heroui logo

O365 DLP Rule Triggered

Splunk Security Content

View Source
Summary
The "O365 DLP Rule Triggered" anomaly detection rule identifies occurrences when Data Loss Prevention (DLP) rules within Microsoft Office 365 are activated. The detection is based on the Office 365 Universal Audit Log, capturing specific operations tied to DLP rule violations. Upon triggering, the rule aggregates relevant information such as the user initiating the action, the recipient affected, and the details of the DLP policies involved. This includes identifying the conditions matched, reasons for the triggering, and actions taken as specified in the DLP configuration. Given that DLP rules can vary significantly in their configuration for security, regulatory, or compliance purposes, it is essential to cross-reference these detections with the established DLP configurations to assess their validity and relevance to security incidents. False positives are possible, particularly due to the variability and accuracy of DLP rules, necessitating appropriate tuning for improved precision.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Pod
  • User Account
  • Cloud Service
  • Application Log
ATT&CK Techniques
  • T1048
  • T1567
  • T1566
Created: 2024-11-14