Step 1 - Searching for Attack Emails

Goal

Review attack emails for different users with different protection levels.

Users in the detect policy are in monitor-only mode, and users in the Prevent Policy are protected by automated protection workflows.

Discussion points

  • Email is the leading attack vector on organizations.

  • End users are the weakest link.

  • The shortcoming of traditional & built-in security.

Instructions

Step

Instructions

1

Login to the Harmony Email & Collaboration portal - Details can be found on the Environment Information page

2

Navigate to the Overview tab and review the Phishing and Malware events (Last 30 days):