Excessive M365 File Deletion at an Unusual Time
Last updated on:
In this page
About the rule
Rule Type
Anomaly
Rule Description
Detects high-volume file deletions during non-standard hours.
Severity
Attention
Rule Requirement
Criteria
Action1:
actionname = "DETECTION_ACTION_M365_FILE_DELETED"
| isanomalous(User at an unusual Time)
| isanomalous(User with abnormal Count)
| isanomalous(User with unusual IP Address)
select Action1.TARGET_NAME,Action1.CALLER,Action1.RESOURCE,Action1.FILETYPE,Action1.TARGET,Action1.IPADDRESS,Action1.USERAGENT,Action1.OBJURL,Action1.OPERATION
Detection
Execution Mode
Intelligent
Log Sources
Microsoft 365


