Detectionmediumtest
Microsoft 365 - Unusual Volume of File Deletion
Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Microsoft 365threat_management
ProductMicrosoft 365← raw: m365
Servicethreat_management← raw: threat_management
Detection Logic
Detection Logic1 selector
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Unusual volume of file deletion'
status: success
condition: selectionFalse Positives
Unknown
False positive likelihood has not been assessed. Additional context may be needed during triage.
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
78a34b67-3c39-4886-8fb4-61c46dc18ecd
Status
test
Level
medium
Type
Detection
Created
Thu Aug 19
Modified
Sun Oct 09
Author
Path
rules/cloud/m365/threat_management/microsoft365_unusual_volume_of_file_deletion.yml
Raw Tags
attack.impactattack.t1485