Skip to content

Commit e05958d

Browse files
authored
Update o365_email_send_attachments_excessive_volume.yml
1 parent 67adb94 commit e05958d

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

detections/cloud/o365_email_send_attachments_excessive_volume.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ id: 70a050a2-8537-488a-a628-b60a9558d96a
33
version: 1
44
date: '2025-01-20'
55
author: Steven Dick
6+
status: production
67
type: Anomaly
78
description: The following analytic identifies when an O365 email account sends an excessive number of email attachments to external recipients within a short period (within 1 hour). This behavior may indicate a compromised account where the threat actor is attempting to exfiltrate data from the mailbox. Threat actors may attempt to transfer data through email as a simple means of exfiltration from the compromised mailbox. Some account owner legitimate behaviors can trigger this alert, however these actions may not be aligned with organizational expectations / best practice behaviors.
89
data_source:
@@ -32,7 +33,7 @@ search: |-
3233
| `security_content_ctime(lastTime)`
3334
| `o365_email_send_attachments_excessive_volume_filter`
3435
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest Office 365 management activity events AND Message Trace events.
35-
known_false_positives: Users or processes that are send a larage number of attachments may trigger this alert, adjust thresholds accordingly.
36+
known_false_positives: Users or processes that are send a large number of attachments may trigger this alert, adjust thresholds accordingly.
3637
references:
3738
- https://attack.mitre.org/techniques/T1114/
3839
- https://www.hhs.gov/sites/default/files/help-desk-social-engineering-sector-alert-tlpclear.pdf

0 commit comments

Comments
 (0)