- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects suspicious access to Microsoft Teams storage locations that may indicate credential or token theft attempts.
This rule monitors Windows event logs for object access events related to sensitive Microsoft Teams storage locations. It specifically looks for Windows Event ID 4663
(An attempt was made to access an object) where the ObjectName contains either Teams local storage level database files or Microsoft Teams Cookies. These locations store authentication tokens, session data, and other sensitive information that is valuable to attackers. Unauthorized access to these files could indicate an attempt to steal Microsoft Teams access tokens, which can be used to impersonate users, access sensitive communications, or pivot to other Microsoft 365 services.
{{host}}
to determine which specific Teams-related files were accessed.