Skip to content

Commit 8079c6b

Browse files
authored
Merge pull request #103665 from AriSchorr1/patch-3
Update protect-against-consent-phishing.md
2 parents f02cb94 + 4f8bb20 commit 8079c6b

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/active-directory/manage-apps/protect-against-consent-phishing.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Administrators should be in control of application use by providing the right in
6262
- Block [consent phishing emails with Microsoft Defender for Office 365](/microsoft-365/security/office-365-security/set-up-anti-phishing-policies#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) by protecting against phishing campaigns where an attacker is impersonating a known user in the organization.
6363
- Configure Microsoft Defender for Cloud Apps policies to help manage abnormal application activity in the organization. For example, [activity policies](/cloud-app-security/user-activity-policies), [anomaly detection](/cloud-app-security/anomaly-detection-policy), and [OAuth app policies](/cloud-app-security/app-permission-policy).
6464
- Investigate and hunt for consent phishing attacks by following the guidance on [advanced hunting with Microsoft 365 Defender](/microsoft-365/security/defender/advanced-hunting-overview).
65-
- Allow access to trusted applications that meet certain criteria and that protect against those applications that don't:
65+
- Allow access to trusted applications that meet certain criteria and protect against those applications that don't:
6666
- [Configure user consent settings](./configure-user-consent.md?tabs=azure-portal) to allow users to only consent to applications that meet certain criteria, such as applications developed by your organization or from verified publishers and only for low risk permissions you select.
6767
- Use applications that have been publisher verified. [Publisher verification](../develop/publisher-verification-overview.md) helps administrators and users understand the authenticity of application developers through a Microsoft supported vetting process. Even if an application does have a verified publisher, it is still important to review the consent prompt to understand and evaluate the request. For example, reviewing the permissions being requested to ensure they align with the scenario the app is requesting them to enable, additional app and publisher details on the consent prompt, etc.
6868
- Create proactive [application governance](/microsoft-365/compliance/app-governance-manage-app-governance) policies to monitor third-party application behavior on the Microsoft 365 platform to address common suspicious application behaviors.
@@ -72,3 +72,4 @@ Administrators should be in control of application use by providing the right in
7272
- [Application consent grant investigation](/security/compass/incident-response-playbook-app-consent)
7373
- [Managing access to applications](./what-is-access-management.md)
7474
- [Restrict user consent operations in Azure AD](../../security/fundamentals/steps-secure-identity.md#restrict-user-consent-operations)
75+
- [Compromised and malicious applications investigation](/security/compass/incident-response-playbook-compromised-malicious-app)

0 commit comments

Comments
 (0)