An analyst has been tasked with providing a report that can be used to prioritise investigations based on a user's Attack Index score. Which report would be most suitable for this purpose?
Attack Index is a user-level risk/burden metric intended to help SOC teams prioritize which people to investigate first based on the amount and severity/diversity of threat activity directed at them (and often their exposure/interaction, depending on module). The report that directly supports that workflow is “Very Attacked People,” which is designed to surface users with the highest Attack Index and concentration of targeted threats. Operationally, this aligns with IR queue management: instead of treating all alerts equally, analysts use user-centric risk ranking to focus on likely compromise candidates (e.g., frequent recipients of credential phishing, repeated exposure to the same campaign, or elevated threat severity). “Top 10 Recipients” is volume-oriented and may include benign bulk mail; “Top 10 Clickers” is behavior-oriented but does not necessarily reflect overall threat burden; and “VIP Activity” is scoped to a subset (VIPs) rather than the complete organization’s risk ranking. In Proofpoint-led IR best practice, this report is commonly used to drive daily standups, assign investigations, and justify proactive account checks (MFA posture, suspicious logins, mailbox rules) for the highest-risk users.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit