From 4e29dc9c45d8802c81b119d3fc5ca8d06e2e9e28 Mon Sep 17 00:00:00 2001 From: frack113 <62423083+frack113@users.noreply.github.com> Date: Fri, 20 Aug 2021 09:06:16 +0200 Subject: [PATCH] fix title --- rules/cloud/m365/microsoft365_potential_ransomware_activity.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml b/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml index 664eae25d..a0d99b418 100644 --- a/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml +++ b/rules/cloud/m365/microsoft365_potential_ransomware_activity.yml @@ -1,4 +1,4 @@ -title: Microsoft 365 - Potential ransomware activity +title: Microsoft 365 - Potential Ransomware Activity id: bd132164-884a-48f1-aa2d-c6d646b04c69 status: experimental description: Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.