Phishing Incident Response Playbook: A Complete Guide
- GK
- 13 hours ago
- 4 min read

Phishing continues to be the leading initial access vector in cyber attacks, targeting organisations of all sizes. Despite improved email security controls, attackers consistently succeed by exploiting user trust, identity systems, and gaps in detection.
For a Security Analyst, having a clear, structured, and technically actionable phishing incident response playbook is essential. This guide delivers a comprehensive framework covering detection, investigation, containment, eradication, and recovery—aligned with real-world tools such as Microsoft Sentinel and Microsoft Defender for Office 365.
What is a Phishing Incident Response Playbook?
A phishing incident response playbook is a standardised set of procedures used by security analysts to:
Detect phishing attacks quickly
Investigate user interaction and impact
Contain threats before they spread
Remove attacker access and persistence
Restore normal operations securely
It ensures consistent, repeatable, and efficient incident handling, reducing response time and limiting business impact.
Why Phishing Attacks Are Still Effective
Phishing remains successful due to a combination of human and technical factors.

Social Engineering Tactics
Urgency (“Immediate action required”)
Authority impersonation (executives, suppliers)
Financial or invoice-based lures
Evasion Techniques
Typosquatted domains
HTML smuggling
Encrypted or obfuscated attachments
Identity-Focused Attacks
Modern phishing campaigns target identity platforms like Microsoft Entra ID to:
Steal credentials
Bypass MFA
Hijack active session
Phishing Incident Response Lifecycle
A structured phishing response consists of six phases:
1. Detection & Triage
2. Investigation & Scoping
3. Containment
4. Eradication
5. Recovery
6. Post-Incident Review
Phase 1: Detection & Triage
Identify phishing emails quickly and determine whether user interaction occurred.

Detection Sources
Email security alerts from Microsoft Defender for Office 365
SIEM detections via Microsoft Sentinel
User-reported phishing emails
Threat intelligence feeds
Key Indicators of Phishing
Suspicious or lookalike sender domains
Unexpected attachments (.html, .zip, .iso)
Credential harvesting links
Urgent or financial language
During triage, determine:
Was the email successfully delivered?
Who received it?
Was the link clicked?
Was the attachment opened?
Were credentials entered?
KQL Detection Example
EmailEvents
| where Subject has_any ("urgent", "invoice", "payment", "action required")
| where SenderFromDomain !endswith "trustedcompany.com"
| project Timestamp, SenderFromAddress, RecipientEmailAddress, SubjectMITRE ATT&CK Mapping https://attack.mitre.org/
T1566 – Phishing
1566.002 – Spearphishing Link
Phase 2: Investigation & Scoping
Determine the scope of the attack and identify affected users, systems, and potential compromise.
Identify All Recipients
EmailEvents
| where NetworkMessageId == "<message_id>"
| project RecipientEmailAddressThis establishes whether the phishing attempt is targeted or widespread.
Analyse User Interaction via Link Click Activity
UrlClickEvents
| where NetworkMessageId == "<message_id>"
| project Timestamp, AccountUpn, UrlAttachment Execution
DeviceFileEvents
| where FileName endswith ".html" or FileName endswith ".zip"Detect Credential Compromise
SigninLogs
| where TimeGenerated > ago(24h)
| where ResultType == 0
| where Location !in ("UK")Indicators to Investigate
Impossible travel
Unusual login locations
New or unknown devices
Identify Persistence Mechanisms via Mailbox Rule Analysis
OfficeActivity
| where Operation == "New-InboxRule"
| where Parameters has "forward"Attackers may create rules to:
Hide malicious emails
Forward communications externally
MITRE ATT&CK Mapping
T1078 – Valid Accounts
T1114 – Email Collection
T1098 – Account Manipulation
Phase 3: Containment
Prevent further spread and stop attacker activity immediately.
Containment Actions
Remove Malicious Emails
Perform tenant-wide purge using Defender
Ensure removal across all mailboxes
Block Indicators
Block sender domains
Block malicious URLs
Secure Compromised Accounts using Microsoft Entra ID:
Force password resets
Revoke active sessions
Revoke-AzureADUserAllRefreshToken -ObjectId <user>Endpoint Isolation (If Required)
Isolate affected devices using EDR
Begin further investigation if malware is suspected
MITRE ATT&CK Mapping
T1566 – Initial Access
T1078 – Persistence
Phase 4: Eradication
Objective - Remove attacker access and eliminate persistence mechanisms.
Eradication Steps
Remove Malicious Inbox Rules
Delete suspicious forwarding or hidden rules
Reset Credentials
Enforce strong password policies
Require MFA re-registration
Investigate OAuth Abuse
AuditLogs
| where OperationName == "Consent to application"Attackers may abuse OAuth applications to maintain access.
Endpoint Threat Hunting
Perform full antivirus or EDR scans
Investigate potential payloads
MITRE ATT&CK Mapping
T1098 – Account Manipulation
T1059 – Command Execution
Phase 5: Recovery
Restore normal operations and confirm the environment is secure.
Recovery Actions
Re-enable user accounts once secured
Monitor authentication activity
Validate system integrity
User Awareness
Notify affected users
Reinforce phishing awareness
Encourage reporting of suspicious emails
Validation Checklist
No suspicious login activity
No malicious inbox rules
No further phishing emails detected
Phase 6: Post-Incident Review
Improve detection and strengthen security controls.
Lessons Learned
How did the phishing email bypass controls?
Were detection mechanisms effective?
Was user awareness sufficient?
Detection Improvements
Enhance rules in Microsoft Sentinel
Improve alert correlation
Implement domain similarity detection
Security Enhancements
Enforce MFA organisation-wide
Apply Conditional Access policies
Enable Safe Links and Safe Attachments
Automation Opportunities
Security analysts can reduce workload and response time by automating:
Email purging
Account lockouts on suspicious activity
Alert enrichment with threat intelligence
Key Metrics to Track
Time to Detect (TTD)
Time to Respond (TTR)
Number of affected users
Phishing success rate
These metrics help measure and improve incident response performance.

Incident Closure Criteria
Close the incident only when:
All malicious emails are removed
All compromised accounts are secured
No further attacker activity is detected
Findings and lessons learned are documented
Best Practices for Security Analysts
Maintain an up-to-date phishing playbook
Integrate detection with SIEM and endpoint tools
Continuously improve detection rules
Promote strong user awareness
Phishing attacks are inevitable, but their impact can be significantly reduced with a structured and well-executed response.
When integrated into platforms like Microsoft Sentinel and continuously refined, it becomes a powerful tool for defending against one of the most persistent threats in cybersecurity.
Next in the Series
Malware Incident Response Playbook
Ransomware Response Playbook
Account Compromise Playbook (focused on Microsoft Entra ID)

