You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/fusion.md
+20-10Lines changed: 20 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,17 +44,19 @@ Rule templates are not applicable for the advanced multistage attack detection.
44
44
45
45
Using advanced multistage attack detection, Azure Sentinel supports the following scenarios that combine anomaly events from Azure Active Directory Identity Protection and Microsoft Cloud App Security:
46
46
47
-
-[Impossible travel to atypical location](#impossible-travel-to-atypical-location)
48
-
-[Sign-in activity for unfamiliar location](#sign-in-activity-for-unfamiliar-location)
49
-
-[Sign-in activity from infected device](#sign-in-activity-from-infected-device)
50
-
-[Sign-in activity from anonymous IP address](#sign-in-activity-from-anonymous-ip-address)
51
-
-[Sign-in activity from user with leaked credentials](#sign-in-activity-from-user-with-leaked-credentials)
47
+
-[Impossible travel to atypical location followed by anomalous Office 365 activity](#impossible-travel-to-atypical-location)
48
+
-[Sign-in activity for unfamiliar location followed by anomalous Office 365 activity](#sign-in-activity-for-unfamiliar-location)
49
+
-[Sign-in activity from infected device followed by anomalous Office 365 activity](#sign-in-activity-from-infected-device)
50
+
-[Sign-in activity from anonymous IP address followed by anomalous Office 365 activity](#sign-in-activity-from-anonymous-ip-address)
51
+
-[Sign-in activity from user with leaked credentials followed by anomalous Office 365 activity](#sign-in-activity-from-user-with-leaked-credentials)
52
52
53
53
You must have the [Azure AD Identity Protection data connector](connect-azure-ad-identity-protection.md) and the [Cloud App Security](connect-cloud-app-security.md) connectors configured.
54
54
55
55
In the descriptions that follow, Azure Sentinel will display the actual value from your data that is represented on this page as variables in brackets. For example, the actual display name of an account rather than \<*account name*>, and the actual number rather than \<*number*>.
56
56
57
-
### Impossible travel to atypical location
57
+
### Impossible travel to atypical location followed by anomalous Office 365 activity
58
+
59
+
There are seven possible Azure Sentinel incidents that combine impossible travel to atypical location alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
58
60
59
61
-**Impossible travel to atypical locations leading to Office 365 mailbox exfiltration**
60
62
@@ -101,7 +103,9 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
101
103
This activity pattern is indicative of a potential ransomware attack.
102
104
103
105
104
-
### Sign-in activity for unfamiliar location
106
+
### Sign-in activity for unfamiliar location followed by anomalous Office 365 activity
107
+
108
+
There are seven possible Azure Sentinel incidents that combine sign-in activity for unfamiliar location alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
105
109
106
110
-**Sign-in event from an unfamiliar location leading to Exchange Online mailbox exfiltration**
107
111
@@ -147,7 +151,9 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
147
151
148
152
This activity pattern is indicative of a potential ransomware attack.
149
153
150
-
### Sign-in activity from infected device
154
+
### Sign-in activity from infected device followed by anomalous Office 365 activity
155
+
156
+
There are seven possible Azure Sentinel incidents that combine sign-in activity from infected device alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
151
157
152
158
-**Sign-in event from an infected device leading to Office 365 mailbox exfiltration**
153
159
@@ -193,7 +199,9 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
193
199
194
200
This activity pattern is indicative of a potential ransomware attack.
195
201
196
-
### Sign-in activity from anonymous IP address
202
+
### Sign-in activity from anonymous IP address followed by anomalous Office 365 activity
203
+
204
+
There are seven possible Azure Sentinel incidents that combine sign-in activity from anonymous IP address alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
197
205
198
206
-**Sign-in event from an anonymous IP address leading to Office 365 mailbox exfiltration**
199
207
@@ -239,7 +247,9 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
239
247
240
248
This activity pattern is indicative of a potential ransomware attack.
241
249
242
-
### Sign-in activity from user with leaked credentials
250
+
### Sign-in activity from user with leaked credentials followed by anomalous Office 365 activity
251
+
252
+
There are seven possible Azure Sentinel incidents that combine sign-in activity from user with leaked credentials alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
243
253
244
254
-**Sign-in event from User with leaked credentials leading to Office 365 mailbox exfiltration**
0 commit comments