Skip to content

Commit 1e18c80

Browse files
authored
Update investigation priority score section
1 parent ace2e9f commit 1e18c80

File tree

1 file changed

+3
-32
lines changed

1 file changed

+3
-32
lines changed

CloudAppSecurityDocs/investigate-anomaly-alerts.md

Lines changed: 3 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -713,41 +713,12 @@ Establishing a new user's activity pattern requires an initial learning period o
713713

714714
### Investigation priority score increase (legacy)
715715

716-
> [!IMPORTANT]
717-
> Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired.
718-
>
719-
> If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
720-
>
721-
>[Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
722-
>
723-
>[Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
724-
>
725-
726-
Anomalous activities and activities that triggered alerts are given scores based on severity, user impact, and behavioral analysis of the user. The analysis is done based on other users in the tenants.
727-
728-
When there's a significant and anomalous increase in the investigation priority score of a certain user, the alert will be triggered.
729-
730-
This alert enables detecting potential breaches that are characterized by activities that don't necessarily trigger specific alerts but accumulate to a suspicious behavior for the user.
731-
732-
**Learning period**
733-
734-
Establishing a new user's activity pattern requires an initial learning period of seven days, during which alerts aren't triggered for any score increase.
716+
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
735717

736-
**TP**, **B-TP**, or **FP**?
737-
738-
1. **TP**: If you're able to confirm that the activities of the user aren't legitimate.
739-
740-
**Recommended action**: Suspend the user, mark the user as compromised, and reset their password.
718+
- [Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
741719

742-
1. **B-TP**: If you're able to confirm that user indeed significantly deviated from usual behavior, but there's no potential breach.
720+
- [Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
743721

744-
1. **FP** (Unusual behavior): If you're able to confirm that the user legitimately performed the unusual activities, or more activities than the established baseline.
745-
746-
**Recommended action**: Dismiss the alert.
747-
748-
**Understand the scope of the breach**
749-
750-
1. Review all user activity and alerts for additional indicators of compromise.
751722

752723
## See also
753724

0 commit comments

Comments
 (0)