Email Security Phishing Response Checklist for Security Teams
Practical, step-by-step email security phishing response checklist for security teams - triage, contain, forensics, and SLA templates to cut risk fast.
By CyberReplay Security Team
TL;DR: Build a repeatable phishing response that triages reported messages in 15 minutes, contains threats within 60 minutes for high-risk incidents, and preserves evidence for forensic analysis. This checklist gives playbook steps, commands, SLA targets, and templates your SOC or MSSP can implement within days.
Table of contents
- Quick answer
- Why this matters - business cost of phishing
- Who this checklist is for
- Core checklist overview
- Pre-incident controls and prevention checklist
- Detection and triage checklist
- Containment and remediation checklist
- Forensics and evidence preservation checklist
- Communication, legal, and compliance checklist
- SLA targets and measurable outcomes
- Implementation specifics and runnable commands
- Proof scenarios and how this reduces risk
- Common objections and answers
- What should we do next?
- How do we preserve chain-of-custody for email evidence?
- Can we automate quarantine without blocking legitimate mail?
- Is outsourcing phishing response to an MSSP cost effective?
- How long should we retain phishing artifacts?
- Get your free security assessment
- Conclusion
- References
- Quick answer
- Core checklist overview
- What should we do next?
- References
- when this matters
- definitions
- common mistakes
- faq
- next step
Quick answer
If you have one security control to standardize today, build a phishing response playbook that enforces: report intake within 15 minutes, automated enrichment and indicators-of-compromise (IOC) extraction within 15-30 minutes, containment actions applied within 60 minutes for high-risk incidents, and a documented evidence package for legal/forensics. These time targets reduce dwell time and limit credential abuse and lateral movement.
Key resources to align with: NIST incident handling guidance, CISA phishing playbooks, and Microsoft guidance for Office 365 incident response. See References below for direct links.
Why this matters - business cost of phishing
Phishing is the top initial vector for breaches. End-user compromise leads to credential theft, business email compromise, and ransomware. Average incident costs and recovery times escalate when detection and containment are slow. For example, industry reports show median time-to-identify and time-to-contain materially affect total breach cost and downtime. Faster containment reduces risk of additional data loss and operational disruption.
Quantified stakes you can cite internally:
- Average phishing-driven compromise can lead to 1-3 days of operational disruption if credentials are reused internally.
- Setting a 60-minute containment SLA for high-risk phishing often reduces the window for lateral movement by 50% compared to manual-only workflows.
- Automating enrichment and blocking can save 2-5 SOC analyst hours per incident on average.
(Claims above should be validated against your organization data and vendor reports such as those in References.)
Who this checklist is for
This checklist is for security operations centers (in-house SOC), security-focused IT teams, incident response teams, and decision makers evaluating Managed Security Service Providers (MSSP) or Managed Detection and Response (MDR) partnerships.
This is not a user awareness syllabus. Use it after a user report arrives or a suspected campaign is detected by tooling.
Core checklist overview
Follow four stages for every reported suspicious email:
- Intake and enrichment - capture the reported email, metadata, and user context.
- Triage and risk scoring - classify as benign, suspicious, or malicious with a risk score.
- Containment and remediation - isolate affected accounts and remove or quarantine messages.
- Forensics, documentation, and lessons - preserve evidence, update blocklists, and report outcomes.
Each stage includes specific actions below with measurable targets and commands you can run.
Pre-incident controls and prevention checklist
- Email authentication: Ensure SPF, DKIM, and DMARC are published and enforced with monitoring. Aim for DMARC enforcement for business domains within a phased 30-90 day plan.
- Inbound filters: Use vendor anti-phishing engines with sandboxing for attachments and URL detonation for links.
- Reporting mechanism: Deploy a one-click mail reporter button in Outlook/Gmail and route reports to a dedicated mailbox or ticketing queue.
- Baseline telemetry: Ensure mailbox activity logs, mail gateway logs, and endpoint telemetry are routed to your SIEM or EDR.
- Playbooks: Publish a simple runbook with roles and SLAs and test quarterly with tabletop exercises.
