Skip to content

Commit 3cf1c67

Browse files
committed
add a note about app governance policies being disabled
1 parent e0f4c31 commit 3cf1c67

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,15 @@ Included in this guide is general information about the conditions for triggerin
1515
> Some alerts may be in preview, so regularly review the updated alert statuses.
1616
>
1717
18+
[!NOTE]
19+
> To improve threat detection coverage and increase alert accuracy in Microsoft Defender for Cloud Apps, the following anomaly detection policies will be automatically disabled across all tenants.
20+
>
21+
> - [Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
22+
> - [Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
23+
> - [Access to sensitive data](#access-to-sensitive-data)
24+
>
25+
> These policies will remain visible in the Defender portal in a disabled state. If you want to continue using these policies, go to the Policies page under App Governance in the Defender portal, select the policy, and then select Enable.
26+
1827
## Security alert classifications
1928

2029
Following proper investigation, all app governance alerts can be classified into one of the following activity types:

0 commit comments

Comments
 (0)