You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
how_to_implement: You must install the Splunk Microsoft Office 365 Add-on and ingest
23
24
Office 365 management activity events. You also need to have the Splunk TA URL
@@ -28,15 +29,15 @@ references:
28
29
- https://attack.mitre.org/techniques/T1564/008/
29
30
drilldown_searches:
30
31
- name: View the detection results for - "$user$"
31
-
search: '%original_detection_search% | search dest = "$user$"'
32
+
search: '%original_detection_search% | search user = "$user$"'
32
33
earliest_offset: $info_min_time$
33
34
latest_offset: $info_max_time$
34
35
- name: View risk events for the last 7 days for $user$
35
36
search: '| from datamodel Risk.All_Risk | search normalized_risk_object="$user$" starthoursago=168 endhoursago=1 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
36
37
earliest_offset: $info_min_time$
37
38
latest_offset: $info_max_time$
38
39
rba:
39
-
message: Potential BEC mailbox rule was created by $user$
40
+
message: Potential BEC mailbox rule - $Name$ was created by user - $user$
0 commit comments