Splunk Search

Splunk query for viewing 0365 management activity by the sender of malicious account to recipients

kojodei789
Observer

Goodmorning guys much help needed. I have been receiving a lot of phishing attempts to recipients emails. I am looking for the best query that can allow me to see if these emails were filtered as spam or quarantined.  Thanks

I have been using query but it doesn't give me if the sender's email is filtered as spam or quarantined Sometimes it does not even work.

sourcetype=0365:management:activity"sender.email@xx.com" AND "recepient.email@hhs.gov"| table sourcetype_time P2Sender recipients{} subject| sort Recepients{}| dedup Recipients {} 

 

Labels (1)
0 Karma

kojodei789
Observer

sourcetype=0365:management:activity"sender.email@xx.com" AND "password expire"| table sourcetype_time P2Sender recipients{} Subject DetectionMethod Verdict| sort Recepients{}| dedup Recipients {}     

The password expired is the subject line

Thanks for the reply.  So the query above is what I normally use to see the categorization of the email if it is a phishing email or not    but I was wondering if there is a query that lets you know if spam filtered

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Can you share some examples of the events demonstrating whether the email was quarantined or filtered as spam?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...