Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions. (by PwC-IR)
O365-InvestigationTooling
By OfficeDev
Our great sponsors
Business-Email-Compromise-Guide | O365-InvestigationTooling | |
---|---|---|
6 | 2 | |
210 | 549 | |
- | - | |
0.0 | 10.0 | |
about 3 years ago | over 3 years ago | |
PowerShell | ||
- | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Business-Email-Compromise-Guide
Posts with mentions or reviews of Business-Email-Compromise-Guide.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-23.
-
Help me describe this type of "attack"
you may find this helpful: https://github.com/PwC-IR/Business-Email-Compromise-Guide
- Useful Email Compromise resource
-
What is the standard practice of dealing with a successful phishing attempt in O365?
This one is also really good imo PWC BEC Guide
- Office 365 audit log for compromised account
-
Do you have a data breach response plan for your clients?
I've written my own internal business email compromise plan, which just covers e-mail - but may be a good start for you. I can't share my own plan, but I found a very good guide from PwC that's publicly available on GitHub: https://github.com/PwC-IR/Business-Email-Compromise-Guide
-
Protect O365-users against phishing?
A while ago someone from PwC posted the PwC BEC handbook. I can't remember who it was again, so I'm sorry to not give credits to him right now! I've made a BEC handbook for myself in the past, but I'm thinking of using the PwC one instead since it's so incredibly detailed. I think it's very useful. You can find it here.
O365-InvestigationTooling
Posts with mentions or reviews of O365-InvestigationTooling.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-08-23.
-
Steps to follow in event of Cyber attack M365
Another user brought up majority of what needs to be done. However if you (or a client) need to be exhaustive O365-InvestigationTooling is quite good for fast remediation and being able to document all that was done.
- What is the standard practice of dealing with a successful phishing attempt in O365?
What are some alternatives?
When comparing Business-Email-Compromise-Guide and O365-InvestigationTooling you can also consider the following projects:
hawk - Powershell Based tool for gathering information related to O365 intrusions and potential Breaches