-
Notifications
You must be signed in to change notification settings - Fork 629
Closed
Labels
Domain: SaaSDomain: StorageIntegration: Microsoft 365Rule: Tuningtweaking or tuning an existing ruletweaking or tuning an existing rule
Description
Summary
Tuning the M365 OneDrive/SharePoint Excessive File Downloads rule to reduce false positives and improve detection coverage.
Changes
Excluded First-Party Microsoft Applications
Added exclusions for noisy first-party Microsoft applications that generate legitimate high-volume file download activity:
08e18876-6177-487e-b8b5-cf950c1e598c- SharePoint Online Web Client Extensibilityfb8d773d-7ef8-4ec0-a117-179f88add510- Enterprise Copilot Platformd3590ed6-52b3-4102-aeff-aad2292ab01c- Microsoft Office7ab7862c-4c57-491e-8a45-d52a7e023983- App Service
Removed OAuth Authentication Requirement
Removed the OAuth-specific filtering to expand detection coverage. Previously, the rule was scoped to OAuth-based authentication methods, which could result in false negatives when adversaries access OneDrive/SharePoint through other authentication methods besides OAuth phishing (e.g., Device Code Authentication phishing).
Updated Investigation Guide
- Renamed investigation guide section title to match the rule name
- Added guidance to review
token.idfield to determine if OAuth authentication was used
Updated References
Added references related to recent threat actor TTPs:
Notes
- The
event.providerwill always beOneDrivefor theFileDownloadedevent action - This rule will fire on both SharePoint and OneDrive downloads since we do not filter on M365 data source exclusively for either
- These changes align with observed ShinyHunters TTPs targeting cloud storage for data exfiltration
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
Domain: SaaSDomain: StorageIntegration: Microsoft 365Rule: Tuningtweaking or tuning an existing ruletweaking or tuning an existing rule