event.dataset:azure.signinlogs and
azure.signinlogs.properties.app_display_name:"Azure Active Directory PowerShell" and
azure.signinlogs.properties.token_issuer_type:AzureAD and event.outcome:(success or Success)
Install detection rules in Elastic Security
Detect Azure Active Directory PowerShell Sign-in in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(opens in a new tab or window).