessitates regular log reviews and vigilant monitoring of configuration settings. Whether managed internally or by an MDR provider, maintaining these practices is vital for identifying and responding to potential BEC incidents promptly.