heroui logo

Microsoft 365 Unusual Volume of File Deletion

Elastic Detection Rules

View Source
Summary
The detection rule titled 'Microsoft 365 Unusual Volume of File Deletion' effectively identifies unusual patterns of file deletion within Microsoft 365 environments by leveraging event logs from Microsoft Cloud App Security. This rule triggers alerts when a specified user account deletes a significantly large number of files within a defined time frame. The alerting mechanism is built upon analyzing audit logs for successful deletion actions that are deemed anomalous compared to typical user behavior. False positives are handled by investigating common scenarios like system administrators performing cleanup tasks or legitimate data migration operations. The investigation consists of reviewing user activities, correlating with other events, and confirming the intent behind the deletions, ultimately aimed at distinguishing malicious conduct from legitimate actions. The response strategies include isolating affected accounts, restoring critical files, and implementing stricter access controls to mitigate the chances of future incidents. This rule aligns with the broader cybersecurity framework by addressing potential data destruction—a valid concern for organizations leveraging cloud services. Regular review of this rule and potential exceptions is necessary to maintain its effectiveness in distinguishing between genuine threats and benign activities.
Categories
  • Cloud
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1485
Created: 2021-07-15