you don't have to click a link to fall for a phishing email, you can reply to it with sensitive info not having clicked anything.
i go with message gateway; i also did this kind of work and that's the first thing i would check (see the sender, check header info, check to see if that sender sent emails to anyone else to get ahead of it before anybody else falls for it)
The Authentication logs would be the first system logs that the analyst should check in this scenario. These logs provide information about user authentication events, including login attempts, successful logins, and failed logins. By examining authentication logs, the analyst can identify any suspicious or unauthorized access attempts related to the user who fell for the phishing email.
The analyst would first check:
B. Message gateway logs.
Message gateway logs, such as those from email servers or email security appliances, often contain valuable information about incoming and outgoing emails, including details about email delivery, sender and recipient information, and any actions taken by the gateway, such as quarantining or blocking suspicious emails. These logs can help the analyst identify and investigate the phishing email reported by the user.
Email issue. Check Email logs. The closet option is Mail gateway and I would hope it would keep a log of that email for admin inspection. Ironport and o365 does this.
From all sources, I can gather it is either Authentication, Message Gateway, or DNS. Except for this site, DNS is out. I cannot find a straignt correct answer. Chat GPT answers both, another site has the question listed twice with two different answers.
Message gateway.
The message gateway logs would provide information about the incoming and outgoing emails, including details about the phishing email. It may include information about the sender, recipient, subject, attachments, and other relevant details related to the email's entry point into the organization's email system.
Phishing emails doesnt always have to contain links. Sometimes attacker would pretend someone who needs to verify an identity to update an account and victim needs to reply the requested information. DNS does not apply to that scenario. So to gain some context about the phishing attack, you have to check the email gateway first.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Gino_Slim
Highly Voted 1 year, 11 months agostoneface
Highly Voted 2 years agoAlcpt
1 week, 4 days agoi_bird
1 year, 12 months agodb97
1 year, 12 months agoRonWonkers
1 year, 11 months agoSandon
1 year, 10 months agohamchook
1 year, 1 month agoexamcrammer
11 months, 4 weeks agoAlcpt
Most Recent 1 week, 4 days agocsentry007
1 month, 3 weeks agoJFS_23
1 month, 3 weeks agoJasonMunoz
3 months agoShouqq_examtopics
4 months, 2 weeks agoAspiringNerd
4 months, 3 weeks agoImjusthere00
5 months, 3 weeks agoDrakeMallard
6 months, 1 week agokewokil120
7 months, 1 week ago[Removed]
7 months, 2 weeks agoSusan4041
7 months, 3 weeks agoklinkklonk
8 months agothecheat97
9 months agososa4547
4 months, 1 week agokevgjo
8 months, 2 weeks agoArpilir
9 months, 1 week agoCloudninja117
9 months, 3 weeks ago