
Summary
This rule detects potential ransomware activity in Microsoft 365 environments by monitoring uploads of potentially infected files via Microsoft Cloud App Security. It operates based on specific event attributes derived from the o365.audit logs, focusing on events flagged as "Potential ransomware activity" with a successful outcome. The rule aims to mitigate risks associated with ransomware by triggering alerts whenever suspicious file uploads occur, allowing security teams to take prompt investigative and remedial action. By aligning with the MITRE ATT&CK framework, particularly the impact tactics, organizations can better respond to potential data encryption threats that ransomware poses.
Categories
- Cloud
- Identity Management
- Application
- Endpoint
Data Sources
- Cloud Service
- Application Log
- User Account
ATT&CK Techniques
- T1486
Created: 2021-07-15