Workflow Detail

Email Rule Change

Detects creation of suspicious or risky email forwarding and filtering rules, often used in Business Email Compromise (BEC) attacks. This workflow monitors email rule modifications and alerts on potentially malicious configurations.

How It Works

Fluency's AI monitors email system configurations for suspicious rule changes that could indicate account compromise. The system analyzes rule patterns, forwarding destinations, and timing to identify potential BEC attacks or data exfiltration attempts.

  • Monitors email rule creation and modifications
  • Detects auto-forwarding to external addresses
  • Identifies suspicious filtering patterns
  • Alerts on mass rule changes or risky configurations
  • Provides context on rule impact and potential threats

Protect against BEC attacks with AI-powered detection

Try Fluency Free