FROM logs-o365.audit-*
| WHERE @timestamp > now() - 14 day
| WHERE
event.dataset == "o365.audit" and
// filter on files downloaded from OneDrive
event.provider == "OneDrive" and
event.action == "FileDownloaded" and
// filter on OAuth authentication which encompasses device code workflow
o365.audit.AuthenticationType == "OAuth"
and event.outcome == "success"
// bucket authentication attempts by 1 minute
| EVAL target_time_window = DATE_TRUNC(1 minutes, @timestamp)
| KEEP target_time_window, o365.audit.UserId, file.name, source.ip
// aggregate on unique file names and download attempts
| STATS unique_file_count = count_distinct(file.name), download_attempt_count = count(*) BY target_time_window, o365.audit.UserId, source.ip
// adjustable range for "excessive" unique files that were downloaded
| WHERE unique_file_count >= 25
Install detection rules in Elastic Security
Detect M365 OneDrive Excessive File Downloads with OAuth Token in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).