← Library
yara-lApache-2.0from chronicle/detection-rules

o365_ADPowerShell_app_login_subsequent_activity

Once a user authenticates to the Azure AD PowerShell application, if they take multiple admin actions indicative of establishing their own persistence with an Entra ID application within a portion of the access token time, alert for additional investigation

Quality
90
FP risk
Forks
0
Views
0
ATT&CK techniques
Rule source🔒 locked
🔒

Sign in to view the rule source

Free accounts can view the source for the top-ranked rules. Create one in seconds — no credit card required.

Sign in →