In this module

AD6.1 Why You Need Response Procedures

5-6 hours · Module 6 · Free
Operational Objective
Your Monday review catches a confirmed credential compromise. The sign-in log shows an attacker signed in at 02:00 from Eastern Europe, created inbox forwarding rules, and read 47 emails before you detected it on Monday morning. Your heart rate spikes. What do you do first? If the answer isn't immediately clear — if you have to think about whether to reset the password or revoke sessions first, whether to disable the account or just reset it, whether to check MFA methods before or after the password reset — then you need response procedures. In a real incident, the attacker is still active. Every minute of hesitation is a minute they're reading emails, creating persistence mechanisms, or preparing for the next phase of the attack. Pre-written procedures eliminate hesitation: step 1, step 2, step 3. You follow the checklist, not your instincts.
Deliverable: Understanding of why pre-written response procedures are essential, what the three most common incidents are for IT administrators, and how the procedures in this module connect to the monitoring you built in AD5.
Estimated completion: 20 minutes
THE THREE INCIDENTS YOU WILL FACE COMPROMISED ACCOUNT Attacker has valid credentials Source: AiTM phishing, password spray, credential stuffing, infostealer malware Frequency: 2-5 per year (200-user org) Severity: HIGH — attacker has full access Procedure: AD6.2 PHISHING CLICK User clicked a malicious link Scope: one user or multiple? Impact: credential harvesting, malware Frequency: 5-15 per year Severity: MEDIUM-HIGH — depends on scope Procedure: AD6.3 BEC (BUSINESS EMAIL) Attacker inside the mailbox Reading emails, forwarding financials, impersonating user for fraud Frequency: 1-3 per year Severity: CRITICAL — financial fraud risk Procedure: AD6.4

Figure AD6.1 — The three incidents an IT administrator will face most often. Compromised accounts are the most common (2-5/year for a 200-user org). Phishing clicks are frequent but often contained by Safe Links (5-15/year, most blocked). BEC is less frequent but highest impact (financial fraud risk). Each has a specific procedure in this module.

The cost of improvisation

Research on incident response consistently shows that organizations with pre-written response procedures contain incidents 50-70% faster than those without. The reason isn't that the procedure is technically superior to what an experienced responder would do ad-hoc — it's that the procedure eliminates decision paralysis, ensures nothing is missed, and provides a consistent sequence regardless of who executes it, when it happens, or how stressful the situation is.

Consider the practical difference. Without a procedure, your internal dialogue during a confirmed compromise sounds like: "OK, I need to... should I reset the password first? Wait, if I reset the password, the attacker loses access but so does the user — should I warn them first? Actually, I should revoke the sessions first because the attacker might have an active session. But what if revoking sessions doesn't work because they have a refresh token? And I should check whether they've added MFA methods before I reset the password, otherwise the attacker just re-registers MFA after the reset..."

With a procedure, your internal dialogue is: "Step 1: Revoke all sessions. Step 2: Reset password. Step 3: Review and remove attacker-registered MFA methods. Step 4: Check inbox rules. Step 5: Document." You execute the steps in sequence. Each step takes 1-2 minutes. The entire procedure takes 10-15 minutes. No paralysis, no missed steps, no wondering what comes next.

The sequence matters

The order of steps in a response procedure is deliberate. Consider the compromised account procedure:

Why revoke sessions BEFORE resetting the password: The attacker's active session uses a token that's valid even after a password change. Resetting the password prevents NEW sign-ins but doesn't terminate EXISTING sessions. Revoking sessions first terminates the attacker's current access. Then the password reset prevents them from signing back in.

Why check MFA methods AFTER revoking sessions and resetting the password: If you check MFA methods first, the attacker is still active in the mailbox. If you reset the password before checking MFA, the attacker might see the password reset notification and quickly register a new MFA method on their device. By revoking sessions first (kicking them out) and resetting the password second (preventing re-entry), you have a window to safely review MFA methods without the attacker interfering.

Why check inbox rules AFTER securing the account: Inbox rules are persistence — they continue operating even after the attacker loses access. A forwarding rule created yesterday continues forwarding emails today, tomorrow, and every day until someone removes it. Securing the account (steps 1-3) stops the attacker from creating new persistence. Checking inbox rules (step 4) removes existing persistence.

This sequence wasn't invented theoretically — it was developed through hundreds of real incident responses and refined based on what goes wrong when steps are out of order.

What this module covers

AD6.2 provides the complete compromised account procedure — the 5-step response you execute when the sign-in log confirms a credential compromise. AD6.3 provides the phishing click response — what to do when a user reports clicking a suspicious link or Safe Links shows a click on a confirmed phishing URL. AD6.4 provides the BEC response — the specific additional steps needed when the attacker is using the compromised mailbox for financial fraud.

AD6.5 covers evidence preservation — what to capture before you take containment actions, so the evidence isn't destroyed by the response. AD6.6 covers managed SOC coordination — how to work with an external security team during an active incident. AD6.7 addresses the after-hours decision — what to do when an incident happens outside business hours. AD6.8 covers Microsoft's automatic attack disruption — the system that may contain the attacker before you even know there's an incident. AD6.9 covers documentation — what to record during and after the incident for management reporting and compliance. AD6.10 covers the post-incident review — learning from each incident to improve your procedures and controls.

Each procedure is designed for an IT administrator, not a SOC analyst. The tools are the same ones you've used throughout the course: Entra ID, Exchange Online PowerShell, and the Defender portal. No forensic tools, no KQL, no SIEM — just the Microsoft admin portals with step-by-step instructions.

Pre-incident preparation — do this TODAY

Don't wait for an incident to prepare your response capability. Complete these items now:

1. Test PowerShell connectivity. Run each of these commands and verify they connect without errors:

Connect-MgGraph -Scopes "User.ReadWrite.All","AuditLog.Read.All"
Connect-ExchangeOnline
Connect-IPPSSession

If any command fails, resolve the authentication or module installation issue now. During a real incident, you need these to work first time.

2. Create the scripts directory. Create C:\SecurityScripts\ and save these scripts (you'll build them throughout this module): Preserve-Evidence.ps1, Respond-CompromisedAccount.ps1, Respond-PhishingClick.ps1, BEC-Response-Checklist.md, IncidentReportTemplate.md.

3. Test on a test account. Create a test user (testuser@yourdomain.com). Execute the compromised account procedure against it: revoke sessions, reset password, check MFA methods, check inbox rules. Verify each command works. Delete the test user after testing.

4. Print the procedures. After completing this module, print the three response procedures (AD6.2, AD6.3, AD6.4) and the escalation contact sheet (AD5.10). Pin them next to your monitor. During an incident, you follow the printed checklist — you don't search for a document.

5. Communicate with your manager. "I've built incident response procedures for credential compromise, phishing, and BEC. If I execute these procedures during an incident, it may involve resetting user passwords and temporarily disabling accounts — I'll notify you immediately after containment." This pre-communication prevents surprise when you take containment actions that affect users.

Realistic incident frequency

How often will you actually use these procedures? Based on industry data and the typical M365 E3 environment:

Compromised accounts: 2-5 per year for a 200-user organization. Most are commodity AiTM phishing — automated campaigns that target thousands of organizations simultaneously. Your controls (MFA, CA policies) block most attempts. The ones that get through are what these procedures handle.

Phishing clicks: 5-15 per year that reach your attention (user reports + Safe Links alerts). The majority are blocked by Safe Links — the user clicked but didn't reach the phishing page. 1-3 per year may result in a user actually reaching the phishing page, which triggers the credential compromise assessment.

BEC incidents: 1-3 per year if credential compromises are detected early. BEC is a CONSEQUENCE of credential compromise — the attacker gets in, reads financial emails, and prepares fraud. If you contain compromised accounts quickly (same day via the Monday review), BEC has less opportunity to develop. If compromises go undetected for days, BEC risk increases significantly.

These numbers mean you'll use the AD6.2 procedure 2-5 times per year, the AD6.3 procedure 5-15 times per year (mostly the "blocked" path), and the AD6.4 BEC extension 1-3 times per year. Infrequent enough that you need printed procedures (you won't remember the steps from memory), but frequent enough that the investment in building and practising the procedures is justified.