Why each item matters:
- SPF/DKIM/DMARC prevents spoofing at scale and supplies signals for automated triage.
- Reporter buttons reduce manual inbox forwarding and preserve headers.
Detection and triage checklist
Intake steps (target: 0-15 minutes from user report):
- Capture the original message as an .eml or .msg file and preserve full headers.
- Pull reporter context (who reported, device, location, any actions taken such as clicking links).
- Extract key metadata: Message-ID, Received chain, SPF/DKIM/DMARC results, from/to, subject, delivery timestamp.
- Run automated enrichment: URL scanning, attachment sandbox, WHOIS and domain age checks, reverse IP reputation, and IOC lookup against threat intel feeds.
Triage scoring (example rubric):
- High (score 80-100): credential capture, invoice/payment request to finance, CEO impersonation, or active exploit found in attachment.
- Medium (score 40-79): suspicious link, unexpected attachment from a known partner, or DKIM/SPF fail.
- Low (score 0-39): unsolicited marketing or known benign newsletter with validated unsubscribe.
Decision matrix (apply within 15-30 minutes):
- High: proceed to immediate containment and user password reset if credential exposure suspected.
- Medium: isolate message, notify user, monitor account activity for 24-72 hours.
- Low: mark as safe and update user training feedback loop.
Containment and remediation checklist
Actions for high-risk incidents (target apply within 60 minutes):
- Block or quarantine all instances of the message across mailboxes using mail gateway or M365 quarantine features.
- Temporarily suspend or force password reset for compromised accounts where credential capture is confirmed or suspected.
- Apply mail flow rules to block sender domain and any linked domains pending review.
- If the message delivered links, ensure URL takedown or DNS sinkholing where possible.
- If attachments are malicious, ensure AV/EDR cleanup on endpoints that opened them.
Safe rollback steps:
- Document every containment action and the command or UI steps used so rollback is possible if false positive is confirmed.
Forensics and evidence preservation checklist
Preserve chain-of-custody and artifacts for legal or insurance needs:
- Export the original message in EML format and store in immutable storage with hash and timestamp.
- Preserve SIEM events, EDR logs, mailbox audit logs, and user session tokens for the relevant time window.
- Create an evidence package that includes message headers, enrichment outputs, and analyst notes.
Suggested retention and packaging steps:
- Retain artifacts for the longer of regulatory minimum or 90 days post-incident unless otherwise required.
- Use automated scripts to capture required artifacts to reduce analyst time and ensure consistency.
Communication, legal, and compliance checklist
- Notify internal stakeholders: impacted business owner, HR if account compromise affects user data, and legal if personal data may have been exposed.
- External obligations: determine whether regulators or customers must be notified based on data exposure thresholds.
- User messaging: provide a clear, non-alarming notification to impacted users with next steps and forced password reset guidance if needed.
Keep a template message library to cut response time and to ensure consistent language for compliance.
SLA targets and measurable outcomes
SLA examples to apply to incidents:
- Report intake acknowledgment: within 15 minutes.
- Triage completed and risk score assigned: within 30 minutes.
- Containment actions for high-risk incidents: within 60 minutes.
- Evidence package prepared and stored: within 24 hours.
KPIs to track:
- Mean time to respond (MTTR) and mean time to contain (MTTC).
- Number of incidents fully contained within SLA - target 90% for high-risk phishing.
- Analyst time per incident - target <3 hours average with automation and playbooks.
Quantified outcomes to present to leadership:
- Implementing automated enrichment and blocklists can reduce average analyst time per incident by 30-60% and cut time-to-contain from hours to under an hour for high-risk incidents.
