Workflow Detail

Email Rule Change

Detects creation of suspicious or risky email forwarding and filtering rules, often used in Business Email Compromise (BEC) attacks. This workflow monitors email rule modifications and alerts on potentially malicious configurations.

How It Works

Fluency's AI monitors email system configurations for suspicious rule changes that could indicate account compromise. The system analyzes rule patterns, forwarding destinations, and timing to identify potential BEC attacks or data exfiltration attempts.

  • Monitors email rule creation and modifications
  • Detects auto-forwarding to external addresses
  • Identifies suspicious filtering patterns
  • Alerts on mass rule changes or risky configurations
  • Provides context on rule impact and potential threats

Feature Comparison

AI Analysis vs Splunk SPL-Based Detection

See how advanced AI-driven security analysis compares to traditional SPL-based detection in key areas of context, logic, and output quality.

Feature / CapabilityAI AnalysisSplunk SPL-Based Detection
IP to location logicAccurate with human-readable locations (Barcelona → Opfikon) and real-world travel distanceBased on iplocation, sometimes inaccurate or outdated; no city-to-city distance context
Device context awarenessThe AI recognize the second IP is from a known AVD endpoint, and distinguish cloud-hosted vs. personal deviceSPL treats IPs as flat values; doesn’t infer context from device names unless explicitly encoded in a lookup
User role logicKnows the user is a subcontractor marked ONLY REMOTE, making virtual desktop infrastructure login expected.SPL cannot infer or evaluate user roles without joining external HR or identity data.
Session analysisThe AI considered whether logins belong to the same session or different contexts (VDI vs. local)SPL can’t link session context unless it’s engineered manually (e.g., through token IDs, session IDs)
False positive suppression logicAdvises suppression based on trusted IP/device combinations, remote work patterns, and device typeRequires custom correlation searches, lookups, or external context ingestion
ML signal interpretationDistinguishes why the alert triggered (ML_NEW_USER, ML_NEW_GEO_ISP) and de-risks based on identity validationSPL will just flag those risks; human/AI interpretation must be layered on top
Analyst judgmentEmulates how a human SOC analyst would reason through intent, identity, and environmentSPL doesn’t support nuanced intent modeling without external logic or ML/UEBA tooling
Output qualityClear, contextual, explainable narrative with defensive recommendationsSPL produces tabular alerts and risk scores; lacks explanation without additional dashboards or notes