ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™

  • ID: DT140
  • Created: 12th August 2025
  • Updated: 12th August 2025
  • Contributor: The ITM Team

Microsoft Defender, Creation of Forwarding/Redirect Rule

The following detection is a default alert policy that should be enabled in all tenants automatically.

 

To view this alert policy, access the Microsoft Defender portal at https://security.microsoft.com, go to Email & collaboration > Policies & rules > Alert policy. Or, to go directly to the Alert policy page, use https://security.microsoft.com/alertpoliciesv2.

 

This rule will generate an alert when a forwarding/redirect rule is created within Exchange or OWA.

Sections

ID Name Description
IF010Exfiltration via Email

A subject uses electronic mail to exfiltrate data.

PR015Email Collection

A subject may target user email to collect sensitive information.

IF010.001Exfiltration via Corporate Email

A subject exfiltrates information using their corporate-issued mailbox, either via software or webmail. They will access the conversation at a later date to retrieve information on a different system.

PR015.003Email Forwarding Rule

The subject creates an email forwarding rule to transport any incoming emails from one mailbox to another.

AF012.002Hide Emails With Rules

A subject may utilize email rules can be used to automatically move emails from an inbox to obscure locations, with the goal of hiding them from immediate view, delaying identification.