The original post: /r/cybersecurity by /u/Fit_Presence_7055 on 2024-11-18 19:50:51.
Hey All,
Since mail rules are one vector of bad actor persistence, do you guys use Powershell to find suspicious rules? If so, do you mind sharing what you are doing and looking for?
You must log in or register to comment.