Incident Responder
This section provides a brief description of the Incident Responder module and this guide will provide instructions on how to use the Incident Responder platform. The Incident Responder module analyses a suspicious email, and according to the results, it takes action at the inbox level. The module also analyses the URLs, IPs, and Files with the engines of different technologies it is integrated where it enables an institution to acquire the technologies that it doesn’t have.

Shortcuts

FAQ

Q: Does the incident responder violate the user's privacy?

A: No, it does not. No one, including the Company Admins who manage the platform's interface, cannot view the contents of any email in the inbox.

Q: Is it possible to centralise the distribution of add-in?

A: Yes, it is. Many institutions manage the add-in (install, uninstall, enable, disable) with central administration tools, such as Microsoft SCCM, IBM Bigfix.

Q: Are the emails sent by users for analysis securely stored on the server?

A: The platform generates a random key which is unique for each customer then encrypts all reported emails on disk with AES 256 algorithm. See logging mechanism here.

Q: Can I integrate this solution with the security products I have?

A: Yes, it is possible to integrate any solution. There are many platforms such as DNS Firewall, Sandbox, exploitation tool platforms. See the integrations here. Please view your support page.

Q: How do you report the incidents analysed, investigated and responded to?

A: Yes, you have the feature for an automatic investigation by which and you can detect and remove the suspicious email or any of its variants in any of your users' inboxes, and you can automatically report it.

Q: How do you analyse the emails? Which tools are used for analysis?

A: We analyze suspicious emails by Header, Body and Attachment using our third-party engines integrated into our interface. It is possible to add a new analysis service here.

Q: If the suspicious email analysed is found to be malicious, can we delete this email from the inboxes without any intervention?

A: Yes, you have a feature for automatic investigation. With this, you can detect and remove the suspicious email and/or any of its versions in any of your users' inboxes, which you can automatically report.

Q: What are the dependencies of the plugin? Java, Flash or something else?

A: There are no dependencies that is required to download on users computer in order to use Phishing Reporter plugin.

Q: Can the plugin be disabled by individual users?

A: This depends on your company policy. If the user has a right to disable it, then it can be disabled. Many organisations handle these processes by GPO.

Q: When this tool is running, it will be using a certain port. What port will it be?

A: Add-in to connect to the server is through https (default port 443).

Use cases

Introduction

Primary use cases for Incident Responder are centered around the following:
  1. 1.
    I want an incident response system that can automate the technical analysis and investigation of suspicious, malicious emails in under a minute.
  2. 2.
    I want to integrate Incident Responder with other Threat Intelligence / Sharing and Incident Response solutions already purchased.
  3. 3.
    I want to make sure that the privacy of users is protected.
  4. 4.
    I want the service to work on mobile as well as desktop devices.
  5. 5.
    I want an interface/management console, which can manage each incident.
Incident Responder satisfies the criteria of each of these use cases; please see more below:

Use Case: I want to automate the technical analysis and investigation of suspicious emails in under a minute

Receiving a suspicious email is not great, but with Incident Responder, you’re able to take the right steps to protect your organisation from any malicious attacks from suspected emails and resulting in damaging data breaches. Use the details we know from Phishing Reporter about this discovered Incident and start a New Investigation. This will enable investigators to determine how far the executed attack from the suspicious email has so far penetrated defences by use of filters to ascertain what particular departments or individuals etc., have been affected.
Playbooks are an essential feature of Incident Responder as it automates and initiates investigations without too much oversight from the user. We suggest that you monitor how they are performing and tweak/edit them occasionally to get the best information and results from the investigations.
Incident Analysis is then carried out on the suspicious email within the Incident Response platform as well as other third-party technologies to provide the best results. Act to take the best, effective and quick response to the results and make your organization, colleagues and systems safer, more secure and resilient to prevent the risk of future incidents.

Use Case: I want a system that integrates with my other Threat Intelligence / Sharing and incident response solutions

Integrations are commonplace in the information security community, and Incident Responder is no different in being flexible to be used in alliance with other platforms. The New Integration feature walks users through the stages of integrating another cybersecurity solution. Remember to make active the new Integration as the last step to complete Threat Intelligence and Incident Response coverage.

Use Case: I want to make sure that the privacy of users is protected

Privacy concerns are of paramount importance in an incident response platform, and Incident Responder addresses these. Both Users and Company Administrators who manage the platform do not have access to the contents of any emails in the users’ inboxes.

Use case: I want the service to work on mobile as well as desktop devices

The Incident Responder service can be used on both mobile as well as desktop devices.

Use case: I want an interface/management console, which can manage each incident

It is human nature to lose track of what’s going on in a hectic information security environment. Incident Responder mitigates this risk with a comprehensive dashboard which provides an overview into how many users are on the Phishing Reporter platform, Reported Emails, Incidents are undergoing investigation, Top Rules, Incident Analysis and ROI.
It is recommended that you use the Reports generated from the use of the Incident Responder in conjunction with authorised third party technologies to achieve the best results. Reports can be used in line with the organisation’s own procedures and help avert potential cyber threats in the future. Threat Sharing / Threat Intelligence platforms are ideal places in which reported Incidents can be used for the wider benefit of a particular industry or sector.

Use Case: I have a single master tenant on O365 but manage multiple business units under that tenant. I would like to restrict the Incident Responder integration to specific groups within the Master tenant.

Yes, it’s possible to integrate with your master (single) tenant via the graph API, then you can restrict the API integration to a distribution group in Azure AD. i.e., you can decide which user mailboxes to integrate with (it does not have to be all of them). Please follow the steps below:
  1. 1.
    You need to implement the graph API settings for Incident Responder (following our standard configuration, which includes making the API work for “all’ users - https://doc.keepnetlabs.com/technical-guide/phishing-incident-responder/api-settings/configuration-steps-for-office-365-to)
  2. 2.
    Then you need to limit access to the App from Azure AD as it relates to Exchange Online (https://docs.microsoft.com/en-us/graph/auth-limit-mailbox-access)
Copy link
On this page
Shortcuts
FAQ
Q: Does the incident responder violate the user's privacy?
Q: Is it possible to centralise the distribution of add-in?
Q: Are the emails sent by users for analysis securely stored on the server?
Q: Can I integrate this solution with the security products I have?
Q: How do you report the incidents analysed, investigated and responded to?
Q: How do you analyse the emails? Which tools are used for analysis?
Q: If the suspicious email analysed is found to be malicious, can we delete this email from the inboxes without any intervention?
Q: What are the dependencies of the plugin? Java, Flash or something else?
Q: Can the plugin be disabled by individual users?
Q: When this tool is running, it will be using a certain port. What port will it be?
Use cases
Introduction
Use Case: I want to automate the technical analysis and investigation of suspicious emails in under a minute
Use Case: I want a system that integrates with my other Threat Intelligence / Sharing and incident response solutions
Use Case: I want to make sure that the privacy of users is protected
Use case: I want the service to work on mobile as well as desktop devices
Use case: I want an interface/management console, which can manage each incident
Use Case: I have a single master tenant on O365 but manage multiple business units under that tenant. I would like to restrict the Incident Responder integration to specific groups within the Master tenant.