detect-archive-exfiltration-to-competitor

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query can be used to detect instances of a malicious insider creating a file archive and then emailing that archive to an external "competitor" organization.

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 8baad907-3b15-4f26-be09-dbba3d32fc3f
Tactics Exfiltration
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceFileEvents ?
EmailEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries