Hello community... I am wondering if anyone can share any lessons learned from handling phishing reports in Microsoft Office 365.
Currently we are looking at onboarding phishing reports by having Exchange "CC" phishing reports to a mailbox, then use the Exchange connector to read these messages and analyze them.
I think this approach will work, but we also have access to "Microsoft 365 Defender", which is it's own SOAR tool. When I look into that portal, I see MS already has done the hard work of grouping phishing and malware reports together into "incidents" and performing a fair amount of initial analysis of the reports. It seems a shame to ignore all of Threat Intel in Siemplify.
Does anyone have a success story to share in pulling together this data into Siemplify?
Lessons learned from handling phishing reports in Microsoft Office 365
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.