No need to keep watch once it starts the actual scan run. This here you can start & once it is under way, you can leave the machine alone & let it run over-night. I will guide you on doing a few system scans. Is it possible you used a new device to access Thunderbird or Outlook ( thus, it might have triggered some kind of automated alert at the Email provider ? Q: Do you use strong passwords on your Email accounts ? Does each accont have its own password ? Maybe ( ? ) tweaked something in Thunderbird to do something new for the Outlook account ?Īre you sure that you did not somehow leave your Email address out on a social media venue ? Where & how to check Headers on Thunderbirdīe sure to check to see that Thunderbird is the latest release version.ĭid you make any recent adjustments that somehow "linked" one Email account to another ? See these references on How to go about looking for HEADERS That they are not phishing emails or fake made-up lures. Regarding email notifications from Microsoft ( or, any other "notifier" about potential compromise):īe sure to determine that those "emails" are not fake. Endpoint Detection & Response for Servers
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |