New detection rules for Office 365 🕵️ 📧
In order to improve our detection capacity, we are developing detection rules for new intakes such as Office 365.
We have divided these rules into three main categories:
* Detection of the deactivation of safety measures. Attackers would be interested in disabling options such as Office 365 anti-phishing rules or email attachment scanning rules, and then infect your information system.
* Detection of a malicious file upload to Office file sharing services such as OneDrive or Sharepoint. These services can be used by attackers to lateralise into your networks.
* Detection of suspicious user behaviour such as downloading large numbers of files or deleting large numbers of files.
![oc_rules_catalog_office_365.png](BASE/products/901462981/changelog/9651/inline-a283ec8ff35655c70d303bda75500fc8.jpg)
Other detection rules can be found on SEKOIA.IO XDR, in the [rules catalog page](https://app.sekoia.io/operations/rules-catalog). Those that have been updated recently appear at the top of the list.