Response time targets

Set realistic response time expectations:

Incident TypeDetection MethodTarget Response Time
Compromised accountMonday reviewWithin 30 min of review
Compromised accountHigh-severity notificationWithin 1 hour (business hours)
Phishing click (blocked)Monday reviewWithin 7 days (batch close)
Phishing click (reached page)User report or alertWithin 1 hour
BEC indicatorsDuring compromised account responseSame session as AD6.2

These targets are achievable for a solo IT administrator: the Monday review catches most incidents within 7 days. Alert notifications catch high-severity events within hours. The response procedures execute in 15-20 minutes once initiated. Document these targets for your manager — they set expectations and provide accountability.

Compliance Myth: "We're too small for formal incident response procedures — we'll just figure it out when something happens"
Size doesn't determine whether you need procedures — the nature of the threat does. AiTM phishing attacks target organizations of every size. BEC attacks specifically target small and medium organizations because they're more likely to lack formal response procedures. A 50-user company that loses £45,000 to a BEC payment redirect feels the impact more than a 5,000-user enterprise that loses the same amount. The procedures in this module take 30 minutes to read and understand. They take 10-15 minutes to execute during an incident. The alternative — figuring it out under pressure with an attacker actively in your environment — takes longer and produces worse outcomes every time.
Decision point

You discover a confirmed credential compromise at 09:15 on Monday. You know you need to revoke sessions and reset the password, but you're worried about disrupting the user — they're in an important meeting and losing access to M365 would be disruptive. Do you wait until the meeting ends at 10:30?

Option A: Wait until 10:30 — the attacker has probably already done their damage, and 75 minutes won't make a difference.

Option B: Execute the procedure immediately. Contain first, communicate second. The attacker is potentially reading emails and creating persistence RIGHT NOW. Every minute of delay extends their access. Revoke sessions, reset the password, then send the user a brief Teams message: "Your account was secured due to a security event. I'll meet with you after your meeting to explain and help you sign back in." The 75-minute delay could mean 75 more emails read, more forwarding rules created, or a fraudulent payment request sent from the compromised mailbox.

The correct answer is Option B. Incident response doesn't wait for convenience. The user's meeting is disrupted for 5 minutes (re-authentication after session revocation). The attacker's access is terminated immediately. The business impact of a 5-minute authentication disruption is negligible compared to the potential impact of 75 additional minutes of attacker access to the mailbox.

Try it: Assess your current response readiness

Answer these questions to assess your readiness before building the procedures in this module:

1. If you confirmed a credential compromise right now, do you know the exact sequence of steps? (Yes / Roughly / No) 2. Do you know the PowerShell commands to revoke all sessions for a user? (Yes / No) 3. Do you know where to find inbox rules in Exchange admin? (Yes / No) 4. Do you have a document you can hand to your manager explaining what happened? (Yes / No) 5. Do you know who to contact if the incident is beyond your capability? (Yes / Name + contact / No)

If any answer is "No," this module addresses it with a specific procedure, command, template, or contact sheet.

You've confirmed a credential compromise. You know you need to revoke sessions, reset the password, and check MFA. Why is the ORDER of these steps important?
The order doesn't matter — all three steps need to happen regardless — The order matters because the attacker is active. Steps executed in the wrong order leave windows for the attacker to re-establish access.
Revoke sessions first (terminate current access) → reset password (prevent re-entry) → check MFA (remove attacker persistence). Each step closes a specific attack vector in sequence — doing them out of order leaves gaps — Correct. Sessions first terminates the active session. Password second prevents new sign-in. MFA third removes the attacker's ability to re-register authentication after the password reset.
Reset password first because it's the most visible action — Resetting the password first alerts the attacker (they may see the password reset notification in their active session) and doesn't terminate their existing session.
Check MFA first to see if the attacker registered methods — While the attacker is still active in the session, they could register additional MFA methods while you're reviewing the list. Revoke sessions first to stop them from making changes.

You're reading the free modules of M365 Security: From Admin to Defender

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus