Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Identifies a chain of events, where a new Power App is created, followed by mulitple users launching the app within the detection window and clicking on the same malicious URL.
| Attribute | Value |
|---|---|
| Type | Analytic Rule |
| Solution | Microsoft Business Applications |
| ID | 4bd7e93a-0646-4e02-8dcb-aa16d16618f4 |
| Severity | High |
| Status | Available |
| Kind | Scheduled |
| Tactics | InitialAccess |
| Techniques | T1189, T1566 |
| Required Connectors | PowerPlatformAdmin, MicrosoftThreatProtection, ThreatIntelligence, ThreatIntelligenceTaxii, MicrosoftDefenderThreatIntelligence, ThreatIntelligence, ThreatIntelligenceTaxii, MicrosoftDefenderThreatIntelligence, MicrosoftThreatProtection, AzureActiveDirectoryIdentityProtection |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
PowerPlatformAdminActivity |
✓ | ✗ | ? |
SecurityAlert |
✓ | ✗ | ? |
ThreatIntelligenceIndicator |
✓ | ✓ | ? |
UrlClickEvents |
✓ | ✗ | ? |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Analytic Rules · Back to Microsoft Business Applications