You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
26
26
27
27
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
28
28
29
-
|Alert name |Policy name |
30
-
|---------|---------|
31
-
|**Activity from infrequent country**|Activity from infrequent country/region |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-deviceevents-table.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,12 +97,12 @@ For information on other tables in the advanced hunting schema, [see the advance
97
97
|`AdditionalFields`|`string`| Additional information about the event in JSON array format |
98
98
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
99
99
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
100
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
101
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
100
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
101
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
102
102
|`CreatedProcessSessionId`|`long`| Windows session ID of the created process |
103
103
|`IsProcessRemoteSession`|`bool`| Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104
-
|`ProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the created process’s RDP session was initiated |
105
-
|`ProcessRemoteSessionIP`|`string`| IP address of the remote device from which the created process’s RDP session was initiated |
104
+
|`ProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the created process's RDP session was initiated |
105
+
|`ProcessRemoteSessionIP`|`string`| IP address of the remote device from which the created process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-devicefileevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,8 +94,8 @@ For information on other tables in the advanced hunting schema, [see the advance
94
94
|`AdditionalFields`|`string`| Additional information about the entity or event |
95
95
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
96
96
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
98
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
97
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
98
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-deviceimageloadevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,8 +78,8 @@ For information on other tables in the advanced hunting schema, [see the advance
78
78
|`AppGuardContainerId`|`string`| Identifier for the virtualized container used by Application Guard to isolate browser activity |
79
79
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
80
80
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
81
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
82
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
81
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
82
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-devicelogonevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,8 +87,8 @@ For information on other tables in the advanced hunting schema, [see the advance
87
87
|`AdditionalFields`|`string`| Additional information about the event in JSON array format |
88
88
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
89
89
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
90
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
91
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
90
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
91
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-devicenetworkevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,8 +83,8 @@ For information on other tables in the advanced hunting schema, [see the advance
83
83
|`AdditionalFields`|`string`| Additional information about the event in JSON array format |
84
84
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
85
85
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
86
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
87
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
86
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
87
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-deviceprocessevents-table.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,12 +101,12 @@ For information on other tables in the advanced hunting schema, [see the advance
101
101
|`AdditionalFields`|`string`| Additional information about the event in JSON array format |
102
102
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
103
103
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
105
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
104
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
105
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
106
106
|`CreatedProcessSessionId`|`long`| Windows session ID of the created process |
107
107
|`IsProcessRemoteSession`|`bool`| Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
108
-
|`ProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the created process’s RDP session was initiated |
109
-
|`ProcessRemoteSessionIP`|`string`| IP address of the remote device from which the created process’s RDP session was initiated |
108
+
|`ProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the created process's RDP session was initiated |
109
+
|`ProcessRemoteSessionIP`|`string`| IP address of the remote device from which the created process's RDP session was initiated |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-deviceregistryevents-table.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,8 +79,8 @@ For information on other tables in the advanced hunting schema, [see the advance
79
79
|`AppGuardContainerId`|`string`| Identifier for the virtualized container used by Application Guard to isolate browser activity |
80
80
|`InitiatingProcessSessionId`|`long`| Windows session ID of the initiating process |
81
81
|`IsInitiatingProcessRemoteSession`|`bool`| Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
82
-
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process’s RDP session was initiated |
83
-
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process’s RDP session was initiated |
82
+
|`InitiatingProcessRemoteSessionDeviceName`|`string`| Device name of the remote device from which the initiating process's RDP session was initiated |
83
+
|`InitiatingProcessRemoteSessionIP`|`string`| IP address of the remote device from which the initiating process's RDP session was initiated |
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
29
+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
30
30
31
31
Security operations can now investigate and respond to container-related alerts in near real-time and hunt for related activities with the integration of cloud-native response actions and investigation logs in the Microsoft Defender portal. The availability of attack paths can also help analysts immediately investigate and address critical security issues to prevent a potential breach.
:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png":::
102
102
103
-
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here’s an example of an analyst report about a container attack.
103
+
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here's an example of an analyst report about a container attack.
104
104
105
105
:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png":::
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
29
+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
30
30
31
31
[Microsoft Purview Insider Risk Management alerts](/purview/insider-risk-management-activities#alert-dashboard) in the Microsoft Defender portal are vital for protecting an organization's sensitive information and maintaining security. These alerts and insights from Microsoft Purview Insider Risk Management help identify and mitigate internal threats like data leaks and intellectual property theft by employees or contractors. Monitoring these alerts allows organizations to address security incidents proactively, ensuring sensitive data remains protected and compliance requirements are met.
32
32
@@ -41,11 +41,11 @@ You can manage insider risk management alerts in the Microsoft Defender portal b
41
41
- View individual insider risk alerts in the [alert queue](investigate-alerts.md).
42
42
- Filter by service source on the incident and alert queues.
43
43
- Hunt for all activities and all alerts related to the user in the insider risk alert.
44
-
- View a user’s insider risk activity summary and risk level in the user entity page.
44
+
- View a user's insider risk activity summary and risk level in the user entity page.
45
45
46
46
## Know before you begin
47
47
48
-
If you’re new to Microsoft Purview and insider risk management, consider reading the following articles:
48
+
If you're new to Microsoft Purview and insider risk management, consider reading the following articles:
49
49
50
50
-[Learn about Microsoft Purview](/purview/purview)
51
51
-[Learn about Microsoft Purview Insider Risk Management](/purview/insider-risk-management)
0 commit comments