
Summary
The rule focuses on detecting potentially malicious attempts to bypass mailbox audit logging in Microsoft 365. Mailbox auditing aids in tracking user activities related to emails, such as access and deletion. However, administrators can designate certain accounts to be exempt from logging to reduce log clutter. This exemption can be misused by attackers to hide their activities by exploiting these bypass associations, which allows them to perform actions without generating log entries. The detection rule identifies successful attempts to create such bypass associations through the Set-MailboxAuditBypassAssociation action, which can signal misuse of administrative controls. Investigation involves confirming the legitimacy of the requests and ensuring that only approved accounts have such exemptions. The rule emphasizes the importance of reviewing and auditing bypass associations for security compliance and to prevent unauthorized accesses.
Categories
- Cloud
- Identity Management
- Application
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1562
- T1562.001
Created: 2022-01-13