You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,11 +12,11 @@ App governance provides predefined app policy alerts for anomalous activities. T
12
12
Included in this guide is general information about the conditions for triggering alerts. Because predefined policies are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm.
13
13
14
14
> [!TIP]
15
-
> Some alerts may be in preview, so regularly review the updated alert statuses.
15
+
> Some alerts might be in preview, so regularly review the updated alert statuses.
16
16
>
17
17
18
18
[!NOTE]
19
-
> To improve threat detection coverage and increase alert accuracy in Microsoft Defender for Cloud Apps, the following anomaly detection policies will be automatically disabled across all tenants.
19
+
> To enhance our monitoring efficiency and focus on the most critical alerts, we have streamlined our security policies. The following policies have been automatically disabled:
20
20
>
21
21
> -[Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
22
22
> -[Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
@@ -77,7 +77,7 @@ Review all activities performed by the app, scopes granted to the app and user a
77
77
78
78
-**TP**: Apply this recommended action if you have confirmed that the increase in data usage or API access errors by an app with consent from a priority account is highly irregular or potentially malicious.
79
79
80
-
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password and then re-enable the app.
80
+
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password, and then re-enable the app.
81
81
82
82
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is intended and has a legitimate business use in the organization.
83
83
@@ -87,15 +87,15 @@ Review all activities performed by the app, scopes granted to the app and user a
87
87
88
88
**Severity**: Medium
89
89
90
-
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that have exhibited unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
90
+
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that exhibit unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
91
91
92
92
**TP or FP?**
93
93
94
94
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
95
95
96
-
-**TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities have been highly irregular or potentially malicious.
96
+
-**TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities are highly irregular or potentially malicious.
97
97
98
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
98
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
99
99
100
100
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
101
101
@@ -113,7 +113,7 @@ Review all activities performed by the app, scopes granted to the app and user a
113
113
114
114
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in OneDrive usage.
115
115
116
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
116
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
117
117
118
118
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
119
119
@@ -131,7 +131,7 @@ Review all activities performed by the app, scopes granted to the app and user a
131
131
132
132
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in SharePoint usage.
133
133
134
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
134
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
135
135
136
136
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
137
137
@@ -149,7 +149,7 @@ Review all activities performed by the app, scopes granted to the app and user a
149
149
150
150
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in Exchange usage.
151
151
152
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
152
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
153
153
154
154
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
155
155
@@ -167,7 +167,7 @@ Review all activities performed by the app, scopes granted to the app and user a
167
167
168
168
-**TP**: Apply this recommended action if you have confirmed that the updates to app certificates or secrets and other app activities have been highly irregular or potentially malicious.
169
169
170
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
170
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
171
171
172
172
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
173
173
@@ -183,9 +183,9 @@ An app made a large number of Graph API calls to create Exchange inbox rules. Th
183
183
184
184
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
185
185
186
-
-**TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities have been highly irregular or potentially malicious.
186
+
-**TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities are highly irregular or potentially malicious.
187
187
188
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
188
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
189
189
190
190
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
191
191
@@ -203,7 +203,7 @@ Review all activities performed by the app, scopes granted to the app and user a
203
203
204
204
-**TP**: Apply this recommended action if you have confirmed that the content searches on Exchange and other activities have been highly irregular or potentially malicious.
205
205
206
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
206
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
207
207
208
208
-**FP**: If you can confirm that no unusual mail search activities were performed by the app or that the app is intended to make unusual mail search activities through Graph API.
209
209
@@ -221,7 +221,7 @@ Review all activities performed by the app, scopes granted to the app and user a
221
221
222
222
-**TP**: Apply this recommended action if you have confirmed that the sending of email messages and other activities have been highly irregular or potentially malicious.
223
223
224
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
224
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
225
225
226
226
-**FP**: If you can confirm that no unusual mail send activities were performed by the app or that the app is intended to make unusual mail send activities through Graph API.
0 commit comments