You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,14 +15,6 @@ Included in this guide is general information about the conditions for triggerin
15
15
> Some alerts might be in preview, so regularly review the updated alert statuses.
16
16
>
17
17
18
-
> [!NOTE]
19
-
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled the following three policies:
20
-
>
21
-
> -[Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
22
-
> -[Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
23
-
> -[Access to sensitive data](#access-to-sensitive-data)
24
-
>
25
-
> These policies will remain visible in the Defender portal in a disabled state. If you want to continue using these policies, go to the Policies page under App Governance in the Defender portal, select the policy, and then select Activate.
26
18
27
19
## Security alert classifications
28
20
@@ -47,8 +39,12 @@ Use the following general guidelines when investigating any type of alert to gai
47
39
48
40
This section provides information on each predefined policy alert, along with steps for investigation and remediation.
49
41
42
+
50
43
### Increase in data usage by an overprivileged or highly privileged app
51
44
45
+
> [!NOTE]
46
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
47
+
52
48
**Severity**: Medium
53
49
54
50
Find apps with powerful or unused permissions that exhibit sudden increases in data usage through Graph API. Unusual changes in data usage might indicate compromise.
@@ -67,6 +63,9 @@ To determine if the alert is a true positive (TP) or a false positive (FP), revi
67
63
68
64
### Unusual activity from an app with priority account consent
69
65
66
+
> [!NOTE]
67
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
68
+
70
69
**Severity**: Medium
71
70
72
71
Find unusual increases in either data usage or Graph API access errors exhibited by apps that have been given consent by a priority account.
@@ -229,6 +228,9 @@ Review all activities performed by the app, scopes granted to the app and user a
229
228
230
229
### Access to sensitive data
231
230
231
+
> [!NOTE]
232
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
233
+
232
234
**Severity**: Medium
233
235
234
236
Find apps that access sensitive data identified by specific sensitively labels.
0 commit comments