Investigations
Last updated
Last updated
Copyright © Keepnet Labs LTD. All rights reserved.
This document displays the functions on Incident Responder > Investigation. Users will learn how to handle Investigations and carry out Incident Response processes.
You can find the investigations that have already been initiated on Incident Responder > Investigation. The table below provides a detailed explanation of the functions on this page.
Click on Incident Responder > Investigation menu to access Auto Investigation and report details.
If the analysis result of an email in the Reported Emails is determined as Malicious or Phishing, an automatic investigation is launched to search for the email within all users’ inboxes. The administrator will then decide what to do with the next steps.
Auto Investigation starts automatically by default as a result of a malicious email analysis.
When an Auto investigation or Manual investigation is started, platform admins are informed about the details of the process via email.
Click the Incident Responder > Investigation menu to start Manual Investigation and access the report details.
With the Manual Investigation feature, platform administrators can detect suspicious emails within their employees' email boxes using the criteria in the table below. After detecting these suspicious emails, it is possible to delete the relevant emails from the users' email boxes or send a warning message to the users in order to prevent damage.
When the New button on the page is clicked to start a new Investigation, the Start New Manual Investigation window appears on the screen and you can start Manual Investigation by filling in the information in the table below.
Please click the Next button to set up the filters. First, select either AND or OR criteria, and then choose the filters. Emails that match the selected filters will be listed in the investigation report.
To start an Investigation, you need one of the integrations in the Mail Configuration menu, or you need the Phishing Reporter Desktop plugin installed.
We will explain the Details function in the Action menu on Incident Responder > Investigation. By clicking the Details button, you can access the details of an Investigation already initiated.
After completing the steps of the Manual Investigation initialization process, you will be directed to the “Investigation Details” page. You can view the investigation details from this area. Widgets and mail details are displayed here.
Information summarizing the Investigation process can be viewed from the Widgets section.
The details are outlined in the table below.
On the left side of the Investigation Details page, you can see which folder contained the detected emails that met the search parameters. The table below includes a description of each folder's purpose.
The details of the fields in Found Users on the left menu of the report page is described in detail in the table below.
This section explains how you can easily search for any of the suspicious emails reported to the system in the Incident Responder menu. In the left menu, go to Incident Responder > Reported Emails.
After clicking on the three dots (“︙”) under the Actions, click on the Investigate button and you can start an investigation for the reported emails. The platform automatically extracts the fields from the reported email's analysis results and defines them in the investigation filters, so you don't need to set them manually.
This tutorial explains the functions on Incident Responder > Investigation. Users will learn how to handle Investigations and carry out Incident Response processes.
A: The criteria works with either AND/OR logic, both options are supported.
A: Yes, Investigation can be launched on Outlook, O365, Exchange, Google Workspace and Phishing Reporter Outlook Desktop users at the same time.
A: The status of the Investigation will be Expired. However if the Investigation is completed within the specified time frame, the status will be Finished.
A: If the relevant user becomes online again, the investigation continues from where it left off.
A: No, you cannot. Platform administrators are only able to see the Subject, To, From, Sender Name and whether the relevant email has an Attachment in the details of their investigations.
A: Emails that are permanently deteled can be recovered from the "Recover Deleted Items" menu on Outlook within 14 days.
A: All logs can be accessed in the Audit menu.
A: No, the investigation cannot be started because the add-in will be closed when Outlook is closed. In order for Investigation to start, the user's Outlook account must be active and the add-in must be running.
Investigation name
The name of the initiated Investigation.
Trigger
Indicates the initialization status of the Investigation. (E.g., Manual Investigation, Auto Investigation)
Status
The status information of the investigation. (E.g., Finished, Expired or Running)
Date Created
The date when the investigation was started.
Expiry Date
The date when the investigation was completed.
User Status
A summary on how many users the investigation was completed and on how many it was not.
Progress
This is the completion status of the investigation as a percentage. When it is completed, it is displayed as "Completed".
Action
Investigation details are available here. The investigation can be stopped with the “Stop Action ■” button.
Investigation Name
The Investigation name is set and only visible to the administrator. If not changed, the name investigation will be the creation date by default
Target Users
The user(s) you will start the investigation with are determined from this field.
With the All Users option, investigation is started for all target users who installed the suspicious email reporter add-in.
With the User Group option, investigation is started by selecting specific target user groups.
With Specific Users, investigation is started on specific target users
Email Date Range
It is the date range information that emails will be scanned.
Select Sources
You can specify the source(s) for the investigation.
Duration
You can determine how long the initiated investigation will be active.
Action
As a result of the investigation, an action can be defined when the relevant email is detected. Warning labels can be sent to emails found with the Notify user only option. The message to be sent can be determined from the "Message" field. Using the Move to trash option emails found can be moved to the Trash.
With the Delete email option, emails found can be permanently deleted.
AND / OR
Select which option you wish to start the investigation with.
Filters
Add any of the following conditions:
Header:
Subject: Search based on the email's subject line.
From: Search based on the email's sender or "from" address.
To: Search based on the email's recipient(s).
CC: Search based on email addresses in the CC field.
BCC: Search based on email addresses in the BCC field.
Sender Name: Search based on the name of the sender.
IP Address: Search based on the sender's IP address.
Body:
Keyword: Search for specific words or phrases in the email body.
URL: Search for specific web addresses or URLs in the email body.
Regex: Use regular expressions to define complex search patterns in the email body.
Attachment:
File Name: Search for emails with specific attachment file names.
File Size: Search for emails with attachments of a particular size.
File Extension: Search for emails with attachments of specific file types such as ".pdf, .html, .mp4"
SHA512: Search for emails with attachments that have a specific SHA-512 hash value.
MD5: Search for emails with attachments that have a specific MD5 hash value.
Investigation Status
There are 3 different investigation statuses: 1- Running status: It means that the Investigation that has been started is continuing. 2- Finished status: It means that the investigation is completed for all users within a certain period of time. 3- Expire status: It means that the time set for investigation has expired.
Users (Could not be scanned)
The number or status of users where Investigation cannot be done for any reason.
Scanned Users
The information on how many users the Investigation was launched in total.
Emails Scanned
The information on how many emails Investigation was launched and scanned.
Duplicate
It allows an easy way to copy and recreate the investigation criteria.
Expiry Time
Indicates in which interval the investigation will run and on what date it will end. The date is specified with the Duration feature where admin can change before starting an investigation.
Found Users
The information and progress on which users the investigation was carried out and how many user inboxes were searched can be viewed in detail.
Folders
Under the Folders field, there are Inbox, Junk, Draft, Sent, Deleted Items and Others fields.
Inbox
The email that is detected in the users’ inbox after the scan.
Junk
The email that is detected in the users’ junk box after the scan.
Draft
The email that is detected in the users’ email draft after the scan.
Sent
The email that is detected in the users’ sent box after the scan.
Deleted Items
The email that is detected in the users’ deleted items after the scan.
Others
The email that is detected in the users’ other custom folders after the scan.Veritas Enterprise Vault.
Stored
The email that is detected in the Veritas Enterprise Vault after the scan.
Owner
The onwer of the email box the incident is found in.
From
The email of the sender of the reported email.
To
The email of the reported email reciever.
Sender Name
The name of the reciever of the reported email.
Subject
The subject information of the reported email.
Attachment
Record of if an attachment is included in the reported email.
Source
The information on which source (Outlook, O365, Exchange or Google Workspace) the investigation was made.
Filter
If one or more of your search criteria has been met.
Status
The status of the reported email.
Trash Can (Actions)
Delete the reported email from the users inbox.
Warning Sign (Actions)
Send user a warning message about the reported email.