Skip to content

Commit 4af38e8

Browse files
committed
Add a new release note
1 parent d004049 commit 4af38e8

File tree

2 files changed

+16
-8
lines changed

2 files changed

+16
-8
lines changed

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,10 @@ ms.topic: how-to
77

88
# Create Defender for Cloud Apps anomaly detection policies
99

10-
10+
> [!IMPORTANT]
11+
>
12+
> Starting June 2025, Microsoft Defender for Cloud Apps began transitioning existing anomaly detection policies to a dynamic threat detection model.
13+
> For more details see the section [Dynamic threat detection model](#dynamic-threat-detection-model) in this article.
1114
1215
The Microsoft Defender for Cloud Apps anomaly detection policies provide out-of-the-box user and entity behavioral analytics (UEBA) and machine learning (ML) so that you're ready from the outset to run advanced threat detection across your cloud environment. Because they're automatically enabled, the new anomaly detection policies immediately start the process of detecting and collating results, targeting numerous behavioral anomalies across your users and the machines and devices connected to your network. In addition, the policies expose more data from the Defender for Cloud Apps detection engine, to help you speed up the investigation process and contain ongoing threats.
1316

@@ -35,11 +38,10 @@ These policies appear on the Defender for Cloud Apps policies page and can be en
3538

3639
## Dynamic threat detection model
3740

38-
39-
Starting June 2025, Microsoft Defender for Cloud Apps began transitioning existing anomaly detection policies to a dynamic threat detection model. This model automatically updates detection logic based on the evolving threat landscape and is designed to improve and maintain a high signal-to-noise ratio (SNR). This approach ensures that detections stay current as attacker behavior changes, without requiring manual configuration or policy updates. The result is more timely and accurate alerts, with fewer outdated or redundant detections. As a result, you might notice that some of the legacy policies have been disabled.
41+
Microsoft Defender for Cloud apps dynamic Threat detection model automatically updates detection logic based on the evolving threat landscape and is designed to improve and maintain a high signal-to-noise ratio (SNR). This approach ensures that detections stay current as attacker behavior changes, without requiring manual configuration or policy updates. The result is more timely and accurate alerts, with fewer outdated or redundant detections. As a result, you might notice that some of the legacy policies have been disabled.
4042

4143
> [!NOTE]
42-
> If you previously configured governance actions for a policy, and it has been disabled, you can re-enable it in the Microsoft Defender portal > Cloud Apps > Policy management page.
44+
> If you previously configured governance actions and email notifications for a policy, and it has been disabled, you can re-enable it in the Microsoft Defender portal > Cloud Apps > Policy management page.
4345
4446
You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
4547

@@ -50,13 +52,11 @@ The initial policies being transitioned to the dynamic model include:
5052
- [Suspicious email deletion activity](#suspicious-email-deletion-activity-preview)
5153
- [Activity from anonymous IP addresses](#activity-from-anonymous-ip-addresses)
5254
- [Suspicious inbox forwarding](#suspicious-inbox-forwarding).
53-
- Activity from a botnet-associated IP address.
5455

55-
### Alert title changes
5656

57-
As part of the transition to the dynamic model, some alerts now appear with updated titles for clarity:
57+
As part of the transition to the dynamic model, these alerts now appear with updated titles for clarity:
5858

59-
| **Legacy Alert title** | **Updated Alert title** |
59+
| **Legacy built-in policy name** | **Updated Alert policy name** |
6060
| --- | --- |
6161
| Activity from suspicious IP addresses | Successful logon from a suspicious IP address |
6262
| Suspicious inbox manipulation rule | Suspicious inbox manipulation rule |

CloudAppSecurityDocs/release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,14 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2727
> Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
2828
2929

30+
31+
## June 2025
32+
33+
### New Dynamic Threat Detection model
34+
35+
Microsoft Defender for Cloud Apps now uses a dynamic threat detection model that adapts detection logic to evolving attack behavior. This update helps improve alert accuracy and reduces outdated detections. Several legacy anomaly detection policies have been transitioned to this model.
36+
For more information see: [Create Defender for Cloud Apps anomaly detection policies](anomaly-detection-policy.md)
37+
3038
## May 2025
3139

3240

0 commit comments

Comments
 (0)