Business Email Compromise
Targeted attack leveraging compromised or spoofed executive email accounts to authorize fraudulent transactions or redirect sensitive communications.
Triage
5 proceduresContainment
3 proceduresP1
Credential and Account Lockdown
~45 min
P1
Revoke Cloud Sessions and Tokens
~30 min
P1
Phishing Containment: Block, Quarantine, Purge
~45 min
Sponsored
Preservation
5 proceduresCollection
7 proceduresP1
Phishing Artifact Collection: Headers, URLs, Attachments
~60 min
P2
EDR Telemetry Collection
~120 min
P2
M365 Unified Audit Log Collection
~90 min
P2
Collect DLP Policy Alerts and Hits
~45 min
P2
Azure AD Sign-In and Audit Log Collection
~60 min
P2
Identify Alternative Evidence When Primary Logs Are Missing
~60 min
P3
Coordinate Log Collection from Third-Party Vendors
~120 min