Feature: Tenant-Wide Inbox Rule Artifact Collection #156
Labels
priority/low
For low priority tasks
status/ready
Verified issue, ready to be assigned
type/feature
New feature or request
Milestone
What problem would this feature solve?
Currently, Hawk does not have an active capability for tenant-wide inbox rule artifact collection due to the removal of the
RobustCloudCommand
dependency. This functionality is essential for scanning all tenant mailboxes for malicious inbox rules and unauthorized email forwarding. Reimplementing this feature would restore a critical security capability.Proposed Solution
Reimplement the
Get-HawkTenantInboxRules
function to enable tenant-wide inbox rule scanning without relying on the deprecatedRobustCloudCommand
module and or use the RobustCloudCommand static file from the GitHub repo for RobustCloudCommand. The updated implementation should include native throttling and scalable mailbox processing.Technical Requirements
Get-HawkTenantInboxRules
to use native PowerShell mechanisms or RobustCloudCommand from its GitHub repo for mailbox throttling and processing.Start-HawkTenantInvestigation
to ensure seamless artifact collection during tenant-wide investigations.Implementation Approach
If using RobustCloudCommand:
If not using RobustCloudCommand:
RobustCloudCommand
with:Start-Job
for parallel processing.Hawk
module manifest to removeRobustCloudCommand
from dependencies.Acceptance Criteria
Get-HawkTenantInboxRules
cmdlet must retrieve all inbox rules for mailboxes in a tenant.Start-HawkTenantInvestigation
must useGet-HawkTenantInboxRules
as part of its workflow.The text was updated successfully, but these errors were encountered: