Unusual Mailbox Access

Last updated on:

About the rule

Rule Type

Anomaly

Rule Description

Detects mailbox access by someone other than the owner, indicating potential misuse.

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "ERP_Non_Owner_Activity_On_Mailbox" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(rules.detection.action.model.user_with_unusual_mailbox_name) | isanomalous(rules.detection.action.model.user_with_unusual_folder_accessed) | isanomalous(rules.detection.action.model.user_with_unusual_operation) | isanomalous(rules.detection.action.model.user_with_unusual_email) select Action1.CALLER_USER_NAME,Action1.MAILBOX_NAME,Action1.FOLDER_ACCESSED,Action1.SERVER,Action1.OPERATION,Action1.OPERATION_RESULT,Action1.CLIENTIP,Action1.CLIENT_DETAILS,Action1.EMAIL,Action1.LOGONTYPE

Detection

Execution Mode

Intelligent

Log Sources

ME Applications