Incident Responder: Investigations
This document displays the functions of the Incident Responder > Investigation section. You will learn how to handle Investigations and carry out Incident Response processes.
- Starting an investigation
- Auto
- Manual
- Investigation Detail
- Start an Investigation from a Reported Email
- FAQ
- Up Next: Integrations
Investigation name
|
The name of the initiated Investigation.
|
Trigger
|
Indicates the initialization status of the Investigation. (E.g., Manual Investigation, Auto Investigation)
|
Status
|
The status information of the investigation. (E.g., Finished, Expired or Running)
|
Date Created
|
The date when the investigation was started.
|
Expiry Date
|
The date when the investigation was completed.
|
User Status
|
A summary on how many users the investigation was completed and on how many it was not.
|
Progress
|
This is the completion status of the investigation as a percentage. When it is completed, it is displayed as "Completed".
|
Action
|
Investigation details are available here. The investigation can be stopped with the “Stop Action ■” button.
|
Starting an investigation 🔎
ℹ️ Auto Investigation starts automatically by default as a result of a malicious email analysis.
Investigation Name
|
The Investigation name is set and only visible to the administrator. If not changed, the name investigation will be the creation date by default
|
Target Users
|
The user(s) you will start the investigation with are determined from this field.
With the All Users option, investigation is started for all target users who installed the suspicious email reporter add-in.
With the User Group option, investigation is started by selecting specific target user groups.
With Specific Users, investigation is started on specific target users
|
Filters
|
Define the criteria for investigation. Emails matching any of the criteria will be searched on the user's email account. Filters can be switched between AND and OR before starting an investigation.
|
Email Date Range
|
It is the date range information that emails will be scanned.
|
Select Sources
|
You can specify the source(s) for the investigation.
|
Duration
|
You can determine how long the initiated investigation will be active.
|
Action
|
As a result of the investigation, an action can be defined when the relevant email is detected. Warning labels can be sent to emails found with the Notify user only option. The message to be sent can be determined from the "Message" field. Using the Move to trash option emails found can be moved to the Trash.
With the Delete email option, emails found can be permanently deleted.
|
ℹ️ To start an Investigation, you need one of the integrations in the Mail Configuration menu, or you need the Phishing Reporter Desktop plugin installed.
Investigation Status
|
There are 3 different investigation statuses:
1- Running status: It means that the Investigation that has been started is continuing.
2- Finished status: It means that the investigation is completed for all users within a certain period of time.
3- Expire status: It means that the time set for investigation has expired.
|
Users (Could not be scanned)
|
The number or status of users where Investigation cannot be done for any reason.
|
Scanned Users
|
The information on how many users the Investigation was launched in total.
|
Emails Scanned
|
The information on how many emails Investigation was launched and scanned.
|
Duplicate
|
It allows an easy way to copy and recreate the investigation criteria.
|
Expiry Time
|
Indicates in which interval the investigation will run and on what date it will end. The date is specified with the Duration feature where admin can change before starting an investigation.
|
Found Users
|
The information and progress on which users the investigation was carried out and how many user inboxes were searched can be viewed in detail.
|
Folders
|
Under the Folders field, there are Inbox, Junk, Draft, Sent, Deleted Items and Others fields.
|
Inbox
|
The email that is detected in the users’ inbox after the scan.
|
Junk
|
The email that is detected in the users’ junk box after the scan.
|
Draft
|
The email that is detected in the users’ email draft after the scan.
|
Sent
|
The email that is detected in the users’ sent box after the scan.
|
Deleted Items
|
The email that is detected in the users’ deleted items after the scan.
|
Others
|
The email that is detected in the users’ other custom folders after the scan.Veritas Enterprise Vault.
|
Stored
|
The email that is detected in the Veritas Enterprise Vault after the scan.
|
Owner
|
The owner of the email box the incident is found in.
|
From
|
The email of the sender of the reported email.
|
To
|
The email of the reported email reciever.
|
Sender Name
|
The name of the reciever of the reported email.
|
Subject
|
The subject information of the reported email.
|
Attachment
|
Record of if an attachment is included in the reported email.
|
Source
|
The information on which source (Outlook, O365, Exchange or Google Workspace) the investigation was made.
|
Filter
|
If one or more of your search criteria has been met.
|
Status
|
The status of the reported email.
|
Trash Can (Actions)
|
Delete the reported email from the users inbox.
|
Warning Sign (Actions)
|
Send user a warning message about the reported email.
|
Start an Investigation from a Reported Email
Frequently Asked Questions
Q. Which operator (AND / OR) logic do the criteria (determined when starting the investigation) work among themselves?
A. The criteria works with either AND/OR logic, both options are supported.
Q. Can an Investigation be started on all sources at the same time?
A. Yes, Investigation can be launched on Outlook, O365, Exchange, Google Workspace and Phishing Reporter Outlook Desktop users at the same time.
Q. What happens if the scope of the Investigation is large and is not completed within the specified time frame?
A. The status of the Investigation will be Expired. However if the Investigation is completed within the specified time frame, the status will be Finished.
Q. What happens to the progress of Investigation if the user that the investigation was made on goes offline while the investigation is being done on the Outlook source?
A. If the relevant user becomes online again, the investigation continues from where it left off.
Q. Can I read emails in the mailbox of a user while I am doing an investigation?
A. No, you cannot. Platform administrators are only able to see the Subject, To, From, Sender Name and whether the relevant email has an Attachment in the details of their investigations.
Q. Can emails that are permanently deleted be restored?
A. Emails that are permanently deteled can be recovered from the "Recover Deleted Items" menu on Outlook within 14 days.
Q. How can I view the logs related to this product?
A. All logs can be accessed in the Audit menu.
Q. Can Investigation be started for Outlook Desktop users that are 'offline'?
A. No, the investigation cannot be started because the add-in will be closed when Outlook is closed. In order for Investigation to start, the user's Outlook account must be active and the add-in must be running.
Next Up: Integrations
The next section explains the functions of Incident Responder > Integrations. The Incident Responder product can be used to perform simple tasks like adding a new integration, modifying, deactivating, and deleting the existing integration.