Skip to content

Commit 5ba8629

Browse files
authored
Update app-governance-investigate-predefined-policies.md
Added the note above each relevant alert
1 parent fedd997 commit 5ba8629

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,14 +15,6 @@ Included in this guide is general information about the conditions for triggerin
1515
> Some alerts might be in preview, so regularly review the updated alert statuses.
1616
>
1717
18-
> [!NOTE]
19-
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled the following three policies:
20-
>
21-
> - [Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
22-
> - [Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
23-
> - [Access to sensitive data](#access-to-sensitive-data)
24-
>
25-
> These policies will remain visible in the Defender portal in a disabled state. If you want to continue using these policies, go to the Policies page under App Governance in the Defender portal, select the policy, and then select Activate.
2618

2719
## Security alert classifications
2820

@@ -47,8 +39,12 @@ Use the following general guidelines when investigating any type of alert to gai
4739

4840
This section provides information on each predefined policy alert, along with steps for investigation and remediation.
4941

42+
5043
### Increase in data usage by an overprivileged or highly privileged app
5144

45+
> [!NOTE]
46+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
47+
5248
**Severity**: Medium
5349

5450
Find apps with powerful or unused permissions that exhibit sudden increases in data usage through Graph API. Unusual changes in data usage might indicate compromise.
@@ -67,6 +63,9 @@ To determine if the alert is a true positive (TP) or a false positive (FP), revi
6763

6864
### Unusual activity from an app with priority account consent
6965

66+
> [!NOTE]
67+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
68+
7069
**Severity**: Medium
7170

7271
Find unusual increases in either data usage or Graph API access errors exhibited by apps that have been given consent by a priority account.
@@ -229,6 +228,9 @@ Review all activities performed by the app, scopes granted to the app and user a
229228

230229
### Access to sensitive data
231230

231+
> [!NOTE]
232+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
233+
232234
**Severity**: Medium
233235

234236
Find apps that access sensitive data identified by specific sensitively labels.

0 commit comments

Comments
 (0)