I typically follow the following 14 steps when an account is compromised. Is there anything else I am forgetting?
Getting the malicious actor out of the account is the main goal of the first six phases. The purpose of the following 5 procedures is to repair the harm that has been done to your Microsoft 365 tenant. The last three stages are all about hardening the account to prevent future occurrences. You can utilize the following fast checklist to shut out the hacker. When you are ready to learn how to complete the steps, scroll down to the relevant section.