Analyzing alerts

This guide provides step-by-step instructions for analyzing Quarantine and EmployeeShield alerts as well as Phish911 reports utilizing the Graphus investigate dialog box.

Investigate dialog box

When Graphus takes action related to one of the protection methods, it creates an alert in the applicable alert table. This is an example of the Quarantine alert table.

The Investigate dialog box is displayed when clicking the Date Created link in one of the alert tables. The dialog box provides you with a variety of tools for investigating Quarantine, EmployeeShield, and Phish911 alerts.

Alert Details

The Alert Details tab is a good place to start your investigation as it summarizes the alert and indicates the reason Graphus created the alert.

NOTE  The Phish911 alert table does not include the Alert Details tab.

The key fields are the following:

  • Category: Indicates the attack category as determined by Graphus.
  • Indicator: Provides the reason Graphus took action on this specific email.
  • Quarantined: Shows if the email is still quarantined.

Events table

The Events table tracks the date and time alert-related events occurred. Events include the following:

  • User chose to reply
  • Opened by user
  • Quarantined by admin
  • Admin reported false+ve (false positive)
  • Automatically quarantined by system
  • Quarantined by user
  • User chose to investigate
  • Un-Quarantined by admin
  • Automatically closed by system
  • Created
  • User reported false+ve (false positive)
  • Closed

EmployeeShield Feedback table

The feedback table appears in the EmployeeShield alert table and provides information regarding actions taken on the banner by the recipient.

The possible actions that will appear in the Feedback column:

  • Warning banner read by the recipient
  • Original message viewed
  • Original message deleted
  • Warning banner deleted by the recipient
  • Warning banner archived by the recipient


MetaData

The MetaData tab displays important data about the email itself. This includes sender data such as the Sender Name, Sender Email Address and Return Path Address.

In the Authentication Results section, you can see whether the email passed or failed the authentication protocol. Failing authentication is a strong indication that the email may have been spoofed.

The sender's country of origin and the IP address of the server's Mail Transfer Agent (MTA) are conveyed in the Sender MTA section.

The Recipient's section shows the list of email recipients, any URLs or attachments the email contains, and the current folder in which the email is located.

Email Header

Detailed metadata information can be found on the Email Header tab via an API call into the recipient's inbox. This includes specific details about the path the email took to arrive.

Safe View

The text-only version of the actual email is displayed on the Safe View tab via an API call into the recipient's inbox.

Original View

The Original View tab shows the email the same way the recipient would see it, meaning with images, formatting, links, etc. This is done via an API call into the recipient's inbox.

Sandbox

On the Sandbox tab, you can submit the URLs or attachments from the email to a network of well-known anti-virus providers. Graphus will never submit your original files. It only submits hashes of your files. If the file comes back as unknown or unrated, you can submit the file manually outside of Graphus to a provider of your choice.

NOTE  The Sandbox tab will only be visible in the dialog box if the email includes a URL or attachment. The processing of a URL or attachment might take a few minutes. If you don't see any results after clicking the Retrieve Results button, wait and try it again a little bit later.

Notes

Any comments entered are displayed on this tab. You can enter your own comments notes regarding your investigation in the Notes field and then click Add Comment.

Smart Investigate

Some analysts may not be familiar with all the details in an alert during an investigation. As a result, they may perform additional research using online tools but are not always equipped to frame questions in a way that returns clear and useful information. Smart Investigate provides an AI-driven interface with preloaded, one-click questions. Based on the attack category determined by Graphus and the reason Graphus quarantined the email, Smart Investigate automatically curates relevant queries and includes alert-specific metadata to deliver clear, actionable feedback.

IMPORTANT  The Smart Investigate feature is available only when investigating system-quarantined alerts on the Quarantine page.

Smart Investigate tab

The Smart Investigate tab lists the threat category name and the relevant questions in the left pane. Clicking a question displays key alert information in the right pane. This example shows the contents of the Smart Investigate tab for an Executive Spoofing threat. The second question is selected, displaying its specific answers.

Key considerations

  • Information appears on the Smart Investigate tab for system-quarantined alerts generated only after the feature was enabled.
  • For older alerts or alerts without available questions and feedback, the tab indicates that no analytics are available.
  • While the sections and criteria remain consistent across attack categories and questions, the displayed information is tailored for each specific alert.
  • If Graphus determines that more than one attack category applies to the email, each category and its associated questions is listed in the left pane.

The following table describes the alert information sections. The example column content is from an alert for the Malicious Sender category.

Section Criteria Example
Verdict
  • Summary: Provides a brief explanation of why the email was quarantined.

  • Summary: This email was blocked because it seems to originate from someone impersonating a SharePoint notification, which is a common tactic used in phishing attacks. The sender has a history of sending such malicious emails.

Key Risk Indicators
  • Authentication Failures: Indicates whether SPF, DKIM, and DMARC checks passed or failed.

  • Suspicious Technical Indicators: Evaluates the trustworthiness of the IP address.

  • Content Based Red Flags: Identifies suspicious attachments or URLs.

  • Reputation Intelligence Matches: Provides sender reputation details.

  • Authentication Failures: None identified. SPF, DKIM, and DMARC passed.
  • Suspicious Technical Indicators: The sender's IP is a legitimate Google server with no geolocation issues.

  • Content Based Red Flags: The email contains a suspicious URL that may lead to phishing.

  • Reputation Intelligence Matches: The sender has been previously associated with phishing attacks.

Technical Deep Dive
  • Email Authentication Analysis: Provides a detailed review of authentication factors.

  • Infrastructure Assessment: Identifies the sending IP address and associated service.

  • Content Examination: Provides additional content details.

  • Behavioral Patterns: Describes factors that triggered the quarantine of the email.

  • Rule Logic Analysis: Describes specific detection reasoning.

  • Email Authentication Analysis: SPF, DKIM, and DMARC passed successfully, confirming the legitimacy of the sender's domain. However, the sender's reputation raises concerns.
  • Infrastructure Assessment: The sending IP (2607:f8b0:4864:20::429) belongs to Google, indicating that the email is sent from a legitimate source but may not be from a legitimate user.

  • Content Examination: The email does not contain attachments, but it includes one URL that may be suspicious. The content implies a SharePoint notification, which is a common phishing lure.

  • Behavioral Patterns: The email showcases tactics such as impersonating trusted services and providing links that may lead to credential harvesting sites.

  • Rule Logic Analysis: The system flagged this email as malicious due to the sender's prior involvement in phishing attacks and the content's nature indicating SharePoint impersonation.

Risk Assessment
  • Immediate Threats: Explains the potential threats if the email were to reach users.

  • Attack Vector: Assesses the potential breadth of the attack.

  • Target Profile: Describes the intended victims.

  • Immediate Threats: If the email reached users, they could be tricked into providing credentials or downloading malware from the provided URL.
  • Attack Vector: This email fits into a broader strategy of targeting users by leveraging familiar enterprise tools to gain access to sensitive information.

  • Target Profile: The intended victims are likely employees using SharePoint, targeting those who are less cautious about unsolicited communication.

Recommended Actions
  • Containment: Advises actions to take on the quarantined email and future emails from the sender.

  • Investigation: Provides suggestions for further analysis of the sender, IP address, or similar emails.

  • User Communication: Provides recommendations for notifying users.

  • Security Measures: Offers recommendations for new security measures, such as improving policies and additional training.

  • Containment: Quarantine the email and block the sender's domain temporarily while further analysis is conducted.
  • Investigation: Conduct a deeper investigation into the sender's previous emails and accounts to ascertain ongoing threats.

  • User Communication: Inform users about the phishing attempt and encourage them to report similar emails.

  • Security Measures: Review and enhance email filtering rules to catch similar phishing attempts more effectively in the future.

Here are more examples of the Smart Investigate tab for various attack categories.

EXAMPLE  This example shows the contents of the Smart Investigate tab for a Phishing threat. The alert specific information is displayed for the question "What signs made this email appear to be phishing?"

EXAMPLE  This example shows the contents of the Smart Investigate tab for an alert with two attack categories: Malicious Attachment and Empty Subject and Body. The alert specific information is displayed for the question "Why was this email flagged for having no subject or body?"

NOTE  Smart Investigate functionality is also available on the Message ID page.

How to...