How To Respond To A Compromised Microsoft 365 Account (Admin Guide)

Microsoft 365 accounts are a prime target for attackers due to email access, SharePoint data, OneDrive files, and privileged admin roles.

If even one account is compromised, attackers can spread phishing internally, steal data, or escalate privileges.

This guide provides a real-world incident response how to respond to a compromised microsoft 365 account to detect, contain, remediate, and prevent Microsoft 365 account compromise.

How to Identify a Compromised Microsoft 365 Account

How To Respond To A Compromised Microsoft 365 Account
How To Respond To A Compromised Microsoft 365 Account

Common warning signs include:

  • Users report emails sent automatically from their mailbox
  • Suspicious sign-ins from foreign locations
  • Inbox rules forwarding emails externally
  • Password change alerts not initiated by the user
  • MFA prompts sent unexpectedly
  • Deleted or missing emails
  • Admin alerts for risky sign-ins

Important: Do NOT wait for confirmation. Assume compromise and act immediately.

Step 1: Immediately Block the Account (Containment)

Disable Sign-In (Recommended First Action)

Microsoft Entra admin center

Users → Select user → Block sign-in

This prevents further attacker activity while you investigate.

Step 2: Reset Password & Revoke Active Sessions

Reset Password

  • Force a strong, random password
  • Enable “Require password change at next sign-in”

Revoke Sign-In Sessions (CRITICAL)

Entra ID → User → Overview → Revoke sessions
Revoke-Sign-In-Sessions
Revoke Sign-In Sessions

This kicks out:

  • Active browser sessions
  • OAuth tokens
  • Mobile device access

Step 3: Review Sign-In Logs (Root Cause Analysis)

Go to:

Microsoft Entra ID → Users → Search compromised account → Sign-in logs

Check:

  • IP addresses
  • Country / region
  • Device & browser
  • Authentication method (password-only = red flag)

  Look Specifically For:

  • Impossible travel
  • Legacy authentication usage
  • Failed MFA attempts followed by success

Step 4: Remove Malicious Inbox Rules (VERY COMMON)

Attackers often create hidden inbox rules.

Check via Exchange Online Powershell

Delete rules that:

  • Forward emails externally
  • Move emails to RSS/Archive
  • Delete security alerts

Step 5: Check Mailbox Forwarding & Delegates

Check Forwarding

Remove if found:

Check Delegates PowerShell

Check Delegates Exchange Online Portal

Exchange admin center → mailboxes  Search mailbox  Click on delegation 

Remove unknown users immediately.

Step 6: Investigate Azure AD Risky Events

Go to:

Entra ID → ID Protection → Risky users / Risky sign-ins

Actions:

  • Confirm user compromised
  • Reset password
  • Require MFA re-registration

Step 7: Enforce MFA & Conditional Access

Minimum Security Controls:

  • Enforce MFA for all users
  • Block legacy authentication
  • Require compliant or Microsoft Entra hybrid joined device

Step 8: Scan for Lateral Movement

Check if attacker:

  • Sent phishing internally
  • Modified SharePoint permissions
  • Accessed OneDrive files

Audit Logs

Purview → Audit → Search activities

Look for:

  • MailboxLogin
  • Add-MailboxPermission
  • FileAccessed

Step 9: Notify Users & Management

Transparency matters.

Notify:

  • Affected user
  • IT Security / SOC
  • Management (if data exposure suspected)

Reset passwords for any contacted users.

Step 10: Prevent Future Compromise (Hardening)

Must-Have Security Controls:

  • MFA everywhere
  • Conditional Access
  • Disable legacy protocols
  • User training (phishing awareness)
  • External email tagging
  • Defender for Office 365 (recommended)

How To Respond To A Compromised Microsoft 365 Account Checklist (Quick View)

  • Disable account
  • Reset password
  • Revoke sessions
  • Remove inbox rules
  • Check forwarding
  • Review sign-in logs
  • Enforce MFA
  • Audit mailbox activity

Frequently Asked Questions (FAQs)

Q1. Should I delete the compromised mailbox?

No. Investigation and evidence may be required.

Q2. Is password reset alone enough?

 No. You must revoke sessions and check inbox rules.

Q3. How long should I monitor after incident?

At least 14–30 days.

Pro Tip (From Real Incidents)

Most M365 compromises happen due to:

  • MFA not enforced
  • User shared password on mail or whatsapp
  • Legacy authentication enabled
  • Users reusing passwords

Fix these once → prevent 90% of attacks.

Final Thoughts

A compromised Microsoft 365 account is not just an email issue—it’s an identity breach.
Fast containment, deep investigation, and strong preventive controls are the only way to stop repeat attacks.

Vishal Prajapati is a Microsoft 365 administrator and technology enthusiast with hands-on experience managing and supporting modern cloud-based environments. He works extensively with Microsoft 365 services and focuses on helping administrators understand complex concepts through clear, practical, and real-world guidance.

Leave a Comment