Step 1 - Searching for Attack Emails
Goal
Review attack emails for different users with different protection levels.
Users in the detect policy are in monitor-only mode, and users in the Prevent Policy are protected by automated protection workflows.
Discussion points
-
Email is the leading attack vector on organizations.
-
End users are the weakest link.
-
The shortcoming of traditional & built-in security.
Instructions
Step |
Instructions |
---|---|
1 |
Login to the Harmony Email & Collaboration portal - Details can be found on the Environment Information page |
2 |
Navigate to the Overview tab and review the Phishing and Malware events (Last 30 days): |