<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs) in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467701#M7013</link>
    <description>&lt;P&gt;please provide auto-forwarding sample log.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Apr 2020 10:05:13 GMT</pubDate>
    <dc:creator>to4kawa</dc:creator>
    <dc:date>2020-04-07T10:05:13Z</dc:date>
    <item>
      <title>Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467700#M7012</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;What I want to achieve is to identify the users that possibly leaking /auto-forwarding emails to his personal email address (e.g. gmail) based on Exchange logs&lt;BR /&gt;
1- Detect possible Auto-forwarding rule &lt;BR /&gt;
2- Detect possible email leakage&lt;BR /&gt;
Company email ID: &lt;A href="mailto:123@123.com"&gt;123@123.com&lt;/A&gt;&lt;BR /&gt;
Private Email ID: *@gmail.com and *@yahoo.com&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;1- Detect Possible Auto-Forwarding Rule&lt;/STRONG&gt;&lt;BR /&gt;
based on timestamp can I have splunk query to support me identify users that auto-forwarding ?&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;2- Detect possible email leakage&lt;/STRONG&gt;&lt;BR /&gt;
I want to capture if user sending 10+ emails to specific recipient using free email services e.g. gmail in duration of 3 minutes.&lt;/P&gt;

&lt;P&gt;Sample Query &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=mail-1 sourcetype="MSExchange:*" sender=123@123.com
| search recipient IN("*@gmail","*@yahoo.com")
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Thanks in Advance.&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 06:27:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467700#M7012</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-04-07T06:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467701#M7013</link>
      <description>&lt;P&gt;please provide auto-forwarding sample log.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 10:05:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467701#M7013</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-04-07T10:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467702#M7014</link>
      <description>&lt;P&gt;Hi @to4kawa,&lt;/P&gt;

&lt;P&gt;I don't have filed or sample logs for auto-forwarding.&lt;BR /&gt;
Maybe this case has been observed and identified by one of the users before. (It will be good to share)&lt;/P&gt;

&lt;P&gt;2- Detect possible email leakage&lt;BR /&gt;
In other hand, I would like to have query where that it will check if&lt;BR /&gt;
&lt;STRONG&gt;specific sender&lt;/STRONG&gt; sending 10 or more emails to &lt;STRONG&gt;specific recipient&lt;/STRONG&gt; in 3 minutes duration.&lt;/P&gt;

&lt;P&gt;This can give us possibility not assurance if user leaking emails.&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 10:20:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467702#M7014</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-04-07T10:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467703#M7015</link>
      <description>&lt;P&gt;the recipients of Exchange is multivalue? single value?&lt;BR /&gt;
Email logs are complex.&lt;BR /&gt;
Field extraction is also a problem.&lt;/P&gt;

&lt;P&gt;please provide the results&lt;CODE&gt;| stats min(_time) as _time values(recipient) as recipients by sender sessionid | mvexpand recipients&lt;/CODE&gt;&lt;BR /&gt;
If field name is wrong, please fix it.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 10:59:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467703#M7015</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-04-07T10:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467704#M7016</link>
      <description>&lt;P&gt;Hi I tried it but there is not field for sessionid.&lt;/P&gt;

&lt;P&gt;Would you please advice.?&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 19:29:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467704#M7016</guid>
      <dc:creator>zayedaljaberi</dc:creator>
      <dc:date>2020-04-07T19:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Possible Email Leakage and Auto-forwarding rules (Exchange Logs)</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467705#M7017</link>
      <description>&lt;P&gt;&lt;A href="https://docs.microsoft.com/ja-jp/exchange/mail-flow/transport-logs/message-tracking?view=exchserver-2019#search-the-message-tracking-log"&gt;https://docs.microsoft.com/ja-jp/exchange/mail-flow/transport-logs/message-tracking?view=exchserver-2019#search-the-message-tracking-log&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I don't know what's &lt;EM&gt;network-message-id&lt;/EM&gt; field name in Splunk.&lt;BR /&gt;&lt;BR /&gt;
&lt;EM&gt;leaking emails&lt;/EM&gt; is same &lt;CODE&gt;message_id&lt;/CODE&gt; ?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 22:10:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Possible-Email-Leakage-and-Auto-forwarding-rules-Exchange-Logs/m-p/467705#M7017</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-04-07T22:10:26Z</dc:date>
    </item>
  </channel>
</rss>

