Skip to content

Commit 7e9f150

Browse files
committed
add url toolbox requirement
1 parent 6dd60e8 commit 7e9f150

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

detections/cloud/o365_suspicious_mailbox_rule_created.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,8 @@ search: '`o365_management_activity` Workload=Exchange Operation="New-InboxRule"
1717
"^(RSS|Conversation History|Archive)"), 1, 0) | eval suspicious_score=entropy_score+len_score+read_score+folder_score
1818
| where suspicious_score>2 | `o365_suspicious_mailbox_rule_created_filter`'
1919
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest
20-
Office 365 management activity events.
20+
Office 365 management activity events. You also need to have the Splunk TA URL
21+
Toolbox (https://splunkbase.splunk.com/app/2734/) installed.
2122
known_false_positives: Short rule names may trigger false positives. Adjust
2223
the entropy and length thresholds as needed.
2324
references:

0 commit comments

Comments
 (0)