Skip to content

Commit 64057ab

Browse files
author
cabailey
committed
fix link & formatting
1 parent 5ee50ab commit 64057ab

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/sentinel/fusion.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Rule templates are not applicable for the advanced multistage attack detection.
4444

4545
Using advanced multistage attack detection, Azure Sentinel supports the following scenarios that combine anomaly events from Azure Active Directory Identity Protection and Microsoft Cloud App Security:
4646

47-
- [Impossible travel to atypical location followed by anomalous Office 365 activity](##impossible-travel-to-atypical-location-followed-by-anomalous-office-365-activity)
47+
- [Impossible travel to atypical location followed by anomalous Office 365 activity](#impossible-travel-to-atypical-location-followed-by-anomalous-office-365-activity)
4848
- [Sign-in activity for unfamiliar location followed by anomalous Office 365 activity](#sign-in-activity-for-unfamiliar-location-followed-by-anomalous-office-365-activity)
4949
- [Sign-in activity from infected device followed by anomalous Office 365 activity](#sign-in-activity-from-infected-device-followed-by-anomalous-office-365-activity)
5050
- [Sign-in activity from anonymous IP address followed by anomalous Office 365 activity](#sign-in-activity-from-anonymous-ip-address-followed-by-anomalous-office-365-activity)
@@ -56,7 +56,7 @@ In the descriptions that follow, Azure Sentinel will display the actual value fr
5656

5757
### Impossible travel to atypical location followed by anomalous Office 365 activity
5858

59-
There are seven possible Azure Sentinel incidents that combine impossible travel to atypical location alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
59+
There are seven possible Azure Sentinel incidents that combine impossible travel to atypical location alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security:
6060

6161
- **Impossible travel to atypical locations leading to Office 365 mailbox exfiltration**
6262

@@ -153,7 +153,7 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
153153

154154
### Sign-in activity from infected device followed by anomalous Office 365 activity
155155

156-
There are seven possible Azure Sentinel incidents that combine sign-in activity from infected device alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
156+
There are seven possible Azure Sentinel incidents that combine sign-in activity from infected device alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security:
157157

158158
- **Sign-in event from an infected device leading to Office 365 mailbox exfiltration**
159159

@@ -201,7 +201,7 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
201201

202202
### Sign-in activity from anonymous IP address followed by anomalous Office 365 activity
203203

204-
There are seven possible Azure Sentinel incidents that combine sign-in activity from anonymous IP address alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
204+
There are seven possible Azure Sentinel incidents that combine sign-in activity from anonymous IP address alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security:
205205

206206
- **Sign-in event from an anonymous IP address leading to Office 365 mailbox exfiltration**
207207

@@ -249,9 +249,9 @@ There are seven possible Azure Sentinel incidents that combine sign-in activity
249249

250250
### Sign-in activity from user with leaked credentials followed by anomalous Office 365 activity
251251

252-
There are seven possible Azure Sentinel incidents that combine sign-in activity from user with leaked credentials alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security.
252+
There are seven possible Azure Sentinel incidents that combine sign-in activity from user with leaked credentials alerts from Azure AD Identity Protection and anomalous Office 365 alerts generated by Microsoft Cloud App Security:
253253

254-
- **Sign-in event from User with leaked credentials leading to Office 365 mailbox exfiltration**
254+
- **Sign-in event from user with leaked credentials leading to Office 365 mailbox exfiltration**
255255

256256
This alert is an indication that the sign-in event by \<*account name*> used leaked credentials, followed by a suspicious inbox forwarding rule was set on a user's inbox.
257257

0 commit comments

Comments
 (0)