Microsoft unusual activity email

broken image
broken image

Using the stolen credentials, the attacker can access the user's Microsoft 365 mailbox, SharePoint folders, or files in the user's OneDrive. With them the attacker can sign in as the original user and perform illicit actions. When someone other than the intended user steals those credentials, the stolen credentials are considered to be compromised.

broken image

What is a Compromised Email Account in Microsoft 365?Īccess to Microsoft 365 mailboxes, data and other services, is controlled by using credentials, for example a user name and password or PIN. Summary Learn how to recognize and respond to a compromised email account in Microsoft 365.

broken image

Responding to a Compromised Email Account