01Identify lookalike domains and Business Email Compromise (BEC) attempts
02Track and manage threat remediation incidents for mailbox cleanups
03Monitor real-time URL click events and post-click scan results
04Retrieve administrative audit logs for compliance and forensic investigations
0512 GitHub stars
06Analyze TTP logs for URL, attachment, and impersonation protection