If this detection indicates a genuine threat, the organization faces significant risks:
M365 Suspicious Transport Rule
Steps to investigate
M365 Suspicious Transport Rule
MITRE ATT&CK techniques covered
No items found.
M365 Suspicious Transport Rule
Related detections
No items found.
See our detections in action
Our interactive demo provides a deep dive into the advanced capabilities of our cybersecurity platform, showcasing real-time detection, comprehensive analysis, and proactive threat mitigation.
Don't just read about the possibilities – experience them.