Windows suspicious PowerShell mailbox export to share

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Exchange PowerShell commands that export mailbox contents to file shares for potential data exfiltration.

Strategy

This rule monitors PowerShell script block logging through @Event.EventData.Data.ScriptBlockText for Exchange management commands using New-MailboxExportRequest with both -Mailbox and -FilePath parameters. The cmdlet exports mailbox contents to PST files at specified network locations.

While this functionality serves legitimate administrative purposes, it represents a high-risk activity that allows attackers with Exchange management privileges to collect email data en masse for exfiltration. The exported PST files contain complete mailbox contents that can be easily transferred outside the organization.

Triage & Response

  • Examine the full PowerShell command on {{host}} to identify targeted mailboxes and export destinations.
  • Verify authorization status and business justification for the export operation.
  • Evaluate the legitimacy of the destination path for exported PST files.
  • Check file sizes and contents of exported mailbox data.
  • Monitor for subsequent file transfer or archiving activities.
  • Track additional access to mailboxes by the same user account.
  • Review Exchange audit logs for additional suspicious activities.