Even after the user regains access to their account, the attacker might have left back-door entries that allow the attacker to resume control of the account.
Do all of the following steps to regain control of the account. Go through the steps as soon as you suspect a problem and as quickly as possible to make sure that the attacker doesn’t resume control of the account. These steps also help you remove any back-door entries that the attacker might have added to the account. After you do these steps, we recommend that you run a virus scan to make sure that the client computer isn’t compromised.
Step 1: Reset the user’s password
Follow the procedures in Reset a business password for someone.
Important
- Don’t send the new password to the user through email, because the attacker still has access to the mailbox at this point.
- Be sure to use a strong password: upper and lowercase letters, at least one number, and at least one special character.
- Even if the password history requirement allows it, don’t reuse any of the last five passwords. Use a unique password that the attacker can’t guess.
- If the on-premises identity is federated with Microsoft 365, you must change the on-premises account password on-premises, and then notify the administrator of the compromise.
- Be sure to update app passwords. App passwords aren’t automatically revoked when you reset the password. The user should delete existing app passwords and create new ones. For instructions, see Create and delete app passwords from the Additional security verification page.
- We highly recommended that you enable multi-factor authentication (MFA) for the account. MFA is a good way to help prevent account compromise, and is very important for accounts with administrative privileges. For instructions, see Set up multi-factor authentication.
Step 2: Remove suspicious email forwarding addresses
- In the Microsoft 365 admin center at https://admin.microsoft.com, go to Users > Active users. Or, to go directly to the Active users page, use https://admin.microsoft.com/Adminportal/Home#/users.
- On the Active users page, find the user account, and select it by clicking anywhere in the row other than the check box next to the name.
- In the details flyout that opens, select the Mail tab.
- The value Applied in the Email forwarding section indicates that mail forwarding is configured on the account.Select Manage email forwarding, clear the Forward all email sent to this mailbox check box in the Manage email forwarding flyout that opens, and then select Save changes.
Step 3: Disable suspicious Inbox rules
- Sign in to the user’s mailbox using Outlook on the web.
- Select Settings (gear icon), enter ‘rules’ in the Search box, and then select Inbox rules from the results.
- On the Rules tab of the flyout that opens, review the existing rules, and turn off or delete any suspicious rules.
Step 4: Unblock the user from sending mail
If the account was used to send spam or a high volume of email, it’s likely that the mailbox has been blocked from sending mail.
To unblock a mailbox from sending email, follow the procedures in Remove blocked users from the Restricted entities page.
Step 5 Optional: Block the user account from signing-in
Important
You can block the account from signing-in until you believe it’s safe to re-enable access.
- Do the following steps in the Microsoft 365 admin center at https://admin.microsoft.com:
- Go to Users > Active users. Or, to go directly to the Active users page, use https://admin.microsoft.com/Adminportal/Home#/users.
- On the Active users page, find and select the user account from the list by doing one of the following steps:
- Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, select Block sign-in at the top of the flyout.
- Select the user by selecting the check box next to the name. Select More actions > Edit sign-in status.
- In the Block sign-in flyout that opens, read the information, select Block this user from signing in, select Save changes, and then select Close at the top of the flyout.
- Do the following steps in the Exchange admin center (EAC) at https://admin.exchange.microsoft.com:
- Go to Recipients > Mailboxes. Or, to go directly to the Mailboxes page, use https://admin.exchange.microsoft.com/#/mailboxes.
- On the Mailboxes page, find and select the user from the list by doing one of the following steps:
- Select the user by clicking anywhere in the row other than the round check box that appears next to the name.
- Select the user by selecting the round check box that appears next to the name, and then selecting the Edit action that appears on the page.
- In the details flyout that opens, do the following steps:
- Verify the General tab is selected, and then select Manage email apps settings in the Email apps & mobile devices section.
- In the Manage settings for email apps flyout that opens, disable all of the available settings by changing the toggles to Disabled:
- Outlook desktop (MAPI)
- Exchange Web Services
- Mobile (Exchange ActiveSync)
- IMAP
- POP3
- Outlook on the web
Step 6 Optional: Remove the suspected compromised account from all administrative role groups
Note
You can restore the user’s membership in administrative role groups after the account has been secured.
- In the Microsoft 365 admin center at https://admin.microsoft.com, do the following steps:
- Go to Users > Active users. Or, to go directly to the Active users page, use https://admin.microsoft.com/Adminportal/Home#/users.
- On the Active users page, find and select the user account from the list by doing one of the following steps:
- Select the user by clicking anywhere in the row other than the check box next to the name. In the details flyout that opens, verify the Account tab is selected, and then select Manage roles in the Roles section.
- Select the user by selecting the check box next to the name. Select More actions > Manage roles.
- In the Manage admin roles flyout that opens, do the following steps:
- Record any information that you want to restore later.
- Remove administrative role membership by selecting User (no admin center access).
- In the Microsoft 365 Defender portal at https://security.microsoft.com, do the following steps:
- Go to Permissions > Email & collaboration roles > Roles. Or, to go directly to the Permissions page, use https://security.microsoft.com/emailandcollabpermissions.
- On the Permissions page, select a role group from the list.
- Look for the user account in the Members section of the details flyout that opens. If the role group contains the user account, do the following steps:
- In the Members section, select Edit.
- On the Choose members tab of the flyout that opens, select Edit.
- In the Choose members flyout that opens, select Remove.
- In the Members section that appears, select the user account by selecting the check box next to the name, select Remove, and then select Done.
- In the Editing Choose members flyout, select Save.
- In the role group details flyout, select Close.
- Repeat the previous steps for each role group in the list.
- In the Exchange admin center at https://admin.exchange.microsoft.com/, do the following steps:
- Go to Roles > Admin roles. Or to go directly to the Admin roles page, use https://admin.exchange.microsoft.com/#/adminRoles.
- On the Admin roles page, select a role group from the list by clicking anywhere in the row other than the round check box that appears next to the name.
- In the details flyout that opens, select the Assigned tab, and then look for the user account. If the role group contains the user account, do the following steps:
- Select the user account.
- Select the Delete action that appears, select Yes, remove in the warning dialog, and then select Close at the top of the flyout.
- Repeat the previous steps for each role group in the list.
Step 7 Optional: Additional precautionary steps
- Verify the contents of the Sent items folder of the account in Outlook or Outlook on the web.You might need to inform people in your contacts list that your account was compromised. For example, the attacker might have sent messages asking your contacts for money, or the attacker might have sent a virus to hijack their computers.
- The accounts for any other services that use this account as an alternative email account might have also been compromised. After you do the steps in this article for the account in this Microsoft 365 organization, do these steps for your other accounts.
- Verify the contact information (for example, telephone numbers and addresses) of the account.
Ref: Responding to a Compromised Email Account | Microsoft Learn