Skip to content

Commit 977c678

Browse files
authored
Update o365_email_transport_rule_changed.yml
1 parent ffc6443 commit 977c678

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/cloud/o365_email_transport_rule_changed.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ search: '`o365_management_activity` Workload=Exchange AND Operation IN ("Set-*",
1616
| `security_content_ctime(firstTime)`
1717
| `security_content_ctime(lastTime)`
1818
| `o365_email_transport_rule_changed_filter`'
19-
how_to_implement:
19+
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events.
2020
known_false_positives: Legitimate administrative changes for business needs.
2121
references:
2222
- https://attack.mitre.org/techniques/T1114/003/

0 commit comments

Comments
 (0)