You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create a promotion rule to capture all threat intelligence signals from Microsoft Defender for Office 365 in M365 audit logs. Includes valuable signals such as email phishing and more.
Target Ruleset
o365
Target Rule Type
Custom (KQL or Lucene)
Tested ECS Version
No response
Query
event.dataset: "o365.audit" and event.code: "ThreatIntelligence"
New fields required in ECS/data sources for this rule?