Compromised Account (Anomaly) Detection

The Anomaly Detection engine detects behaviors and actions that seems abnormal when observed in the context of an organization and a user's historical activity. It analyzes the behavior using machine-learning algorithm that builds a profile based upon historical events including login locations and times, data-transfer behavior, and email message patterns. Anomalies are often a sign that an account is compromised.

When an anomaly is detected, a security event is generated providing the context and other information necessary for investigation. Depending on the Severity Level, the anomaly is categorized as Critical or Suspected.

  • Critical anomalies are events indicating a high probability for compromised accounts. These anomalies require investigation and validation from administrators and should be handled immediately.

    Note - You can configure the Anomaly Detection engine to automatically block the detected compromised accounts. For more information, see Configuring Anomaly Detection Workflows.

  • Suspected anomalies are events that might indicate a compromised account and can be reviewed with a lesser sense of urgency.

By default, for critical anomalies, the Anomaly Detection engine only sends email alerts to administrators. To configure the Anomaly Detection engine to not only send email alerts but also automatically block the detected compromised accounts, see Configuring Anomaly Detection Workflows.

Some organizations manage security alerts through dedicated mailboxes shared between different security team members or use them for integration with 3rd party solutions.

With Harmony Email & Collaboration, you can configure a dedicated mailbox for alerts on detected compromised accounts. To configure the mailbox, see Configuring Anomaly Detection Workflows.

To focus on high probability account takeover, do one of these:

  • On the Events page, filter the events by Type (Anomaly) and Severity Level (Critical).

  • On the Overview page, click on the Anomalies card main indicators.

  • On the Overview page, under Security Events, click on Filter by Type and select Critical Anomalies.

Compromised Accounts (Anomaly) Workflows

When Harmony Email & Collaboration detects a high-confidence compromised account, it automatically re-inspects the user's emails for the last three hours.

As these emails are more suspicious of being malicious, the Anti-Phishing security engine performs this inspection with increased sensitivity.

If it detects phishing emails sent from this user, it takes remediation action based on the policy applied to the user.

  • If the policy is in Detect mode, it takes no action.

  • If the policy is in Prevent (Inline) or Detect & Remediate mode, it quarantines the email.

Supported Anomalies

Critical Anomalies

Suspected Anomalies

Configuring Anomaly Detection Workflows

When Harmony Email & Collaboration detects a compromised or suspected compromised account, the administrator can configure the Anomaly Detection security engine to take automatic actions. To do that, the administrator must select the required workflow for different scenarios.

To configure Anomaly Detection workflows:

  1. Navigate to Security Settings > Security Engines.

  2. Click Configure for Anomaly Detection.

  3. Under Compromised accounts workflow, select the required workflow when critical anomalies (which indicates that an account is compromised) are detected.

    • To send email alerts to the administrator and automatically block the compromised account, select Alert admins, automatically block user.

    • To send only email alerts to the administrator, select Alert admins.

  4. Under Compromised Microsoft administrators, select the required workflow when compromised global admin accounts are detected.

    1. To block compromised global admin accounts, select Automatically block admin.

    2. To avoid blocking compromised global admin accounts, select Do nothing.

  5. To send email alerts when suspected anomalies (which indicates that an account may be compromised) are detected, under Suspected compromised accounts workflow, select Alert Admins.

  6. To configure a dedicated mailbox for alerts on compromised accounts:

    1. Select the Dedicated mailbox for alerts on compromised accounts checkbox.

    2. Under Dedicated Alert Mailbox, enter the email address.

  7. Click Save.

Notes:

Configuring Settings for Specific Anomalies

Impossible Travel Anomaly

To generate Impossible Travel Anomaly event even when the user logs in from multiple locations inside the same country:

  1. Go to Security Settings > Security Engines.

  2. Click Configure for Anomaly Detection.

  3. Under Impossible Travel Anomaly, select the Generate event even if the impossible travel is within the same country check-box.

    For more information, see Suspicious Geo Anomaly (Impossible Travel).

  4. Click Save.

Anomaly Exceptions

At times, to handle falsely flagged events, administrators may need to create exceptions for anomaly detections.

To create Anomaly exceptions:

  1. Go to Events screen.

  2. Select the anomaly event for which you want to create an exception.

  3. Click on the vertical ellipses icon (in the right side of the selected anomaly event), and then select Add Exception.

    Create allow-list for anomaly pop-up screen appears.

  4. Under Allow-List type, select the required exception from the drop-down.

    Note - The drop-down shows different options applicable for the anomaly event you selected.

  5. Under Apply for all past events, select Yes or No.

    • Yes - The exception gets applied to all the events in the past and to the future events.

    • No - The exception gets applied only to the event you selected and to all the future events.

  6. If required, enter a Comment for the anomaly exception.

  7. Click OK.

To see all the anomaly exceptions, go to Security Settings > Exceptions > Anomaly.