<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integration Office 365: Get mail reported by user in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/528421#M1708</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;finally I did what I needed using MS Defender integration.&lt;/P&gt;
&lt;P&gt;Using this integration, the incidentes fetched have the messageid and, using ews-search-mailbox with this messageid and the mailbox, i can get the message. I can also use the "Microsoft 365 Defender - Threat Hunting Generic" or "&lt;SPAN&gt;Get Original Email - EWS v2"&amp;nbsp;&lt;/SPAN&gt;Playbook to have more information or the message in EML format.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Office API and its integrations are, sometimes, difficult to manage and understand... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards!&lt;/P&gt;
&lt;P&gt;M.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Jan 2023 22:12:26 GMT</pubDate>
    <dc:creator>MTubia</dc:creator>
    <dc:date>2023-01-24T22:12:26Z</dc:date>
    <item>
      <title>Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/523320#M1493</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;one question about O365 integration. Maybe it's a O365 question, not a XSOAR one, but I'd like to know if I can do it with XSOAR.&lt;/P&gt;
&lt;P&gt;I have an alert "Email reported by user as malware or phish" from Microsoft Graph Identity and Access integration. I have this data from the alert:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[{"aadUserId":null,"accountName":"xxxx.yyyy","domainName":"xxxxxx.com","emailRole":"unknown","isVpn":null,"logonDateTime":null,"logonId":null,"logonIp":null,"logonLocation":null,"logonType":null,"onPremisesSecurityIdentifier":null,"riskScore":null,"userAccountType":null,"userPrincipalName":"xxxxxx.yyyyyyy@xxxxxx.com"},{"aadUserId":null,"accountName":"Resilinc Partner Relations \xxxxxxx","domainName":"zzzzz.com\u003e","emailRole":"sender","isVpn":null,"logonDateTime":null,"logonId":null,"logonIp":"111.222.333.444","logonLocation":null,"logonType":null,"onPremisesSecurityIdentifier":null,"riskScore":null,"userAccountType":null,"userPrincipalName":"Resilinc Partner Relations \xxxxxxx@zzzzz.com\u003e"},{"aadUserId":null,"accountName":"xxxxxx.yyyyyyy","domainName":"xxxxxx.com","emailRole":"recipient","isVpn":null,"logonDateTime":null,"logonId":null,"logonIp":null,"logonLocation":null,"logonType":null,"onPremisesSecurityIdentifier":null,"riskScore":null,"userAccountType":null,"userPrincipalName":"xxxxxx.yyyyyyy@xxxxxx.com"}]&lt;/LI-CODE&gt;
&lt;P&gt;I need to get the original mail that the user reported as malicious, but from the alert I have not any message Id or similar.&lt;/P&gt;
&lt;P&gt;I have searched using the from and to fields, but it's not the right query.&lt;/P&gt;
&lt;P&gt;Do you know how can I get the source e-mail? I have browsed the MS documentation but found nothing, and I don't know all the commands for XSOAR, maybe you know "any trick"...&lt;/P&gt;
&lt;P&gt;Thanks for your help!!&lt;/P&gt;
&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2022 17:22:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/523320#M1493</guid>
      <dc:creator>MTubia</dc:creator>
      <dc:date>2022-12-05T17:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/524754#M1563</link>
      <description>&lt;P&gt;I'm not 100% sure, but I have strong doubts that the Graph integration / Microsoft SecurityCenter platform has this functionality. You can use the EWS O365 integration for this.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 12:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/524754#M1563</guid>
      <dc:creator>EspenAbildgaard</dc:creator>
      <dc:date>2022-12-21T12:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/525605#M1583</link>
      <description>&lt;P&gt;We set-up the report message add-in to send a duplicate in attachment to our phishing mailbox since you are unable to fetch an email that has been soft or hard deleted.&lt;/P&gt;
&lt;P&gt;We use the Network Message ID from the alert to search the email in the phishing mailbox, extract the mail from attachment and process it as seen below:&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp;&lt;SPAN&gt;ews-search-mailbox (EWSO365)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp;&lt;SPAN&gt;ews-get-attachment (EWSO365)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp;&lt;SPAN&gt;Process Email - Generic v2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 319px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46587iB20B43A870771748/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 15:08:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/525605#M1583</guid>
      <dc:creator>Joachimb</dc:creator>
      <dc:date>2023-01-02T15:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/526596#M1616</link>
      <description>&lt;P&gt;Thanks for your help!!&amp;nbsp;I've been a bit stuck researching this. The problem is that if I search the mailbox (with from-to-date filters), I can get several results, and I cannot be sure which mail has been involved in the alert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been reading about the Hunting capacities in MS Defender addon (&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/microsoft-365-defender#microsoft-365-defender-advanced-hunting" target="_blank"&gt;https://xsoar.pan.dev/docs/reference/integrations/microsoft-365-defender#microsoft-365-defender-advanced-hunting&lt;/A&gt;). I'll post anything if I get any result...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;M.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 23:40:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/526596#M1616</guid>
      <dc:creator>MTubia</dc:creator>
      <dc:date>2023-01-10T23:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/528421#M1708</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;finally I did what I needed using MS Defender integration.&lt;/P&gt;
&lt;P&gt;Using this integration, the incidentes fetched have the messageid and, using ews-search-mailbox with this messageid and the mailbox, i can get the message. I can also use the "Microsoft 365 Defender - Threat Hunting Generic" or "&lt;SPAN&gt;Get Original Email - EWS v2"&amp;nbsp;&lt;/SPAN&gt;Playbook to have more information or the message in EML format.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Office API and its integrations are, sometimes, difficult to manage and understand... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards!&lt;/P&gt;
&lt;P&gt;M.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 22:12:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/528421#M1708</guid>
      <dc:creator>MTubia</dc:creator>
      <dc:date>2023-01-24T22:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Integration Office 365: Get mail reported by user</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/580478#M3147</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The customer received a notification email from Microsoft saying that they have telemetry data originating from the XSOAR EWS O365 integration that we use, is accessing MS Teams data. They will proceed to block such traffic in early April 2024 without exception. In that telemetry data they are seeing 'Get-Folder' executions against MS Teams data specifically. In looking up the EWS O365 integration documentation (&lt;/SPAN&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/ewso365" target="_blank" rel="noopener" data-aura-rendered-by="39131:0"&gt;https://xsoar.pan.dev/docs/reference/integrations/ewso365&lt;/A&gt;&lt;SPAN&gt;) there is no detail about it accessing MS Teams data. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I would like to clarify and confirm : &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1) Is the EWS O365 integration accessing MS Teams data ? Does it use 'Get-Folder' executions ? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2) If the answer to the #1 is yes, when the traffic block occurs in April 2024, will it have a negative impact on the EWS O365 integration which we currently use to send/retrieve emails and move emails to different folders within a specific mailbox ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please assist.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:19:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/integration-office-365-get-mail-reported-by-user/m-p/580478#M3147</guid>
      <dc:creator>assubramania</dc:creator>
      <dc:date>2024-03-15T07:19:16Z</dc:date>
    </item>
  </channel>
</rss>

