Skip to content

Commit b81989a

Browse files
committed
Acrolinx fixes
1 parent 3cf1c67 commit b81989a

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,11 @@ App governance provides predefined app policy alerts for anomalous activities. T
1212
Included in this guide is general information about the conditions for triggering alerts. Because predefined policies are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm.
1313

1414
> [!TIP]
15-
> Some alerts may be in preview, so regularly review the updated alert statuses.
15+
> Some alerts might be in preview, so regularly review the updated alert statuses.
1616
>
1717
1818
[!NOTE]
19-
> To improve threat detection coverage and increase alert accuracy in Microsoft Defender for Cloud Apps, the following anomaly detection policies will be automatically disabled across all tenants.
19+
> To enhance our monitoring efficiency and focus on the most critical alerts, we have streamlined our security policies. The following policies have been automatically disabled:
2020
>
2121
> - [Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
2222
> - [Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
@@ -77,7 +77,7 @@ Review all activities performed by the app, scopes granted to the app and user a
7777

7878
- **TP**: Apply this recommended action if you have confirmed that the increase in data usage or API access errors by an app with consent from a priority account is highly irregular or potentially malicious.
7979

80-
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password and then re-enable the app.
80+
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password, and then re-enable the app.
8181

8282
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is intended and has a legitimate business use in the organization.
8383

@@ -87,15 +87,15 @@ Review all activities performed by the app, scopes granted to the app and user a
8787

8888
**Severity**: Medium
8989

90-
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that have exhibited unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
90+
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that exhibit unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
9191

9292
**TP or FP?**
9393

9494
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
9595

96-
- **TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities have been highly irregular or potentially malicious.
96+
- **TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities are highly irregular or potentially malicious.
9797

98-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
98+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
9999

100100
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
101101

@@ -113,7 +113,7 @@ Review all activities performed by the app, scopes granted to the app and user a
113113

114114
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in OneDrive usage.
115115

116-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
116+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
117117

118118
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
119119

@@ -131,7 +131,7 @@ Review all activities performed by the app, scopes granted to the app and user a
131131

132132
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in SharePoint usage.
133133

134-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
134+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
135135

136136
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
137137

@@ -149,7 +149,7 @@ Review all activities performed by the app, scopes granted to the app and user a
149149

150150
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in Exchange usage.
151151

152-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
152+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
153153

154154
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
155155

@@ -167,7 +167,7 @@ Review all activities performed by the app, scopes granted to the app and user a
167167

168168
- **TP**: Apply this recommended action if you have confirmed that the updates to app certificates or secrets and other app activities have been highly irregular or potentially malicious.
169169

170-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
170+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
171171

172172
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
173173

@@ -183,9 +183,9 @@ An app made a large number of Graph API calls to create Exchange inbox rules. Th
183183

184184
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
185185

186-
- **TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities have been highly irregular or potentially malicious.
186+
- **TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities are highly irregular or potentially malicious.
187187

188-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
188+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
189189

190190
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
191191

@@ -203,7 +203,7 @@ Review all activities performed by the app, scopes granted to the app and user a
203203

204204
- **TP**: Apply this recommended action if you have confirmed that the content searches on Exchange and other activities have been highly irregular or potentially malicious.
205205

206-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
206+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
207207

208208
- **FP**: If you can confirm that no unusual mail search activities were performed by the app or that the app is intended to make unusual mail search activities through Graph API.
209209

@@ -221,7 +221,7 @@ Review all activities performed by the app, scopes granted to the app and user a
221221

222222
- **TP**: Apply this recommended action if you have confirmed that the sending of email messages and other activities have been highly irregular or potentially malicious.
223223

224-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
224+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
225225

226226
- **FP**: If you can confirm that no unusual mail send activities were performed by the app or that the app is intended to make unusual mail send activities through Graph API.
227227

0 commit comments

Comments
 (0)