Skip to content

Commit b4783e0

Browse files
committed
remove enabled_by_default
1 parent a8a5ac8 commit b4783e0

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

detections/cloud/o365_suspicious_mailbox_rule_created.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ date: '2025-02-14'
55
author: 0xC0FFEEEE
66
type: TTP
77
status: production
8-
enabled_by_default: true
98
description: This analytic detects suspicious mailbox rule creation, a common technique used in Business Email Compromise. It uses a scoring mechanism to identify a combination of attributes often featured in mailbox rules created by attackers.
109
This may indicate that an attacker has gained access to the account.
1110
search: '`o365_management_activity` Workload=Exchange Operation="New-InboxRule" | rename Parameters{}.*

0 commit comments

Comments
 (0)