IR-001email-securityv1.0.0
Phishing Email Investigation
⚠️ medium⚠️ high
⏱ Est. Time30m
📋 Steps12 steps
🔧 Tools5 required
🔗 Integrations5 platforms
📊 Avg Resolution45m
🔧 Tools Required
email gatewayedrsiemthreat intelligence platformurl sandbox
⚡ Triggers
email_security_alertuser_reported_phishinganti-phishing_gateway_blocksiem_correlation_rule
🔌 Integrations
req
defender for o365
Microsoft Defender for Office 365 — Threat Explorer and quarantine management
opt
proofpoint tap
Proofpoint Targeted Attack Protection — alternative email security gateway
opt
crowdstrike falcon
Endpoint telemetry for recipients who may have clicked links
opt
splunk
Correlation across email, proxy, and endpoint logs
req
virustotal
URL and hash reputation lookups for IOC extraction
Click each step to expand the full procedure, automation hints, and expected outputs.