Implementation specifics and runnable commands
Save headers and extract metadata (example bash):
# Save full message from a reporting mailbox search to file.eml
# This assumes you can export from your mail admin or have the .eml attached to a ticket.
# Once you have file.eml, extract Received header lines
grep -i "^Received:" -n file.eml
# View SPF/DKIM/DMARC lines in headers
grep -E "Authentication-Results|DKIM-Signature|Received-SPF|ARC-Authentication-Results" file.eml -n
Check DNS records for sender domain (SPF/DKIM):
# Check SPF
dig +short TXT example.com
# Check DKIM for selector 'selector1'
dig +short TXT selector1._domainkey.example.com
# Check DMARC
dig +short TXT _dmarc.example.com
Python example for extracting headers programmatically:
from email import policy
from email.parser import BytesParser
with open('file.eml','rb') as f:
msg = BytesParser(policy=policy.default).parse(f)
print('From:', msg['From'])
print('Subject:', msg['Subject'])
print('Auth-Results:', msg['Authentication-Results'])
print('Received:', msg.get_all('Received'))
PowerShell examples for Microsoft 365 (Exchange Online) - search and quarantine identifiers: replace placeholders before running.
# Find message trace for a message id
Get-MessageTrace -MessageId "<message-id>" -StartDate (Get-Date).AddDays(-1) -EndDate (Get-Date)
# Search mailboxes for a subject and export a copy (requires appropriate roles)
New-ComplianceSearch -Name "PhishSearch" -ExchangeLocation All -ContentMatchQuery 'subject:"Urgent invoice"'
Start-ComplianceSearch -Identity "PhishSearch"
New-ComplianceSearchAction -SearchName "PhishSearch" -Export -Format FxStream
Note: Always run these with appropriate audit and least privilege. Test in a lab before production.
Proof scenarios and how this reduces risk
Scenario 1 - CEO impersonation email requesting wire payment:
- Without fast triage, a finance user pays the invoice and $250k is at risk. With rapid triage and a 60-minute containment SLA, the message is quarantined across mailboxes and the finance team is alerted. Potential loss avoided.
Scenario 2 - Credential capture link clicked by multiple users:
- Automated IOC enrichment finds a credential phishing domain and triggers immediate tenant-wide block and password reset for affected accounts. Early containment prevents re-use of credentials on cloud services.
For each scenario, the combination of automation, documented playbook, and clear SLAs is the difference between hours of lateral movement and containment in under an hour.
Common objections and answers
Objection: “We cannot staff 24-7 to meet these SLAs.” Answer: Outsourcing to an MSSP or MDR with 24-7 coverage can provide continuous triage and containment. Alternatively, implement automation for intake and enrichment so one analyst can handle more incidents. See managed options: https://cyberreplay.com/managed-security-service-provider/ and assessment tools: https://cyberreplay.com/scorecard/
Objection: “Quarantining messages at scale will break business mailflows and generate false positives.” Answer: Use phased containment - quarantine only high-score incidents automatically and place medium-score incidents into a review queue. Maintain rollback steps and always log the action for quick reversal if false positives are confirmed.
Objection: “We lack forensic capability to preserve evidence.” Answer: Implement automated evidence capture scripts and immutable storage. MSSPs and incident response services provide certified chain-of-custody handling when required. See response help: https://cyberreplay.com/cybersecurity-help/
What should we do next?
- Apply this checklist to 1-3 recent phishing reports as a tabletop exercise within 7 days.
- Implement one-click reporting across your mail clients and forward new reports to a dedicated queue/ticket.
- If you lack 24-7 coverage or want a fast assessment, run a CyberReplay scorecard to identify gaps in email controls and response playbooks: https://cyberreplay.com/scorecard/.
If you prefer hands-on assistance, consider a rapid incident readiness review or managed response capability discovery at https://cyberreplay.com/cybersecurity-services/.
How do we preserve chain-of-custody for email evidence?
- Export the original .eml or .msg to immutable storage and compute SHA256 hashes at export time.
- Record the actor who exported, the time, and the storage location in an evidence log.
- Preserve related logs (mail gateway, SIEM, EDR) and snapshot any impacted endpoints where attachments were opened.
- Use retention policies that meet regulatory and legal holds.
Can we automate quarantine without blocking legitimate mail?
Yes. Recommended pattern:
- Auto-quarantine only high-confidence malicious messages (score >80) from automated enrichment.
- Auto-isolate suspicious senders by adding temporary transport rules for a short interval for review.
