Configuring Microsoft 365 - ATO detection

This page includes:

About Microsoft 365 - ATO detection

If you have integrated Perception Point X‑Ray with Microsoft 365 [Inline or API], you can enhance your protection by enabling the Perception Point X‑Ray-Microsoft 365 ATO [account takeover] detection functionality. This functionality monitors user activity in your Microsoft 365 accounts to detect possible ATO attempts - based significantly on detecting anomalies in user behavior. It is recommended that you activate the Microsoft 365 ATO detection functionality in your organization.

Note: The ATO detection functionality is not available for Google Workspace, Exchange, and "Other" integrations.

To activate the Microsoft 365 ATO detection functionality, mailbox auditing must be enabled in your Microsoft 365 account. Perception Point X‑Ray analyzes the Microsoft 365 audit log, and uses various algorithms to detect suspicious user activity. Suspicious user activity includes behavior such as:

  • creating suspicious mailbox rules [for example, forwarding, redirecting, moving, or deleting emails]

  • performing suspicious login attempts, such as too-fast-to-travel logins. In addition, Perception Point X‑Ray tries to identify unusual login patterns and login attempts from unfamiliar locations or devices.

Suspicious ATO activity appears as entries in the Cases page. For details about cases, see Cases.

IMPORTANT: After you activate ATO detection, we recommend that you also enable alerts for suspected ATO attempts. For details, see Alerts.

  • You can activate Microsoft 365 ATO only if the Perception Point X‑Ray-Microsoft 365 integration [Inline or API] is already enabled in your organization. For details, see Connecting Microsoft 365.

Auto alerts

If Perception Point X‑Ray detects a possible account takeover in your organization, Perception Point X‑Ray will send an email alert with a subject similar to "URGENT - Possible Account Take Over". The email will include details of the suspected account takeover. The email will be sent to the recipients that are specified in the "Alert via email on malicious cases" setting. If this setting is not enabled, email alerts will not be sent. [See Configuring alerts] Work together with the Perception Point IR Team to investigate and resolve the issue.

Manual alerts

The Perception Point IR Team monitors and reviews the cases that are added by Perception Point X‑Ray. The Perception Point IR Team may investigate any of the cases in more detail [typically High severity cases] and send an additional email alert with more details about the case.

  • This email is sent to the escalation contacts only.

  • This email is sent even if the "Alert via email on malicious cases" setting isn't enabled. [See Configuring alerts]

More about ATO alerts

Licensing:

There are no additional licensing requirements for enabling the ATO functionality.

Note:

ATO can't be enabled in bulk for multiple organizations - to activate ATO, it is necessary to perform the procedure below individually for each organization.

Disclaimer:

After you perform the procedures below to activate the ATO detection functionality, Perception Point X‑Ray will attempt to detect ATO attempts in all the email accounts in your organization. It is not possible to limit the ATO detection functionality to protect only specified domains, groups of users, or users. Please consider the associated privacy issues before implementing the ATO functionality.

Configuring Microsoft 365 - ATO detection

See the available video.

Perform the following steps to configure the Microsoft 365 - ATO detection functionality.

Monitoring ATO detections

You can use both the Cases page and the Events page to monitor suspected ATO attempts - the Cases page is the recommended location.

Monitoring in the Cases page

In the Cases page, you can monitor suspected ATO attempts in your organization.

For details about the Cases page, see Cases.

Monitoring in the Events page

In the Events page, you can monitor suspected ATO attempts in your organization. Each suspected ATO attempt is assigned a High severity in the Events page. The type of the event is:

  • For mailbox rule issues:

    • New-InboxRule

    • Remove-InboxRule

    • Set-InboxRule

    • Set-Mailbox

  • For login issues:

    • UserLoggedIn

    • UserLoginFailed

For details about the Events page, see Events.

A bit more about enabling ATO detection

  • ATO detection is performed in "near real-time" [not real-time]. The slight delay in detection occurs because Perception Point X‑Ray must wait for Microsoft to record the user actions in the audit log. It typically then takes a few minutes for Perception Point X‑Ray to receive audit log events, and only thereafter can the Perception Point X‑Ray ATO algorithms be performed on the audit log.

  • When ATO detection is first enabled, Perception Point X‑Ray will analyze the events that are available in Microsoft audit log. This may include events from the previous few days. Therefore ATO attempts may be detected even if the attempts were performed a few days prior to the enabling of ATO detection.

  • After you activate ATO detection, it may take about a week for the system to "learn" the users' behavior, and to then be able to produce more accurate alerts.