{"id":771,"date":"2025-08-31T08:22:23","date_gmt":"2025-08-31T12:22:23","guid":{"rendered":"https:\/\/snehpatel.com\/?p=771"},"modified":"2025-08-31T08:22:27","modified_gmt":"2025-08-31T12:22:27","slug":"microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos","status":"publish","type":"post","link":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/","title":{"rendered":"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0"},"content":{"rendered":"\n<p>In today&#8217;s cloud-centric landscape, Microsoft 365 stands as the productivity cornerstone for countless organizations. While its extensive capabilities empower modern workplaces, they also present a broad and attractive attack surface for malicious actors. A single compromised Microsoft 365 account can swiftly escalate into a significant security incident, leading to data breaches, financial fraud, and widespread operational disruption.&nbsp;<\/p>\n\n\n\n<p>For security professionals, a deep understanding of the anatomy of these attacks is crucial for building a resilient defense. This is where the MITRE ATT&amp;CK\u00ae framework becomes an indispensable ally. The framework provides a globally accessible knowledge base of adversary tactics and techniques derived from real-world observations, creating a common language for cybersecurity professionals to dissect and neutralize threats.[<a href=\"http:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-mitre-attack-framework\">1<\/a>]\u00a0<\/p>\n\n\n\n<p>By mapping the common tactics and techniques used in Microsoft 365 account compromises to this framework, organizations can gain a clearer understanding of the threats they face, identify defensive gaps, and align their security controls to counter specific adversary behaviors.[<a href=\"https:\/\/medium.com\/mitre-engenuity\/aligning-microsoft-365-security-to-att-ck-c7267d89d71a\">2<\/a>][<a href=\"https:\/\/ctid.mitre.org\/projects\/security-stack-mappings-microsoft-365\/\">3<\/a>]\u00a0<\/p>\n\n\n\n<p>This blog post will explore how prevalent attack techniques in a compromised Microsoft 365 environment map to the MITRE ATT&amp;CK framework and, crucially, provide actionable steps to mitigate each threat.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>The Initial Breach: Gaining a Foothold (Tactic: Initial Access)<\/em><\/strong><\/h2>\n\n\n\n<p>An attacker&#8217;s first objective is to breach the perimeter and gain initial access to a user&#8217;s account. In the Microsoft 365 ecosystem, this is frequently accomplished through social engineering and the exploitation of weak authentication mechanisms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Technique: Phishing (T1566)<\/em><\/h3>\n\n\n\n<p>Phishing remains a dominant initial access vector, where attackers use deceptive emails to trick users into revealing their credentials on fake login pages or opening malicious attachments.[<a href=\"https:\/\/cybeready.com\/how-to-protect-microsoft-365-users-from-phishing-attacks\/\">4<\/a>] This encompasses several sub-techniques:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>T1566.001 \u2013 Spearphishing Attachment:<\/strong> Targeted emails with malicious attachments.\u00a0<\/li>\n\n\n\n<li><strong>T1566.002 \u2013 Spearphishing Link:<\/strong> Emails containing links to malicious websites designed to harvest credentials.\u00a0<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Steps to Mitigate Phishing:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable Multi-Factor Authentication (MFA):<\/strong> MFA is one of the most effective controls to prevent account compromise, adding a critical layer of security beyond just a password.[<a href=\"https:\/\/vijilan.com\/blog\/business-email-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">5<\/a>] It is highly recommended to use phishing-resistant MFA methods like FIDO2 security keys.[<a href=\"https:\/\/blog.admindroid.com\/how-to-defend-microsoft-365-identities-against-evolving-attack-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">6<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Implement Advanced Email Security:<\/strong> Leverage Microsoft Defender for Office 365 (formerly Advanced Threat Protection) to utilize features like Safe Links and Safe Attachments.[<a href=\"https:\/\/www.techadvisory.org\/2024\/05\/stop-phishing-attacks-with-microsoft-365-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">7<\/a>] These tools scan links and attachments in real-time to block malicious content.[<a href=\"https:\/\/www.techadvisory.org\/2024\/05\/stop-phishing-attacks-with-microsoft-365-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">7<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Configure Anti-Phishing Policies:<\/strong> Within Microsoft 365, create and customize anti-phishing policies to detect and block spoofing and impersonation attempts.[<a href=\"https:\/\/www.youtube.com\/watch?v=D3P1Adw_xMM\" target=\"_blank\" rel=\"noreferrer noopener\">8<\/a>][<a href=\"https:\/\/www.systoolsgroup.com\/updates\/how-to-stop-spam-and-phishing-emails-in-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">9<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Deploy Email Authentication Protocols:<\/strong> Configure Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) to validate email senders and prevent spoofing.[<a href=\"https:\/\/guardiandigital.com\/resources\/blog\/fbi-existing-cloud-email-protection-inadequate-against-phishing-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">10<\/a>][<a href=\"https:\/\/secureteam.co.uk\/2025\/01\/11\/avoiding-business-email-compromise-bec-attacks-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">11<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>User Education:<\/strong> Conduct regular security awareness training and phishing simulations to teach employees how to recognize and report suspicious emails.[<a href=\"https:\/\/vijilan.com\/blog\/business-email-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">5<\/a>][<a href=\"https:\/\/www.intelogy.co.uk\/blog\/5-ways-to-protect-against-a-phishing-attack-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">12<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Technique: Brute Force (T1110)<\/em><\/h3>\n\n\n\n<p>Attackers may attempt to guess passwords through various brute-force methods, especially against accounts not protected by MFA.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>T1110.003 \u2013 Password Spraying:<\/strong> A common and effective technique where an attacker uses a single, commonly used password against many accounts.\u00a0<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Steps to Mitigate Brute Force Attacks:\u00a0<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enforce Strong Password Policies:<\/strong> Require complex passwords with a minimum length and prohibit common or easily guessable passwords.[<a href=\"https:\/\/www.coreview.com\/blog\/the-anatomy-of-a-microsoft-365-hack-part-1-entry\" target=\"_blank\" rel=\"noreferrer noopener\">13<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Implement Account Lockout Policies:<\/strong> Use features like Microsoft Entra ID&#8217;s Smart Lockout, which locks an account for a period after a set number of failed sign-in attempts.[<a href=\"https:\/\/learn.microsoft.com\/en-us\/answers\/questions\/1329251\/controls-for-avoiding-brute-force-attack-on-o365-e\" target=\"_blank\" rel=\"noreferrer noopener\">14<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Block Legacy Authentication:<\/strong> Legacy protocols like POP3, IMAP, and SMTP often do not support modern authentication methods like MFA, making them a prime target.[<a href=\"https:\/\/www.coreview.com\/blog\/7-steps-to-reduce-brute-force-cyber-attacks-on-microsoft-office-365\" target=\"_blank\" rel=\"noreferrer noopener\">15<\/a>] Use Conditional Access policies to block these older protocols.[<a href=\"https:\/\/www.coreview.com\/blog\/the-anatomy-of-a-microsoft-365-hack-part-1-entry\" target=\"_blank\" rel=\"noreferrer noopener\">13<\/a>][<a href=\"https:\/\/www.coreview.com\/blog\/7-steps-to-reduce-brute-force-cyber-attacks-on-microsoft-office-365\" target=\"_blank\" rel=\"noreferrer noopener\">15<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Monitor for Suspicious Logins:<\/strong> Utilize security tools to monitor for unusual sign-in activity, such as attempts from unfamiliar locations or a high number of failed logins, and configure alerts for such events.[<a href=\"https:\/\/vijilan.com\/blog\/business-email-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">5<\/a>][<a href=\"https:\/\/cdn.prod.website-files.com\/612933c2d902f2ac80205a6f\/68a34910c370853b63188bb1_5f576ae4c3882694dd97f554753d9336_CoreView%20Checklist_Prevent%20Brute%20Force%20Attacks%20in%20Microsoft%20365%20Tenants.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">16<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Expanding and Exploiting: The Post-Compromise Playbook\u00a0<\/em><\/strong><\/h2>\n\n\n\n<p>Once inside, an attacker&#8217;s focus shifts to escalating privileges, moving laterally, exfiltrating data, and using the compromised account for further malicious acts.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Technique: Business Email Compromise (BEC) (T1534 &#8211; Internal Spearphishing)<\/em><\/h3>\n\n\n\n<p>A primary goal for attackers is often financial fraud through Business Email Compromise (BEC). After gaining mailbox access, they can monitor communications to understand business operations and then send fraudulent emails to redirect payments or exfiltrate sensitive data.[<a href=\"https:\/\/vijilan.com\/blog\/business-email-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">5<\/a>]\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Steps to Mitigate BEC:\u00a0<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enable MFA:<\/strong> As with initial access, MFA is a critical control that can prevent the account takeover necessary for most BEC attacks.[<a href=\"https:\/\/secureteam.co.uk\/2025\/01\/11\/avoiding-business-email-compromise-bec-attacks-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">11<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Configure Impersonation Protection:<\/strong> Use Microsoft Defender for Office 365 to set up anti-phishing policies that specifically protect high-value users (like executives) and key external domains from impersonation.[<a href=\"https:\/\/www.youtube.com\/watch?v=8Kn31h9HwIQ\" target=\"_blank\" rel=\"noreferrer noopener\">17<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Establish Payment Verification Processes:<\/strong> Implement strict, out-of-band procedures for verifying any requests for changes in payment details or for high-value transactions. This might involve a phone call to a known contact.[<a href=\"https:\/\/secureteam.co.uk\/2025\/01\/11\/avoiding-business-email-compromise-bec-attacks-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">11<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Monitor for Suspicious Email Forwarding:<\/strong> Attackers often set up auto-forwarding rules to monitor communications discreetly. Configure alert policies to notify security teams of such activity.[<a href=\"https:\/\/www.youtube.com\/watch?v=8Kn31h9HwIQ\" target=\"_blank\" rel=\"noreferrer noopener\">17<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Train Employees:<\/strong> Educate employees, especially those in finance and HR, on BEC tactics and the importance of adhering to payment verification procedures.[<a href=\"https:\/\/guardiandigital.com\/resources\/blog\/fbi-existing-cloud-email-protection-inadequate-against-phishing-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">10<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Technique: Illicit Consent Grants (T1528 &#8211; Steal Application Access Token)<\/em>&nbsp;<\/h3>\n\n\n\n<p>A more sophisticated technique is OAuth consent phishing. Attackers trick users into granting a malicious third-party application access to their Microsoft 365 data. This bypasses the need to steal credentials, as the attacker gains access via a legitimate token granted by the user.[<a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-entra-blog\/oauth-consent-phishing-explained-and-prevented\/4423357\" target=\"_blank\" rel=\"noreferrer noopener\">18<\/a>][<a href=\"https:\/\/jeffreyappel.nl\/protect-against-oauth-consent-phishing-attempts-illicit-consent-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">19<\/a>]\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Steps to Mitigate Illicit Consent Grants:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Configure Application Consent Policies:<\/strong> In the Microsoft Entra admin center, configure user consent settings to restrict which applications users can authorize.[<a href=\"https:\/\/www.egroup-us.com\/news\/oauth-phishing-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">20<\/a>] Options include disallowing user consent entirely or only allowing consent for apps from verified publishers.[<a href=\"https:\/\/jeffreyappel.nl\/protect-against-oauth-consent-phishing-attempts-illicit-consent-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">19<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Educate Users:<\/strong> Train users to scrutinize the permissions requested by applications during the consent process and to be wary of unexpected requests.[<a href=\"https:\/\/www.egroup-us.com\/news\/oauth-phishing-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">20<\/a>][<a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/enterprise-apps\/protect-against-consent-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">21<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Leverage Microsoft Defender for Cloud Apps:<\/strong> Use Defender for Cloud Apps to monitor OAuth apps connected to your environment. It can help detect and alert on malicious or risky applications.[<a href=\"https:\/\/jeffreyappel.nl\/protect-against-oauth-consent-phishing-attempts-illicit-consent-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">19<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Regularly Audit OAuth Applications:<\/strong> Periodically review the permissions of applications that have been granted access to your environment and revoke any that are unnecessary or suspicious.[<a href=\"https:\/\/www.egroup-us.com\/news\/oauth-phishing-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">20<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Technique: Email Hiding Rules (T1564.008 &#8211; Email Hiding Rules)<\/em>&nbsp;<\/h3>\n\n\n\n<p>To maintain persistence and evade detection, attackers often create inbox rules within a compromised mailbox. These rules can automatically delete incoming security alerts, forward sensitive emails to an external account, or move messages to obscure folders like &#8220;RSS Feeds.&#8221;[<a href=\"https:\/\/www.godaddy.com\/en-ca\/help\/check-my-microsoft-365-account-for-suspicious-rules-32037\" target=\"_blank\" rel=\"noreferrer noopener\">22<\/a>][<a href=\"https:\/\/help.office-protect.com\/en\/support\/solutions\/articles\/67000732895-office-protect-event-suspicious-inbox-rule-detected\" target=\"_blank\" rel=\"noreferrer noopener\">23<\/a>]\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Steps to Mitigate Malicious Inbox Rules:\u00a0<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regularly Audit Mailbox Rules:<\/strong> Both administrators and users should periodically check for any unfamiliar or suspicious inbox rules in Outlook on the web and the Exchange admin center.[<a href=\"https:\/\/www.godaddy.com\/en-ca\/help\/check-my-microsoft-365-account-for-suspicious-rules-32037\" target=\"_blank\" rel=\"noreferrer noopener\">22<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Configure Alerts for Suspicious Rules:<\/strong> Use security solutions to create alerts that trigger when a new forwarding rule to an external domain is created or when a rule is configured with keywords often associated with malicious activity (e.g., &#8220;invoice,&#8221; &#8220;password&#8221;).[<a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-xdr\/alert-grading-playbook-inbox-forwarding-rules\" target=\"_blank\" rel=\"noreferrer noopener\">24<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Disable or Remove Malicious Rules:<\/strong> If a malicious rule is found, it should be immediately disabled or deleted.[<a href=\"https:\/\/pushsecurity.com\/help\/what-to-do-if-you-find-a-malicious-mail-rule-microsoft-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">25<\/a>][<a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-office-365\/detect-and-remediate-outlook-rules-forms-attack\" target=\"_blank\" rel=\"noreferrer noopener\">26<\/a>]\u00a0<\/li>\n\n\n\n<li><strong>Investigate the Root Cause:<\/strong> The discovery of a malicious rule indicates an account compromise. Immediately reset the user&#8217;s password, revoke their active sessions, and investigate the initial point of entry.[<a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-xdr\/alert-grading-playbook-inbox-forwarding-rules\" target=\"_blank\" rel=\"noreferrer noopener\">24<\/a>][<a href=\"https:\/\/pushsecurity.com\/help\/what-to-do-if-you-find-a-malicious-mail-rule-microsoft-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">25<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><em><strong>Conclusion: Building a Threat-Informed Defense\u00a0<\/strong><\/em><\/h2>\n\n\n\n<p>The threat to Microsoft 365 environments is persistent and multifaceted. By mapping attacker behaviors to the MITRE ATT&amp;CK\u00ae framework, security teams can transition from a reactive posture to a proactive, threat-informed defense.[<a href=\"https:\/\/www.exabeam.com\/explainers\/mitre-attck\/mitigating-security-threats-with-mitre-attck\/\" target=\"_blank\" rel=\"noreferrer noopener\">27<\/a>] This structured approach enables organizations to:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify and Prioritize Defensive Gaps:<\/strong> Compare existing security controls against the specific techniques used by adversaries to pinpoint vulnerabilities.\u00a0<\/li>\n\n\n\n<li><strong>Enhance Threat Hunting:<\/strong> Use the framework to develop hypotheses about potential attacker activity and proactively search for indicators of compromise.\u00a0<\/li>\n\n\n\n<li><strong>Streamline Incident Response:<\/strong> During an incident, the framework provides a clear model to understand an attacker&#8217;s actions, ensuring a comprehensive and effective response.[<a href=\"https:\/\/mr-r3b00t.github.io\/soc_chef\/processes\/ir\/bec.html\" target=\"_blank\" rel=\"noreferrer noopener\">28<\/a>]\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Microsoft&#8217;s own security suite, including Microsoft Sentinel and Microsoft Defender XDR, is increasingly aligned with the MITRE ATT&amp;CK framework, providing powerful tools to help organizations operationalize this intelligence.[<a href=\"http:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-mitre-attack-framework\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a>] By combining these advanced tools with a foundational understanding of attacker TTPs, organizations can build a more resilient and effective defense for their critical cloud productivity platform.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Sources help<\/em><\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-mitre-attack-framework\" target=\"_blank\" rel=\"noreferrer noopener\">www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-mitre-attack-framework<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/medium.com\/mitre-engenuity\/aligning-microsoft-365-security-to-att-ck-c7267d89d71a\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/medium.com\/mitre-engenuity\/aligning-microsoft-365-security-to-att-ck-c7267d89d71a<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/ctid.mitre.org\/projects\/security-stack-mappings-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ctid.mitre.org\/projects\/security-stack-mappings-microsoft-365\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/cybeready.com\/how-to-protect-microsoft-365-users-from-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cybeready.com\/how-to-protect-microsoft-365-users-from-phishing-attacks\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/vijilan.com\/blog\/business-email-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vijilan.com\/blog\/business-email-compromise\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/blog.admindroid.com\/how-to-defend-microsoft-365-identities-against-evolving-attack-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/blog.admindroid.com\/how-to-defend-microsoft-365-identities-against-evolving-attack-techniques\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.techadvisory.org\/2024\/05\/stop-phishing-attacks-with-microsoft-365-defender\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.techadvisory.org\/2024\/05\/stop-phishing-attacks-with-microsoft-365-defender\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=D3P1Adw_xMM\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=D3P1Adw_xMM<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.systoolsgroup.com\/updates\/how-to-stop-spam-and-phishing-emails-in-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.systoolsgroup.com\/updates\/how-to-stop-spam-and-phishing-emails-in-office-365\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/guardiandigital.com\/resources\/blog\/fbi-existing-cloud-email-protection-inadequate-against-phishing-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/guardiandigital.com\/resources\/blog\/fbi-existing-cloud-email-protection-inadequate-against-phishing-ransomware<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/secureteam.co.uk\/2025\/01\/11\/avoiding-business-email-compromise-bec-attacks-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/secureteam.co.uk\/2025\/01\/11\/avoiding-business-email-compromise-bec-attacks-in-microsoft-365\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.intelogy.co.uk\/blog\/5-ways-to-protect-against-a-phishing-attack-in-microsoft-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.intelogy.co.uk\/blog\/5-ways-to-protect-against-a-phishing-attack-in-microsoft-365\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.coreview.com\/blog\/the-anatomy-of-a-microsoft-365-hack-part-1-entry\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.coreview.com\/blog\/the-anatomy-of-a-microsoft-365-hack-part-1-entry<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/answers\/questions\/1329251\/controls-for-avoiding-brute-force-attack-on-o365-e\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/answers\/questions\/1329251\/controls-for-avoiding-brute-force-attack-on-o365-e<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.coreview.com\/blog\/7-steps-to-reduce-brute-force-cyber-attacks-on-microsoft-office-365\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.coreview.com\/blog\/7-steps-to-reduce-brute-force-cyber-attacks-on-microsoft-office-365<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/cdn.prod.website-files.com\/612933c2d902f2ac80205a6f\/68a34910c370853b63188bb1_5f576ae4c3882694dd97f554753d9336_CoreView%20Checklist_Prevent%20Brute%20Force%20Attacks%20in%20Microsoft%20365%20Tenants.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cdn.prod.website-files.com\/612933c2d902f2ac80205a6f\/68a34910c370853b63188bb1_5f576ae4c3882694dd97f554753d9336_CoreView%20Checklist_Prevent%20Brute%20Force%20Attacks%20in%20Microsoft%20365%20Tenants.pdf<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=8Kn31h9HwIQ\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.youtube.com\/watch?v=8Kn31h9HwIQ<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/microsoft-entra-blog\/oauth-consent-phishing-explained-and-prevented\/4423357\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/techcommunity.microsoft.com\/blog\/microsoft-entra-blog\/oauth-consent-phishing-explained-and-prevented\/4423357<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/jeffreyappel.nl\/protect-against-oauth-consent-phishing-attempts-illicit-consent-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/jeffreyappel.nl\/protect-against-oauth-consent-phishing-attempts-illicit-consent-attack\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.egroup-us.com\/news\/oauth-phishing-microsoft-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.egroup-us.com\/news\/oauth-phishing-microsoft-teams\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/enterprise-apps\/protect-against-consent-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/enterprise-apps\/protect-against-consent-phishing<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.godaddy.com\/en-ca\/help\/check-my-microsoft-365-account-for-suspicious-rules-32037\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.godaddy.com\/en-ca\/help\/check-my-microsoft-365-account-for-suspicious-rules-32037<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/help.office-protect.com\/en\/support\/solutions\/articles\/67000732895-office-protect-event-suspicious-inbox-rule-detected\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/help.office-protect.com\/en\/support\/solutions\/articles\/67000732895-office-protect-event-suspicious-inbox-rule-detected<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-xdr\/alert-grading-playbook-inbox-forwarding-rules\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/defender-xdr\/alert-grading-playbook-inbox-forwarding-rules<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/pushsecurity.com\/help\/what-to-do-if-you-find-a-malicious-mail-rule-microsoft-office-365\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pushsecurity.com\/help\/what-to-do-if-you-find-a-malicious-mail-rule-microsoft-office-365\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/defender-office-365\/detect-and-remediate-outlook-rules-forms-attack\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/defender-office-365\/detect-and-remediate-outlook-rules-forms-attack<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/www.exabeam.com\/explainers\/mitre-attck\/mitigating-security-threats-with-mitre-attck\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.exabeam.com\/explainers\/mitre-attck\/mitigating-security-threats-with-mitre-attck\/<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/mr-r3b00t.github.io\/soc_chef\/processes\/ir\/bec.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/mr-r3b00t.github.io\/soc_chef\/processes\/ir\/bec.html<\/a>\u00a0<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s cloud-centric landscape, Microsoft 365 stands as the productivity cornerstone for countless organizations. While its extensive capabilities empower modern workplaces, they also present a broad and attractive attack surface for malicious actors. A single compromised Microsoft 365 account can swiftly escalate into a significant security incident, leading to data breaches, financial fraud, and widespread &#8230; <a title=\"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0\" class=\"read-more\" href=\"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/\" aria-label=\"Read more about Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[108,82,94,110,2,109,59],"tags":[114,97,112,111,113],"class_list":["post-771","post","type-post","status-publish","format-standard","hentry","category-cloud","category-guide","category-hardening","category-incident-response","category-ir","category-microsoft-365","category-security","tag-ciso","tag-hardening","tag-incident-response","tag-microsoft-365","tag-mitre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s cloud-centric landscape, Microsoft 365 stands as the productivity cornerstone for countless organizations. While its extensive capabilities empower modern workplaces, they also present a broad and attractive attack surface for malicious actors. A single compromised Microsoft 365 account can swiftly escalate into a significant security incident, leading to data breaches, financial fraud, and widespread ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/\" \/>\n<meta property=\"og:site_name\" content=\"Sneh Patel\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-31T12:22:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-31T12:22:27+00:00\" \/>\n<meta name=\"author\" content=\"Sneh Patel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sneh Patel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/\"},\"author\":{\"name\":\"Sneh Patel\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"headline\":\"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0\",\"datePublished\":\"2025-08-31T12:22:23+00:00\",\"dateModified\":\"2025-08-31T12:22:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/\"},\"wordCount\":1542,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"keywords\":[\"CISO\",\"Hardening\",\"Incident Response\",\"Microsoft 365\",\"MITRE\"],\"articleSection\":[\"Cloud\",\"Guide\",\"Hardening\",\"Incident Response\",\"IR\",\"Microsoft 365\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/\",\"url\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/\",\"name\":\"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#website\"},\"datePublished\":\"2025-08-31T12:22:23+00:00\",\"dateModified\":\"2025-08-31T12:22:27+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2025\\\/08\\\/31\\\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#website\",\"url\":\"https:\\\/\\\/snehpatel.com\\\/\",\"name\":\"Sneh Patel\",\"description\":\"Cyber Security Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/snehpatel.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\",\"name\":\"Sneh Patel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"width\":672,\"height\":222,\"caption\":\"Sneh Patel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/snehpatel.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel","og_description":"In today&#8217;s cloud-centric landscape, Microsoft 365 stands as the productivity cornerstone for countless organizations. While its extensive capabilities empower modern workplaces, they also present a broad and attractive attack surface for malicious actors. A single compromised Microsoft 365 account can swiftly escalate into a significant security incident, leading to data breaches, financial fraud, and widespread ... Read more","og_url":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/","og_site_name":"Sneh Patel","article_published_time":"2025-08-31T12:22:23+00:00","article_modified_time":"2025-08-31T12:22:27+00:00","author":"Sneh Patel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sneh Patel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/#article","isPartOf":{"@id":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/"},"author":{"name":"Sneh Patel","@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"headline":"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0","datePublished":"2025-08-31T12:22:23+00:00","dateModified":"2025-08-31T12:22:27+00:00","mainEntityOfPage":{"@id":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/"},"wordCount":1542,"commentCount":0,"publisher":{"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"keywords":["CISO","Hardening","Incident Response","Microsoft 365","MITRE"],"articleSection":["Cloud","Guide","Hardening","Incident Response","IR","Microsoft 365","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/","url":"https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/","name":"Microsoft 365 Security &amp; Incident Response: Mapping Cloud Attacks with MITRE ATT&amp;CK\u00ae for CISOs\u00a0 - Sneh Patel","isPartOf":{"@id":"https:\/\/snehpatel.com\/#website"},"datePublished":"2025-08-31T12:22:23+00:00","dateModified":"2025-08-31T12:22:27+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/snehpatel.com\/index.php\/2025\/08\/31\/microsoft-365-security-incident-response-mapping-cloud-attacks-with-mitre-attck-for-cisos\/"]}]},{"@type":"WebSite","@id":"https:\/\/snehpatel.com\/#website","url":"https:\/\/snehpatel.com\/","name":"Sneh Patel","description":"Cyber Security Blog","publisher":{"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/snehpatel.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73","name":"Sneh Patel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","url":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","contentUrl":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","width":672,"height":222,"caption":"Sneh Patel"},"logo":{"@id":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1"},"sameAs":["http:\/\/snehpatel.com"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/comments?post=771"}],"version-history":[{"count":4,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/771\/revisions"}],"predecessor-version":[{"id":775,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/771\/revisions\/775"}],"wp:attachment":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/media?parent=771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/categories?post=771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/tags?post=771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}