- For medium-confidence cases, route to a quarantine for analyst approval or user self-service release with auditing.
Testing and rollback plans are essential to avoid business disruption.
Is outsourcing phishing response to an MSSP cost effective?
Outsourcing can be cost effective when internal staffing, tooling, and 24-7 coverage costs exceed MSSP rates or when rapid scale is required. Typical benefits:
- Faster time-to-detect and contain through staffed SOC shifts.
- Access to threat intel and takedown capabilities.
- Predictable monthly cost versus hiring and training specialist staff.
Assess MSSP offerings against your SLA targets and confirm they provide transparent reporting and playbook alignment to reduce vendor lock-in.
How long should we retain phishing artifacts?
Minimum retention guidance:
- Evidence artifacts: retain at least 90 days post-incident or longer if regulatory requirements apply.
- Audit logs: 1-7 years depending on compliance needs.
- IOC lists and blocklists: keep until validated as stale or rotated.
Longer retention supports legal discovery and trend analysis.
Get your free security assessment
If you want practical outcomes without trial-and-error, schedule your assessment and we will map your top risks, quickest wins, and a 30-day execution plan.
Conclusion
A disciplined, measurable phishing response program reduces dwell time and business risk. Prioritize: authenticated reporting, automated enrichment, clear triage rules, fast containment for high-risk incidents, and rigorous evidence preservation. Start by running the checklist on a small set of past incidents, measure MTTR and MTTC, then iterate until SLA targets are met.
Next step recommendation - low friction: run a scorecard to identify gaps and consider short-term MDR assistance to reach SLAs faster - see https://cyberreplay.com/scorecard/ and https://cyberreplay.com/email-security-for-company/.
References
- NIST Computer Security Incident Handling Guide (SP 800-61 Rev. 2)
- CISA: Technical Approaches to Uncovering and Remediating Phishing Infrastructure
- Microsoft: Responding to Phishing Attacks in Microsoft 365
- Google Workspace: Email Spoofing and Phishing – Security Best Practices
- Verizon 2023 Data Breach Investigations Report - Phishing Section
- SANS Institute: Phishing Defense – How to Detect, Respond, and Recover
- IBM: Cost of a Data Breach Report 2023 – Phishing Insights
- CERT NZ: Phishing Response Guidance for Organizations
Table of contents
- Quick answer
- When this matters
- Definitions
- Why this matters - business cost of phishing
- Who this checklist is for
- Core checklist overview
- Pre-incident controls and prevention checklist
- Detection and triage checklist
- Containment and remediation checklist
- Forensics and evidence preservation checklist
- Communication, legal, and compliance checklist
- SLA targets and measurable outcomes
- Implementation specifics and runnable commands
- Proof scenarios and how this reduces risk
- Common mistakes
- Common objections and answers
- FAQ
- What should we do next?
- Next step
- Get your free security assessment
- Conclusion
- References
Quick answer
If you have one security control to standardize today, implement this email security phishing response checklist as your operational baseline. The checklist enforces: report intake within 15 minutes, automated enrichment and indicators-of-compromise (IOC) extraction within 15 to 30 minutes, containment actions applied within 60 minutes for high-risk incidents, and a documented evidence package for legal and forensics. These time targets reduce dwell time and limit credential abuse and lateral movement.
Key resources to align with: NIST incident handling guidance, CISA phishing playbooks, and Microsoft guidance for Office 365 incident response. See References below for direct links.
Core checklist overview
Follow four stages for every reported suspicious email. This email security phishing response checklist maps actions and SLAs to each stage so teams can run consistent, measurable response workflows:
- Intake and enrichment - capture the reported email, metadata, and user context.
- Triage and risk scoring - classify as benign, suspicious, or malicious with a risk score.
- Containment and remediation - isolate affected accounts and remove or quarantine messages.
- Forensics, documentation, and lessons - preserve evidence, update blocklists, and report outcomes.
Each stage includes specific actions below with measurable targets and commands you can run.
What should we do next?
- Apply this checklist to 1 to 3 recent phishing reports as a tabletop exercise within 7 days.
