diff --git a/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml b/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml index 664eae25d..a0d99b418 100644 --- a/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml +++ b/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml @@ -1,4 +1,4 @@ -title: Microsoft 365 - Potential ransomware activity +title: Microsoft 365 - Potential Ransomware Activity id: bd132164-884a-48f1-aa2d-c6d646b04c69 status: experimental description: Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.