Name:O365 Suspicious Admin Email Forwarding id:7f398cfb-918d-41f4-8db8-2e2474e02c28 version:2 date:2024-10-17 author:Patrick Bareiss, Splunk status:deprecated type:Anomaly Description:**DEPRECATION NOTE** - This search has been deprecated and replaced with `O365 Mailbox Email Forwarding Enabled`. This search detects when an admin configured a forwarding rule for multiple mailboxes to the same destination. Data_source:
search:`o365_management_activity` Operation=Set-Mailbox | spath input=Parameters | rename Identity AS src_user | search ForwardingAddress=* | stats dc(src_user) AS count_src_user earliest(_time) as firstTime latest(_time) as lastTime values(src_user) AS src_user values(user) AS user by ForwardingAddress | where count_src_user > 1 |`security_content_ctime(firstTime)` |`security_content_ctime(lastTime)` |`o365_suspicious_admin_email_forwarding_filter`
how_to_implement:You must install splunk Microsoft Office 365 add-on. This search works with o365:management:activity known_false_positives:unknown References: drilldown_searches:
: tags: analytic_story: - 'Office 365 Collection Techniques' - 'Data Exfiltration' asset_type:O365 Tenant confidence:60 impact:80 message:User $user$ has configured a forwarding rule for multiple mailboxes to the same destination $ForwardingAddress$ mitre_attack_id: - 'T1114.003' - 'T1114' observable: name:'user' type:'User' - role: - 'Victim' product: - 'Splunk Enterprise' - 'Splunk Enterprise Security' - 'Splunk Cloud' required_fields: - '_time' - 'Operation' - 'Parameters' risk_score:48 security_domain:threat