Unusual Mailbox Access
Last updated on:
In this page
About the rule
Rule Type
Anomaly
Rule Description
Detects mailbox access by someone other than the owner, indicating potential misuse.
Severity
Critical
Rule Requirement
Criteria
Action1: actionname = "ERP_Non_Owner_Activity_On_Mailbox" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(rules.detection.action.model.user_with_unusual_mailbox_name) | isanomalous(rules.detection.action.model.user_with_unusual_folder_accessed) | isanomalous(rules.detection.action.model.user_with_unusual_operation) | isanomalous(rules.detection.action.model.user_with_unusual_email) select Action1.CALLER_USER_NAME,Action1.MAILBOX_NAME,Action1.FOLDER_ACCESSED,Action1.SERVER,Action1.OPERATION,Action1.OPERATION_RESULT,Action1.CLIENTIP,Action1.CLIENT_DETAILS,Action1.EMAIL,Action1.LOGONTYPE
Detection
Execution Mode
Intelligent
Log Sources
ME Applications


