Email data exfiltration via PowerShell

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Identify email exfiltration conducted by PowerShell.

Attribute Value
Type Hunting Query
Solution GitHub Only
ID 1115e499-45a0-470c-b0ec-e2f204831341
Tactics Exfiltration
Required Connectors MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries