
Summary
The detection rule focuses on identifying potential malicious attempts to alter Microsoft 365 Exchange malware filter rules, either through deletions or modifications that could bypass existing email security measures. It leverages audit logs to monitor specific actions like 'Remove-MalwareFilterRule' or 'Disable-MalwareFilterRule' to catch unauthorized changes. The rule highlights the risks posed by adversaries or insiders seeking to evade detection by manipulating critical security configurations. To manage false positives stemming from legitimate administrative actions, users are encouraged to verify the legitimacy and necessity of rule changes. The detection logic is configured to alert security teams on successful attempts to modify these rules, enabling a prompt investigation into the intent behind such actions. Response procedures are detailed for mitigating unauthorized changes, which include re-enabling malware rules, isolating affected accounts, conducting thorough reviews of related logs, and refining monitoring capabilities to strengthen the organization's defensive posture against similar threats in the future.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
- Web Credential
ATT&CK Techniques
- T1562
Created: 2020-11-19