Configuring Microsoft 365 - ATO detection

This page includes:

About Microsoft 365 - ATO detection

If you have integrated FortiMail Workspace Security with Microsoft 365 [Inline or API], you can enhance your protection by enabling the FortiMail Workspace Security-Microsoft 365 ATO [account takeover] detection functionality. This functionality monitors user activity in your Microsoft 365 accounts to detect possible ATO attempts. The detection is based significantly on monitoring anomalies in user behavior. It is recommended that you activate the Microsoft 365 ATO detection functionality in your organization.

Note: The ATO detection functionality is not available for Google Workspace, Microsoft Exchange, and "Other" integrations.

To activate the Microsoft 365 ATO detection functionality, mailbox auditing must be enabled in your Microsoft 365 account. FortiMail Workspace Security analyzes the Microsoft 365 audit log, and uses various algorithms to detect suspicious user activity. Suspicious user activity includes behavior such as:

  • creating suspicious mailbox rules [for example, forwarding, redirecting, moving, or deleting emails]

  • performing suspicious login attempts, such as too-fast-to-travel logins. In addition, FortiMail Workspace Security tries to identify unusual login patterns and login attempts from unfamiliar locations or devices.

Suspicious ATO activity appears as entries in the Account Takeover page. For details about these cases, see Account Takeover.

IMPORTANT: After you activate ATO detection, we recommend that you also enable alerts for suspected ATO attempts. For details, see Alerts.

  • You can activate Microsoft 365 ATO only if the FortiMail Workspace Security-Microsoft 365 integration [Inline or API] is already enabled in your organization. For details, see Integration with Microsoft 365.

Auto alerts

If FortiMail Workspace Security detects a possible account takeover in your organization, FortiMail Workspace Security will send an email alert with a subject similar to "URGENT - Possible Account Take Over". The email will include details of the suspected account takeover. The email will be sent to the recipients that are specified in the "Alert via email on malicious cases" setting. If this setting is not enabled, email alerts will not be sent. [See Configuring alerts] Work together with the FortiMail Workspace Security IR Team to investigate and resolve the issue.

Manual alerts

The FortiMail Workspace Security IR Team monitors and reviews the cases that are added by FortiMail Workspace Security. The FortiMail Workspace Security IR Team may investigate any of the cases in more detail [typically High severity cases] and send an additional email alert with more details about the case.

  • This email is sent to the escalation contacts only.

  • This email is sent even if the "Alert via email on malicious cases" setting isn't enabled. [See Configuring alerts]

More about ATO alerts

Licensing:

There are no additional licensing requirements for enabling the ATO functionality.

Note:

ATO can't be enabled in bulk for multiple organizations; to activate ATO, it is necessary to perform the procedure below individually for each organization.

Disclaimer:

After you perform the procedures below to activate the ATO detection functionality, FortiMail Workspace Security will attempt to detect ATO attempts in all the email accounts in your organization. It is not possible to limit the ATO detection functionality to protect only specified domains, groups of users, or users. Please consider the associated privacy issues before implementing the ATO functionality.

Configuring Microsoft 365 - ATO detection

See the available video.

Perform the following steps to configure the Microsoft 365 - ATO detection functionality.

Monitoring ATO detections

You can use both the Account Takeover page and the Events page to monitor suspected ATO attempts - the Account Takeover page is the recommended location.

Monitoring in the Account Takeover page

In the Account Takeover page, you can monitor suspected ATO attempts in your organization.

For details about the Account Takeover page, see Account Takeover.

Monitoring in the Events page

In the Events page, you can monitor suspected ATO attempts in your organization. Each suspected ATO attempt is assigned a High severity in the Events page. The type of the event is:

  • For mailbox rule issues:

    • New-InboxRule

    • Remove-InboxRule

    • Set-InboxRule

    • Set-Mailbox

  • For login issues:

    • UserLoggedIn

    • UserLoginFailed

Note: There may be ATO-related entries in the Events page, and no corresponding entries in the Account Takeover page. This is because a case will be added only if the required set of factors are detected, not necessarily just a single entry in the Events page.

For details about the Events page, see Events.

A bit more about enabling ATO detection

  • ATO detection is performed in "near real-time" [not real-time]. The slight delay in detection occurs because FortiMail Workspace Security must wait for Microsoft to record the user actions in the audit log. It typically then takes a few minutes for FortiMail Workspace Security to receive audit log events, and only thereafter can the FortiMail Workspace Security ATO algorithms be performed on the audit log.

  • When ATO detection is first enabled, FortiMail Workspace Security will analyze the events that are available in Microsoft audit log. This may include events from the previous few days. Therefore ATO attempts may be detected even if the attempts were performed a few days prior to the enabling of ATO detection.

  • After you activate ATO detection, it may take about a week for the system to "learn" the users' behavior, and to then be able to produce more accurate alerts. During the first week, a greater number of FPs [false positives] may be reported. This should reduce after the first week.