PowerShell Sign-In Detected

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Identifies when a user signs in using PowerShell, which may indicate administrative or scripted access.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_M365_SUCCESSFUL_LOGON" AND (APPLICATIONNAME contains "powershell") select Action1.CALLER,Action1.ERRORCODE,Action1.APPLICATIONNAME,Action1.IPADDRESS,Action1.COUNTRYCODE,Action1.RISK_LEVEL,Action1.RESULT

Detection

Execution Mode

realtime

Log Sources

Microsoft 365