Skip to content

Commit 5ee50ab

Browse files
author
cabailey
committed
fix branding
1 parent f529605 commit 5ee50ab

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/sentinel/fusion.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 9/18/2019
15+
ms.date: 9/20/2019
1616
ms.author: cabailey
1717

1818
---
@@ -56,7 +56,7 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
5656

5757
### Impossible travel to atypical location followed by anomalous Office 365 activity
5858

59-
There are seven possible Azure Sentinel incidents that combine impossible travel to atypical location alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
59+
There are seven possible Azure Sentinel incidents that combine impossible travel to atypical location alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
6060

6161
- **Impossible travel to atypical locations leading to Office 365 mailbox exfiltration**
6262

@@ -105,7 +105,7 @@ There are seven possible Azure Sentinel incidents that combine impossible travel
105105

106106
### Sign-in activity for unfamiliar location followed by anomalous Office 365 activity
107107

108-
There are seven possible Azure Sentinel incidents that combine sign-in activity for unfamiliar location alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
108+
There are seven possible Azure Sentinel incidents that combine sign-in activity for unfamiliar location alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
109109

110110
- **Sign-in event from an unfamiliar location leading to Exchange Online mailbox exfiltration**
111111

@@ -153,7 +153,7 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
153153

154154
### Sign-in activity from infected device followed by anomalous Office 365 activity
155155

156-
There are seven possible Azure Sentinel incidents that combine sign-in activity from infected device alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
156+
There are seven possible Azure Sentinel incidents that combine sign-in activity from infected device alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
157157

158158
- **Sign-in event from an infected device leading to Office 365 mailbox exfiltration**
159159

@@ -201,7 +201,7 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
201201

202202
### Sign-in activity from anonymous IP address followed by anomalous Office 365 activity
203203

204-
There are seven possible Azure Sentinel incidents that combine sign-in activity from anonymous IP address alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
204+
There are seven possible Azure Sentinel incidents that combine sign-in activity from anonymous IP address alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
205205

206206
- **Sign-in event from an anonymous IP address leading to Office 365 mailbox exfiltration**
207207

@@ -249,7 +249,7 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
249249

250250
### Sign-in activity from user with leaked credentials followed by anomalous Office 365 activity
251251

252-
There are seven possible Azure Sentinel incidents that combine sign-in activity from user with leaked credentials alerts from Azure Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
252+
There are seven possible Azure Sentinel incidents that combine sign-in activity from user with leaked credentials alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
253253

254254
- **Sign-in event from User with leaked credentials leading to Office 365 mailbox exfiltration**
255255

0 commit comments

Comments
 (0)