M365 Short Lived Accounts
Last updated on:
In this page
About the rule
Rule Type
Advanced
Rule Description
Detects user accounts that are created and deleted within 24 hours which is a tactic often used by attackers to avoid detection.
Severity
Critical
Rule Requirement
Criteria
Action1:
actionname = "DETECTION_ACTION_M365_USER_CREATED"
Action2:
actionname = "DETECTION_ACTION_M365_USER_DELETED" AND TARGET_ID = Action1.TARGET_ID
sequence:Action1 followedby Action2 within 1440m
select Action1.CALLER,Action1.TARGET,Action1.RESULT,Action1.MODIFIED_PROPERTIES_GD,Action1.TARGET_ID,Action1.OPERATION,Action2.CALLER,Action2.TARGET,Action2.RESULT,Action2.MODIFIED_PROPERTIES_GD,Action2.TARGET_ID,Action2.OPERATION
Detection
Execution Mode
realtime
Log Sources
Microsoft 365


