Receive and analyze emails with rules in Sublime Security

This workflow is designed to automate the reception and analysis of user-reported suspicious emails, particularly phishing emails with .eml attachments. It captures new emails through an IMAP email trigger and transfers the attachments to a secure analysis platform for rule detection. The system automatically categorizes the analysis results and generates detailed reports, which are pushed in real-time to a designated Slack channel. Additionally, if an email is missing an attachment, the system will issue a reminder to ensure that the security team can quickly respond to potential threats.

Tags

Phishing AnalysisSublime Security

Workflow Name

Receive_and_analyze_emails_with_rules_in_Sublime_Security

Key Features and Highlights

This workflow automatically receives emails containing .eml attachments via an IMAP email trigger, focusing on centralized management and analysis of user-reported phishing emails. It securely transfers email attachments to the Sublime Security platform for multi-rule detection, automatically differentiates between matched and unmatched rule results, and formats detailed analysis reports which are then pushed to designated Slack channels. This ensures that the security team is promptly informed of potential threats. If an email lacks attachments, the system automatically sends a notification to alert relevant personnel.

Core Problems Addressed

  • Automates the capture of suspicious emails reported by users, eliminating delays and omissions caused by manual handling.
  • Utilizes security rules for precise email content analysis to quickly identify phishing and other security threats.
  • Delivers analysis results to the team in real time, enhancing response speed and collaboration efficiency.
  • Ensures the security and compliance of the email processing workflow, reducing the risk of false positives.

Use Cases

  • Automated phishing email handling in enterprise Security Operations Centers (SecOps).
  • Rapid identification and response to user-reported malicious emails by IT security teams.
  • Organizations requiring real-time communication of email security analysis results to team collaboration channels.

Main Workflow Steps

  1. Email Reception: Monitor a dedicated mailbox via IMAP trigger to capture new emails.
  2. Attachment Verification: Check whether the email contains attachments and confirm that the attachment type is .eml.
  3. Data Conversion: Convert the binary data of the email attachment into Base64 encoded format.
  4. Security Analysis: Invoke the Sublime Security API to perform rule-based detection on the email content.
  5. Result Classification: Use a code node to categorize analysis results into matched and unmatched rule groups.
  6. Message Formatting: Generate a report text including the count of matched rules and detailed rule names.
  7. Slack Notification: Send the formatted security analysis report to the specified Slack channel; if no attachment is found, send a missing attachment notification.

Involved Systems or Services

  • Outlook Mailbox (IMAP): Email retrieval.
  • Sublime Security: Email security detection and rule matching service.
  • Slack: Security incident reporting and team communication.
  • n8n: Automation workflow orchestration and execution platform.

Target Users and Value Proposition

  • Enterprise security teams and SecOps professionals aiming to improve phishing email response efficiency.
  • IT operations and security analysts seeking to reduce manual analysis workload and achieve security automation.
  • Any organization that requires integration of email security analysis with instant team notifications to enhance email threat management and team collaboration effectiveness.

Recommend Templates

Receive Updates When an Event Occurs in Asana

This workflow is capable of real-time monitoring changes to tasks and projects within a designated workspace in Asana, and automatically sends update notifications. Through this automation mechanism, team members can stay informed about task statuses in a timely manner, addressing the issue of information lag commonly found in traditional project management, and significantly enhancing communication efficiency and project transparency. It is suitable for various teams that rely on Asana for task management, helping them collaborate more effectively and advance project progress.

Asana AutomationEvent Notification

Batch Public Sharing and Direct Download Link Generation for Google Drive Files

This workflow automates the processing of files in Google Drive, allowing for the bulk retrieval of file lists from specified folders, quickly setting file permissions to "Anyone with the link can view," and generating corresponding direct download links. This process significantly enhances the efficiency of file sharing and public access, making it suitable for scenarios involving enterprises, teams, and educational institutions that need to centrally manage and share large volumes of files, greatly saving time and effort compared to manual operations.

Google Drive BulkPermission Management

Send Daily Weather Updates via a Message on Line

This workflow automatically retrieves weather information for Berlin every day and sends the day's temperature via Line messages, eliminating the cumbersome process of users manually checking the weather. It combines scheduled triggers and weather data interfaces to provide an unattended weather alert service, suitable for scenarios such as personal use, team management, and community management, enhancing the timeliness and convenience of information delivery.

Weather PushLine Notification

Automated Torrent Search and Download Notification Workflow

This workflow implements an automated movie seed search and download notification feature. After users submit a movie title request via Webhook, the system searches for relevant seeds on the KickassTorrents and Rarbg platforms and automatically downloads them using the Transmission client. Even if the Session ID becomes invalid, the system can automatically refresh and retry the download. Meanwhile, users receive real-time download status notifications through a Telegram bot, ensuring that the entire process is efficient and transparent, greatly enhancing the convenience of managing film and television resources.

seed downloadauto notification

Get Event-Triggered Notifications/Updates on Preferred Messaging Channels with TwentyCRM

This workflow automatically captures new events in TwentyCRM and sends the event information in real-time to predefined messaging channels (such as email and Slack). It also uniformly stores all event records in Google Sheets. The system intelligently distinguishes between event types, ensuring that critical deletion events are promptly communicated to the relevant personnel. Additionally, it enhances communication efficiency and data analysis capabilities, helping businesses achieve information transparency and reduce operational risks.

TwentyCRM NotificationAutomation Workflow

Exponential Backoff for Google APIs

This workflow helps users automatically handle rate limiting and error issues when calling Google APIs (such as Google Sheets) by implementing an exponential backoff mechanism. When a request fails, the system will increase the retry wait time according to an exponential pattern, with a configurable maximum number of retries. This enhances the success rate of API calls and ensures the stability of data synchronization and automated processes, making it suitable for scenarios that require frequent access to Google services.

Exponential BackoffGoogle API

Suspicious_login_detection (Anomalous Login Detection)

This workflow is primarily used for real-time monitoring of user login behavior, identifying abnormal logins, and quickly responding to potential security threats. By integrating various data sources, such as GreyNoise threat intelligence and IP-API geolocation services, it can automatically compare historical login records to determine if any abnormal behavior exists and issue alerts based on risk priority. It supports notifying users of abnormal situations via Slack and email, enhancing account security and providing an efficient threat handling mechanism for the security team.

Anomalous LoginThreat Intelligence

New WooCommerce Order to Slack

This workflow automatically monitors new orders on the WooCommerce platform. When the order amount reaches or exceeds 100, the order details are pushed in real-time to a designated Slack channel. Through conditional checks, it ensures that the team is promptly informed of high-value order updates, enhancing response speed and customer service quality, reducing manual monitoring costs, and promoting team collaboration. It is suitable for e-commerce operations, customer service, and sales teams, facilitating efficient order management and information sharing.

WooCommerce OrdersSlack Notifications