- Sittadel Knowledge Base
- Management Guides
- Microsoft Defender
Investigating Connector Configuration
This guide will allow an administrator to identify if the suspicious connector identified within the alert was intentionally planted for malicious purposes.
- Navigate to the Connectors – Exchange Admin Center portal, locate and select the Connector that has been identified as handling potentially malicious messages by the Suspicious connector activity alert. Once selected you will be able to view the configured settings being applied to the connector that could point to suspect activity dealing with message handling.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.