Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
5 Days |
Required Data |
|
Detection Modules |
Cloud |
Detector Tags |
Microsoft Graph Activity Logs |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
Unusual access was detected to a Microsoft 365 storage service.
Attacker's Goals
Extract sensitive information stored in Microsoft 365 storage services.
Investigative actions
- Determine which items were accessed.
- Identify whether they contained any sensitive information.
- Check for signs of compromise identity, such as abnormal login activity or unusual behavior.
- Verify if the identity is authorized to access these drives.
- Monitor the identity for any further suspicious actions.