We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent ffc6443 commit 977c678Copy full SHA for 977c678
detections/cloud/o365_email_transport_rule_changed.yml
@@ -16,7 +16,7 @@ search: '`o365_management_activity` Workload=Exchange AND Operation IN ("Set-*",
16
| `security_content_ctime(firstTime)`
17
| `security_content_ctime(lastTime)`
18
| `o365_email_transport_rule_changed_filter`'
19
-how_to_implement:
+how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events.
20
known_false_positives: Legitimate administrative changes for business needs.
21
references:
22
- https://attack.mitre.org/techniques/T1114/003/
0 commit comments