Skip to content

Commit 9366515

Browse files
authored
Merge pull request #5152 from DeCohen/WI336650-retire-cloud-discovery-anomaly-detection-policies-doc
retire cloud discovery anomaly detection policies doc
2 parents 2b35d5a + caf84a6 commit 9366515

File tree

5 files changed

+8
-142
lines changed

5 files changed

+8
-142
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1015,5 +1015,10 @@
10151015
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
10161016
"redirect_document_id": true
10171017
},
1018+
{
1019+
"source_path": "defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md",
1020+
"redirect_url": "/defender-cloud-apps/cloud-discovery-policies",
1021+
"redirect_document_id": false
1022+
}
10181023
]
10191024
}

defender-for-cloud-apps/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Integrating Defender for Cloud Apps with Microsoft Defender for Endpoint gives y
4545
**For more information**:
4646

4747
* [Cloud discovery policies](cloud-discovery-policies.md)
48-
* [Cloud discovery anomaly detection policy](cloud-discovery-anomaly-detection-policy.md)
48+
* [Cloud discovery anomaly detection policy](cloud-discovery-policies.md#cloud-discovery-anomaly-detection)
4949
* [Get instantaneous behavioral analytics and anomaly detection](anomaly-detection-policy.md)
5050

5151
---

defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md

Lines changed: 0 additions & 137 deletions
This file was deleted.

defender-for-cloud-apps/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -182,8 +182,6 @@ items:
182182
href: create-snapshot-cloud-discovery-reports.md
183183
- name: Create app discovery policies
184184
href: cloud-discovery-policies.md
185-
- name: Create cloud discovery anomaly detection policies
186-
href: cloud-discovery-anomaly-detection-policy.md
187185
- name: Common cloud discovery policies
188186
href: policies-cloud-discovery.md
189187
- name: Troubleshooting cloud discovery

defender-for-cloud-apps/tutorial-suspicious-activity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,9 @@ Once you're familiar with the policies, you should consider how you want to fine
116116

117117
## Phase 3: Tune cloud discovery anomaly detection policies
118118

119-
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-anomaly-detection-policy.md) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
119+
Like the anomaly detection policies, there are several built-in [cloud discovery anomaly detection policies](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) that you can fine-tune. For example, the Data exfiltration to unsanctioned apps policy alerts you when data is being exfiltrated to an unsanctioned app and comes preconfigured with settings based on Microsoft experience in the security field.
120120

121-
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-anomaly-detection-policy.md#legacy-create-anomaly-detection-policy) more focused on anomalous app behavior and data exfiltration.
121+
However, you can fine-tune the built-in policies or create your own policies to aid you in identifying other scenarios that you may be interested in investigating. Since these policies are based on cloud discovery logs, they have different [tuning capabilities](cloud-discovery-policies.md#cloud-discovery-anomaly-detection) more focused on anomalous app behavior and data exfiltration.
122122

123123
1. **Tune usage monitoring**
124124
Set the usage filters to control the baseline, scope, and activity period for detecting anomalous behavior. For example, you may want to receive alerts for anomalous activities relating to executive-level employees.

0 commit comments

Comments
 (0)