Skip to content

Commit de70ebd

Browse files
authored
Merge pull request #4198 from DeCohen/WI440430-disable-3-pre-defined-policies-app-governance
add a note about app governance policies being disabled
2 parents d687fcd + 5b1f8cb commit de70ebd

File tree

1 file changed

+24
-13
lines changed

1 file changed

+24
-13
lines changed

CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,10 @@ App governance provides predefined app policy alerts for anomalous activities. T
1212
Included in this guide is general information about the conditions for triggering alerts. Because predefined policies are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm.
1313

1414
> [!TIP]
15-
> Some alerts may be in preview, so regularly review the updated alert statuses.
15+
> Some alerts might be in preview, so regularly review the updated alert statuses.
1616
>
1717
18+
1819
## Security alert classifications
1920

2021
Following proper investigation, all app governance alerts can be classified into one of the following activity types:
@@ -38,8 +39,12 @@ Use the following general guidelines when investigating any type of alert to gai
3839

3940
This section provides information on each predefined policy alert, along with steps for investigation and remediation.
4041

42+
4143
### Increase in data usage by an overprivileged or highly privileged app
4244

45+
> [!NOTE]
46+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
47+
4348
**Severity**: Medium
4449

4550
Find apps with powerful or unused permissions that exhibit sudden increases in data usage through Graph API. Unusual changes in data usage might indicate compromise.
@@ -58,6 +63,9 @@ To determine if the alert is a true positive (TP) or a false positive (FP), revi
5863

5964
### Unusual activity from an app with priority account consent
6065

66+
> [!NOTE]
67+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
68+
6169
**Severity**: Medium
6270

6371
Find unusual increases in either data usage or Graph API access errors exhibited by apps that have been given consent by a priority account.
@@ -68,7 +76,7 @@ Review all activities performed by the app, scopes granted to the app and user a
6876

6977
- **TP**: Apply this recommended action if you have confirmed that the increase in data usage or API access errors by an app with consent from a priority account is highly irregular or potentially malicious.
7078

71-
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password and then re-enable the app.
79+
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password, and then re-enable the app.
7280

7381
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is intended and has a legitimate business use in the organization.
7482

@@ -78,15 +86,15 @@ Review all activities performed by the app, scopes granted to the app and user a
7886

7987
**Severity**: Medium
8088

81-
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that have exhibited unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
89+
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that exhibit unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
8290

8391
**TP or FP?**
8492

8593
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
8694

87-
- **TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities have been highly irregular or potentially malicious.
95+
- **TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities are highly irregular or potentially malicious.
8896

89-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
97+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
9098

9199
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
92100

@@ -104,7 +112,7 @@ Review all activities performed by the app, scopes granted to the app and user a
104112

105113
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in OneDrive usage.
106114

107-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
115+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
108116

109117
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
110118

@@ -122,7 +130,7 @@ Review all activities performed by the app, scopes granted to the app and user a
122130

123131
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in SharePoint usage.
124132

125-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
133+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
126134

127135
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
128136

@@ -140,7 +148,7 @@ Review all activities performed by the app, scopes granted to the app and user a
140148

141149
- **TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in Exchange usage.
142150

143-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
151+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
144152

145153
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
146154

@@ -158,7 +166,7 @@ Review all activities performed by the app, scopes granted to the app and user a
158166

159167
- **TP**: Apply this recommended action if you have confirmed that the updates to app certificates or secrets and other app activities have been highly irregular or potentially malicious.
160168

161-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
169+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
162170

163171
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
164172

@@ -174,9 +182,9 @@ An app made a large number of Graph API calls to create Exchange inbox rules. Th
174182

175183
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
176184

177-
- **TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities have been highly irregular or potentially malicious.
185+
- **TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities are highly irregular or potentially malicious.
178186

179-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
187+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
180188

181189
- **FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
182190

@@ -194,7 +202,7 @@ Review all activities performed by the app, scopes granted to the app and user a
194202

195203
- **TP**: Apply this recommended action if you have confirmed that the content searches on Exchange and other activities have been highly irregular or potentially malicious.
196204

197-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
205+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
198206

199207
- **FP**: If you can confirm that no unusual mail search activities were performed by the app or that the app is intended to make unusual mail search activities through Graph API.
200208

@@ -212,14 +220,17 @@ Review all activities performed by the app, scopes granted to the app and user a
212220

213221
- **TP**: Apply this recommended action if you have confirmed that the sending of email messages and other activities have been highly irregular or potentially malicious.
214222

215-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
223+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
216224

217225
- **FP**: If you can confirm that no unusual mail send activities were performed by the app or that the app is intended to make unusual mail send activities through Graph API.
218226

219227
**Recommended action**: Dismiss the alert.
220228

221229
### Access to sensitive data
222230

231+
> [!NOTE]
232+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
233+
223234
**Severity**: Medium
224235

225236
Find apps that access sensitive data identified by specific sensitively labels.

0 commit comments

Comments
 (0)