13.8 Eradication and Verification
Eradication and Verification
Containment stopped the attacker. Eradication confirms every persistence mechanism is removed and the environment is clean. Verification confirms containment is holding over time.
Eradication checklist
Run each query and confirm the expected clean result:
1. Confirm no remaining inbox rules from the attacker:
| |
Replace 198.51.100.10 with the user’s known corporate IP. Any results from unknown IPs indicate additional rules you missed.
2. Confirm no delegate access was granted:
| |
Attackers sometimes grant delegate access to another mailbox they control, creating persistent access without needing the compromised user’s credentials.
3. Confirm no new MFA methods registered by the attacker:
| |
After forcing MFA re-registration, you should see only the legitimate user re-registering from their known device.
Monitoring for re-compromise
Set up a temporary monitoring window. For the next 7 days, run this query daily:
| |
Any successful sign-in from outside the UK during the monitoring window triggers immediate re-investigation. The attacker may attempt to re-compromise the user via a different method (credential replay, SIM swap, social engineering of the help desk).
Rather than running the query manually every day, create a temporary scheduled analytics rule that fires on any non-UK sign-in for the affected user. Set the rule to expire after 7 days. This automates the monitoring without permanent rule clutter.
Verification sign-off
| Check | Expected result | Actual result | Analyst |
|---|---|---|---|
| No attacker IP in non-interactive logs (post-revocation) | Zero events | Confirmed | |
| All malicious inbox rules removed | Zero rules from attacker IP | Confirmed | |
| No mail forwarding configured | No ForwardingSmtpAddress | Confirmed | |
| No OAuth app grants from attack window | Zero new consents | Confirmed | |
| No delegate access granted | Zero new permissions | Confirmed | |
| MFA re-registered by legitimate user only | One registration from known device | Confirmed | |
| 7-day monitoring rule deployed | Rule active | Confirmed |
This checklist is your sign-off document. Every “Confirmed” should have a corresponding query result (screenshot or CSV export) in your evidence file.
Check your understanding
1. Why check for delegate mailbox access in addition to inbox rules and forwarding?