Email Security Integrations

Email security integrations capture phishing reports, suspicious email detections, and email threat data to feed into employee risk scores.

Supported Platforms

PlatformConnection MethodEvents Captured
Microsoft 365 / DefenderMicrosoft Graph APIPhishing reports, safe links clicks, threat detections
Google WorkspaceGmail API + Admin ReportsPhishing reports, suspicious email events
Proofpoint TAPREST APITargeted attack events, URL clicks, attachment opens
MimecastREST APIThreat detections, URL protection events
Abnormal SecurityREST APIBEC detections, account takeover signals

Setting Up Microsoft 365

  1. Navigate to Admin → Integrations → Add Integration
  2. Select Microsoft 365
  3. Click Authorize with Microsoft
  4. Sign in with an account that has Security Reader permissions
  5. Grant the required API permissions
  6. Test the connection and activate
Defender for Office 365
For the richest set of email events, Microsoft Defender for Office 365 Plan 1 or higher is recommended. Basic Exchange Online provides limited email security signals.

TidalBay Report Button

TIDALBAY provides a "Report Phishing" button add-in for Outlook and Gmail that employees can use to report suspicious emails:

  • One-click reporting from within the email client
  • Automatic event creation in TIDALBAY (+10 points for valid reports)
  • Email forwarded to your SOC for triage
  • Feedback sent to the reporting employee

Events Captured

EventDefault Impact
Phishing email reported+10 points
Malicious link clicked-20 points
Malicious attachment opened-20 points
Credentials submitted on phishing page-35 points
BEC response sent-15 points

Next Steps