- Implement one-click reporting across your mail clients and forward new reports to a dedicated queue or ticket.
- If you lack 24-7 coverage or want a fast assessment, run a CyberReplay scorecard to identify gaps in email controls and response playbooks: CyberReplay scorecard.
If you prefer hands-on assistance, consider a rapid incident readiness review or managed response capability discovery with CyberReplay: CyberReplay incident readiness review. For a quick scheduling option, we also offer a 15 minute planning call: schedule your assessment.
References
- NIST Computer Security Incident Handling Guide (SP 800-61 Rev. 2)
- CISA: Technical Approaches to Uncovering and Remediating Phishing Infrastructure (AA22-086A)
- Microsoft: Responding to Phishing Attacks in Microsoft 365
- Google Workspace: Email Spoofing and Phishing - Security Best Practices
- SANS Institute: Phishing Defense - How to Detect, Respond, and Recover (white paper)
- FBI: Business Email Compromise (BEC) Guidance
- IBM: Cost of a Data Breach Report 2023
- CERT NZ: Phishing Response Guidance for Organizations
These source pages provide actionable controls, playbook examples, and industry data you can cite when building SLAs and legal evidence packages.
when this matters
This checklist matters when reported email or automated detection indicates potential credential capture, invoice diversion, or an attachment exploit. Typical triggers include:
- User reports of credential prompts after clicking a link.
- A finance-targeted invoice request, especially with urgency or off-channel changes.
- Alerts from URL detonation or attachment sandbox that show exploit behavior.
- Multiple users reporting the same message or simultaneous delivery to many recipients.
Use this section to map trigger events to the triage rubric above so analysts act consistently based on observable signals.
definitions
- IOC: Indicator of compromise. Observable artifact such as a malicious domain, IP, or file hash.
- SPF: Sender Policy Framework. DNS record that identifies permitted senders for a domain.
- DKIM: DomainKeys Identified Mail. Cryptographic signature that verifies message origin and integrity.
- DMARC: Domain-based Message Authentication, Reporting and Conformance. Policy that combines SPF and DKIM results to provide handling instructions.
- Quarantine: A mailbox or tenant action that holds suspect mail from normal delivery pending review.
- Chain of custody: Logged sequence of actions showing when evidence was exported, who handled it, and where it is stored.
- MSSP: Managed Security Service Provider. External provider that delivers monitoring and response services.
- MTTR: Mean time to respond. Average time from report to acknowledgement and initial action.
- MTTC: Mean time to contain. Average time from detection to containment action completion.
common mistakes
- Treating all reported mail as equal. Not triaging by risk leads to unnecessary disruption and analyst overload.
- Exporting evidence without hashing or logging the exporter and timestamp. This breaks admissibility for legal or insurance claims.
- Overly broad automatic quarantines that block business-critical mailflows without a rollback plan.
- Not instrumenting telemetry to capture mailbox and endpoint context together, which impairs root cause analysis.
- Relying on manual steps for intake and enrichment. This increases time-to-contain and analyst toil.
Mitigations: codify a small, fast triage rubric, require hash and log on every export, test rollback procedures quarterly, and automate enrichment where possible.
faq
This FAQ groups the specific how-to questions already in the article for quicker reference.
- How do we preserve chain-of-custody for email evidence? See the guidance above in the Forensics and evidence preservation checklist section.
- Can we automate quarantine without blocking legitimate mail? See the Can we automate quarantine without blocking legitimate mail? section for recommended patterns and testing.
- Is outsourcing phishing response to an MSSP cost effective? See the Is outsourcing phishing response to an MSSP cost effective? section for assessment pointers.
- How long should we retain phishing artifacts? See the How long should we retain phishing artifacts? section for baseline retention guidance.
next step
Prioritize two low friction actions this week:
- Run a CyberReplay scorecard to identify the top 3 gaps in your email controls and response playbooks: CyberReplay scorecard.
- If gaps include coverage or forensic capability, schedule an incident readiness review: CyberReplay incident readiness review.
These next steps provide a prioritized plan you can track and present to leadership.