Skip to content

Commit 8bf2a23

Browse files
Merge pull request #2487 from MicrosoftDocs/main
Publish main to live, 01/20, 11:00 AM IST
2 parents 306bb65 + 71d4ae1 commit 8bf2a23

22 files changed

+67
-67
lines changed

CloudAppSecurityDocs/behaviors.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
2626

2727
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
2828

29-
|Alert name |Policy name |
30-
|---------|---------|
31-
|**Activity from infrequent country** |Activity from infrequent country/region  |
32-
|**Impossible travel activity** |Impossible travel |
33-
|**Mass delete** |Unusual file deletion activity (by user) |
34-
|**Mass download** |Unusual file download (by user) |
35-
|**Mass share** |Unusual file share activity (by user) |
36-
|**Multiple delete VM activities** |Multiple delete VM activities |
37-
|**Multiple failed login attempts** |Multiple failed sign-in attempts |
38-
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |
39-
|**Multiple VM creation activities** |Multiple VM creation activities |
40-
|**Suspicious administrative activity** |Unusual administrative activity (by user) |
41-
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |
42-
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |
43-
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |
44-
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |
29+
|Alert name |Policy name |ActionType (Hunting)|
30+
|---------|---------|---------|
31+
|**Activity from infrequent country** |Activity from infrequent country/region  |ActivityFromInfrequentCountry|
32+
|**Impossible travel activity** |Impossible travel |ImpossibleTravelActivity|
33+
|**Mass delete** |Unusual file deletion activity (by user) |MassDelete|
34+
|**Mass download** |Unusual file download (by user) |MassDownload|
35+
|**Mass share** |Unusual file share activity (by user) |MassShare|
36+
|**Multiple delete VM activities** |Multiple delete VM activities |MultipleDeleteVmActivities|
37+
|**Multiple failed login attempts** |Multiple failed sign-in attempts |MultipleFailedLoginAttempts|
38+
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |MultiplePowerBiReportSharingActivities|
39+
|**Multiple VM creation activities** |Multiple VM creation activities |MultipleVmCreationActivities|
40+
|**Suspicious administrative activity** |Unusual administrative activity (by user) |SuspiciousAdministrativeActivity|
41+
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |SuspiciousImpersonatedActivity|
42+
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |SuspiciousOauthAppFileDownloadActivities|
43+
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |SuspiciousPowerBiReportSharing|
44+
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
4545

4646

4747
## Defender for Cloud Apps' transition from alerts to behaviors

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,12 +97,12 @@ For information on other tables in the advanced hunting schema, [see the advance
9797
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
9898
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
9999
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
100-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
101-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
100+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
101+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
102102
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
103103
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104-
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created processs RDP session was initiated |
105-
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created processs RDP session was initiated |
104+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process's RDP session was initiated |
105+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process's RDP session was initiated |
106106

107107

108108

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,8 +94,8 @@ For information on other tables in the advanced hunting schema, [see the advance
9494
| `AdditionalFields` | `string` | Additional information about the entity or event |
9595
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
9696
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
98-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
97+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
98+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
9999

100100

101101
> [!NOTE]

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,8 @@ For information on other tables in the advanced hunting schema, [see the advance
7878
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
7979
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8080
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
81-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
82-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
81+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
82+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8383

8484

8585
## Related topics

defender-xdr/advanced-hunting-devicelogonevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8787
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
8888
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8989
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
90-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
91-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
90+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
91+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
9292

9393

9494
> [!NOTE]

defender-xdr/advanced-hunting-devicenetworkevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ For information on other tables in the advanced hunting schema, [see the advance
8383
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
8484
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8585
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
86-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
87-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
86+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
87+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8888

8989

9090
## Related topics

defender-xdr/advanced-hunting-deviceprocessevents-table.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,12 +101,12 @@ For information on other tables in the advanced hunting schema, [see the advance
101101
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
102102
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
103103
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
104-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
105-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
104+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
105+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
106106
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
107107
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
108-
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created processs RDP session was initiated |
109-
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created processs RDP session was initiated |
108+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process's RDP session was initiated |
109+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process's RDP session was initiated |
110110

111111

112112
## Related topics

defender-xdr/advanced-hunting-deviceregistryevents-table.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,8 +79,8 @@ For information on other tables in the advanced hunting schema, [see the advance
7979
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8080
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
8181
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
82-
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating processs RDP session was initiated |
83-
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating processs RDP session was initiated |
82+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process's RDP session was initiated |
83+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process's RDP session was initiated |
8484

8585

8686
## Related topics

defender-xdr/investigate-respond-container-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ appliesto:
2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

2828
> [!IMPORTANT]
29-
> Some information in this article relates to a prereleased product, which may be substantially modified before its commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
29+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here
3030
3131
Security operations can now investigate and respond to container-related alerts in near real-time and hunt for related activities with the integration of cloud-native response actions and investigation logs in the Microsoft Defender portal. The availability of attack paths can also help analysts immediately investigate and address critical security issues to prevent a potential breach.
3232

@@ -100,7 +100,7 @@ Access threat analytics reports from **Threat intelligence > Threat analytics**.
100100

101101
:::image type="content" source="/defender/media/defender-containers/view-threat-analytics-small.png" alt-text="Highlighting how to view threat analytics reports from the incident page." lightbox="/defender/media/defender-containers/view-threat-analytics.png":::
102102

103-
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Heres an example of an analyst report about a container attack.
103+
Threat analytics reports also contain relevant mitigation, recovery, and prevention methods that analysts can assess and apply to their environment. Using the information in threat analytics reports helps SOC teams defend and protect their environment from container attacks. Here's an example of an analyst report about a container attack.
104104

105105
:::image type="content" source="/defender/media/defender-containers/threat-analytics-sample-small.png" alt-text="Sample page of a container attack threat analytics report." lightbox="/defender/media/defender-containers/threat-analytics-sample.png":::
106106

defender-xdr/irm-investigate-alerts-defender.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ appliesto:
2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

2828
> [!IMPORTANT]
29-
> Some information in this article relates to a prereleased product, which may be substantially modified before its commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
29+
> Some information in this article relates to a prereleased product, which may be substantially modified before it's commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
3030
3131
[Microsoft Purview Insider Risk Management alerts](/purview/insider-risk-management-activities#alert-dashboard) in the Microsoft Defender portal are vital for protecting an organization's sensitive information and maintaining security. These alerts and insights from Microsoft Purview Insider Risk Management help identify and mitigate internal threats like data leaks and intellectual property theft by employees or contractors. Monitoring these alerts allows organizations to address security incidents proactively, ensuring sensitive data remains protected and compliance requirements are met.
3232

@@ -41,11 +41,11 @@ You can manage insider risk management alerts in the Microsoft Defender portal b
4141
- View individual insider risk alerts in the [alert queue](investigate-alerts.md).
4242
- Filter by service source on the incident and alert queues.
4343
- Hunt for all activities and all alerts related to the user in the insider risk alert.
44-
- View a users insider risk activity summary and risk level in the user entity page.
44+
- View a user's insider risk activity summary and risk level in the user entity page.
4545

4646
## Know before you begin
4747

48-
If youre new to Microsoft Purview and insider risk management, consider reading the following articles:
48+
If you're new to Microsoft Purview and insider risk management, consider reading the following articles:
4949

5050
- [Learn about Microsoft Purview](/purview/purview)
5151
- [Learn about Microsoft Purview Insider Risk Management](/purview/insider-risk-management)

0 commit comments

Comments
 (0)