Incident Responder
Shortcuts
FAQ
Q: If a harmful email triggers an auto-investigation, will the same repeated email trigger auto-investigation each time?
Q: Does the incident responder violate the user's privacy?
Q: Is it possible to centralise the distribution of add-in?
Q: Are the emails sent by users for analysis securely stored on the server?
Q: Can I integrate this solution with the security products I have?
Q: How do you report the incidents analysed, investigated and responded to?
Q: How do you analyse the emails? Which tools are used for analysis?
Q: If the suspicious email analysed is found to be malicious, can we delete this email from the inboxes without any intervention?
Q: What are the dependencies of the plugin? Java, Flash or something else?
Q: Can the plugin be disabled by individual users?
Q: When this tool is running, it will be using a certain port. What port will it be?
Q: Can emails reported on the Incident Responder be sent to Proofpoint for analysis?
Use cases
Introduction
Use Case: I want to automate the technical analysis and investigation of suspicious emails in under a minute
Use Case: I want a system that integrates with my other Threat Intelligence / Sharing and incident response solutions
Use Case: I want to make sure that the privacy of users is protected
Use case: I want the service to work on mobile as well as desktop devices
Use case: I want an interface/management console, which can manage each incident
Use Case: I have a single master tenant on O365 but manage multiple business units under that tenant. I would like to restrict the Incident Responder integration to specific groups within the Master tenant.
Last updated