Excessive M365 File Deletion at an Unusual Time

Last updated on:

About the rule

Rule Type

Anomaly

Rule Description

Detects high-volume file deletions during non-standard hours.

Severity

Attention

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_M365_FILE_DELETED" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(User with unusual IP Address) select Action1.TARGET_NAME,Action1.CALLER,Action1.RESOURCE,Action1.FILETYPE,Action1.TARGET,Action1.IPADDRESS,Action1.SIZE_I,Action1.USERAGENT,Action1.REF_URL,Action1.OBJURL,Action1.OPERATION

Detection

Execution Mode

Intelligent

Log Sources

Microsoft 365