Malicious inbox rules
Rules moving replies to RSS Subscriptions, Junk, or hidden folders. Classic BEC staging. Surfaced within minutes of creation.
Microsoft 365 Managed Detection and Response (MDR) for UK SMBs
It's almost never a zero-day. It's an inbox rule sending supplier replies to RSS Subscriptions. A forwarder nobody noticed. A malicious OAuth grant approved three months ago. Managed Detection & Response for Microsoft 365, built for how SMBs actually get compromised.
The top detections that pay for MDR every single month. None of them are glamorous. All of them are common.
Rules moving replies to RSS Subscriptions, Junk, or hidden folders. Classic BEC staging. Surfaced within minutes of creation.
Mail auto-forwarded to external addresses. Often configured during a brief compromise window and forgotten for months.
Enterprise apps granted invasive permissions. Third-party consent phishing. Revoked and reported.
SharePoint/OneDrive mass-share events, Teams external guest spikes, anonymous link creation on sensitive sites.
New Global Admins, Conditional Access policy tampering, break-glass account use, dormant admins waking up.
Defender for O365, Identity and Endpoint signals correlated into one SOC view. One alert, not six.
2-day tenancy audit. Existing OAuth grants reviewed, dormant admins flagged, forwarders inventoried, inbox-rule register captured. The "before" picture.
Detection pack deployed. Defender policies tuned. Alerts piped to SOC. Auto-response rules pre-authorised for the high-volume, low-risk actions (rule delete, forwarder remove, session revoke).
Monthly threat hunts — OAuth drift, sharing anomalies, impossible travel clusters, risky apps. Findings categorised, triaged, remediated.
Plain-English monthly report: incidents, near-misses, posture drift, what changed, what to approve. The thing you'd actually read in a board meeting.
The biggest financial losses SMBs see from cyber aren't ransomware — they're invoice fraud and CEO fraud, enabled by small, quiet changes to a mailbox weeks before the attack happens. Managed MDR for M365 watches those quiet changes so they surface before the money moves.
ITDR focuses on identity. M365 MDR goes deeper into the tenancy — mailbox-level persistence, SharePoint access patterns, Teams guest abuse, Defender for O365 alerts. We run both; they share the same SOC and the same response.
No. MDR works across Business Premium upwards. E5 gives us richer telemetry, but most detections we rely on — mailbox rules, OAuth, audit log, sign-in risk — are available at Business Premium.
Most common patterns: invoice fraud preparation (rules that hide replies to the attacker), payroll fraud (forwarders to external), supplier impersonation (lookalike domains), and delegated mailbox abuse.
Yes, for pre-authorised actions: disable rules, remove forwarders, revoke OAuth grants, kill sessions, disable accounts. Higher-impact actions (removing mail, blocking domains) are SOC-human confirmed.
Copilot interactions are monitored through the M365 audit log. Unusual queries, access attempts to sensitive sites, and abnormal prompt volumes all surface. Policy guidance included.
Yes. MDR catches post-delivery compromise. Email security catches pre-delivery — phishing, BEC, malware attachments, impersonation. Both layers, same SOC.
The identity layer. Token theft, MFA fatigue, sign-in anomalies. Same SOC, correlated detections.
Read more 02Pre-delivery layer. Phishing, BEC, impersonation, attachment sandboxing, DMARC enforcement.
Read more 03MDR runs best on a well-run tenancy. Day-to-day management of M365, Entra and endpoints.
Read more30-minute read-only audit of your M365. You'll see the OAuth grants, risky forwarders and admin drift you almost certainly have. Whether or not you hire us.