heroui logo

O365 Security And Compliance Alert Triggered

Splunk Security Content

View Source
Summary
This analytic rule detects events triggered by the Office 365 Security and Compliance Center, focusing specifically on alerts related to potential threats and policy violations. It utilizes the `o365_management_activity` dataset and targets events where the workload is identified as SecurityComplianceCenter and the operation is defined as AlertTriggered. Such alerts signal critical security and compliance concerns within the Office 365 environment, indicating possible attempts to exploit vulnerabilities or violate organizational policies. The rule processes various details from the alerts, such as user identity, alert descriptions, and severity levels, thereby providing essential insights into the state of organizational security. False positives may occur due to legitimate actions triggering alerts, and users are advised to filter results accordingly. An installation of the Splunk Microsoft Office 365 Add-on is required to ingest necessary management activity events. Furthermore, the alerts provide a way to recognize account takeover attempts, leveraging MITRE ATT&CK techniques T1078 and T1078.004.
Categories
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • User Account
ATT&CK Techniques
  • T1078
  • T1078.004
Created: 2024-11-14