Excessive M365 File Deletion at an Unusual Time
Last updated on:
In this page
About the rule
Rule Type
Anomaly
Rule Description
Detects high-volume file deletions during non-standard hours.
Severity
Attention
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_M365_FILE_DELETED" | isanomalous(User at an unusual Time) | isanomalous(User with abnormal Count) | isanomalous(User with unusual IP Address) select Action1.TARGET_NAME,Action1.CALLER,Action1.RESOURCE,Action1.FILETYPE,Action1.TARGET,Action1.IPADDRESS,Action1.SIZE_I,Action1.USERAGENT,Action1.REF_URL,Action1.OBJURL,Action1.OPERATION
Detection
Execution Mode
Intelligent
Log Sources
Microsoft 365


