Skip to content

Commit 9aee33e

Browse files
committed
Learn Editor: Update app-governance-anomaly-detection-alerts.md
1 parent e57a076 commit 9aee33e

File tree

1 file changed

+25
-25
lines changed

1 file changed

+25
-25
lines changed

CloudAppSecurityDocs/app-governance-anomaly-detection-alerts.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,31 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
2020
> - [Access Microsoft Graph activity logs](/graph/microsoft-graph-activity-logs-overview)
2121
> - [Analyze activity logs using Log Analytics](/entra/identity/monitoring-health/howto-analyze-activity-logs-log-analytics)
2222
>
23+
## General investigation steps
24+
25+
### Finding App Governance Related Alerts
26+
27+
To locate alerts specifically related to App Governance, navigate to the XDR portal alerts page. In the alerts list, use the "Service Source" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
28+
29+
### General Guidelines
30+
31+
Use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
32+
33+
- Review the app severity level and compare with the rest of the apps in your tenant. This review helps you identify which Apps in your tenant pose the greater risk.
34+
- If you identify a TP, review all the App activities to gain an understanding of the impact. For example, review the following App information:
35+
36+
- Scopes granted access
37+
- Unusual behavior
38+
- IP address and location
39+
40+
## Security alert classifications
41+
42+
Following proper investigation, all app governance alerts can be classified as one of the following activity types:
43+
44+
- **True positive (TP)**: An alert on a confirmed malicious activity.
45+
- **Benign true positive (B-TP)**: An alert on suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
46+
- **False positive (FP)**: An alert on a non-malicious activity.
47+
2348
## MITRE ATT&CK
2449

2550
To make it easier to map the relationship between app governance alerts and the familiar MITRE ATT&CK Matrix, we've categorized the alerts by their corresponding MITRE ATT&CK tactic. This extra reference makes it easier to understand the suspected attacks technique potentially in use when app governance alert is triggered.
@@ -38,31 +63,6 @@ This guide provides information about investigating and remediating app governan
3863
- [Exfiltration](#exfiltration-alerts)
3964
- [Impact](#impact-alerts)
4065

41-
## Security alert classifications
42-
43-
Following proper investigation, all app governance alerts can be classified as one of the following activity types:
44-
45-
- **True positive (TP)**: An alert on a confirmed malicious activity.
46-
- **Benign true positive (B-TP)**: An alert on suspicious but not malicious activity, such as a penetration test or other authorized suspicious action.
47-
- **False positive (FP)**: An alert on a non-malicious activity.
48-
49-
## General investigation steps
50-
51-
### Finding App Governance Related Alerts
52-
53-
To locate alerts specifically related to App Governance, navigate to the XDR portal alerts page. In the alerts list, use the "Service Source" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
54-
55-
### General Guidelines
56-
57-
Use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
58-
59-
- Review the app severity level and compare with the rest of the apps in your tenant. This review helps you identify which Apps in your tenant pose the greater risk.
60-
- If you identify a TP, review all the App activities to gain an understanding of the impact. For example, review the following App information:
61-
62-
- Scopes granted access
63-
- Unusual behavior
64-
- IP address and location
65-
6666
## Initial access alerts
6767

6868
This section describes alerts indicating that a malicious app may be attempting to maintain their foothold in your organization.

0 commit comments

Comments
 (0)