Skip to content

Commit e45e689

Browse files
Merge branch 'main' into v-smandalika-9618437
2 parents dfd7de5 + 21d607b commit e45e689

File tree

3 files changed

+139
-151
lines changed

3 files changed

+139
-151
lines changed

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b
141141

142142
* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.
143143

144-
### Data exfiltration to unsanctioned apps
145-
146-
* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
147-
148144
### Multiple delete VM activities
149145

150146
* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.

defender-xdr/criteria.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Microsoft classifies most malicious software into one of the following categorie
5555

5656
- **Dropper:** A type of malware that installs other malware files onto your device. Unlike a downloader, a dropper doesn't have to connect to the internet to drop malicious files. The dropped files are typically embedded in the dropper itself.
5757

58-
- **Exploit:** A piece of code that uses software vulnerabilities to gain access to your device and perform other tasks, such as installing malware..
58+
- **Exploit:** A piece of code that uses software vulnerabilities to gain access to your device and perform other tasks, such as installing malware.
5959

6060
- **Hacktool:** A type of tool that can be used to gain unauthorized access to your device.
6161

@@ -69,7 +69,7 @@ Microsoft classifies most malicious software into one of the following categorie
6969

7070
- **Rogue security software:** Malware that pretends to be security software but doesn't provide any protection. This type of malware usually displays alerts about nonexistent threats on your device. It also tries to convince you to pay for its services.
7171

72-
- **Trojan:** A type of malware that attempts to appear harmless. Unlike a virus or a worm, a trojan doesn't spread by itself. Instead, it tries to look legitimate to tricks users into downloading and installing it. Once installed, trojans perform various malicious activities such as stealing personal information, downloading other malware, or giving attackers access to your device.
72+
- **Trojan:** A type of malware that attempts to appear harmless. Unlike a virus or a worm, a trojan doesn't spread by itself. Instead, it tries to look legitimate to trick users into downloading and installing it. Once installed, trojans perform various malicious activities such as stealing personal information, downloading other malware, or giving attackers access to your device.
7373

7474
- **Trojan clicker:** A type of trojan that automatically clicks buttons or similar controls on websites or applications. Attackers can use this trojan to click on online advertisements. These clicks can skew online polls or other tracking systems and can even install applications on your device.
7575

0 commit comments

Comments
 (0)