PowerShell Sign-In Detected
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Identifies when a user signs in using PowerShell, which may indicate administrative or scripted access.
Severity
Attention
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_M365_SUCCESSFUL_LOGON" AND (APPLICATIONNAME contains "powershell") select Action1.CALLER,Action1.ERRORCODE,Action1.APPLICATIONNAME,Action1.IPADDRESS,Action1.COUNTRYCODE,Action1.RISK_LEVEL,Action1.RESULT
Detection
Execution Mode
realtime
Log Sources
Microsoft 365


