You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md
+24-13Lines changed: 24 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,10 @@ App governance provides predefined app policy alerts for anomalous activities. T
12
12
Included in this guide is general information about the conditions for triggering alerts. Because predefined policies are nondeterministic by nature, they're only triggered when there's behavior that deviates from the norm.
13
13
14
14
> [!TIP]
15
-
> Some alerts may be in preview, so regularly review the updated alert statuses.
15
+
> Some alerts might be in preview, so regularly review the updated alert statuses.
16
16
>
17
17
18
+
18
19
## Security alert classifications
19
20
20
21
Following proper investigation, all app governance alerts can be classified into one of the following activity types:
@@ -38,8 +39,12 @@ Use the following general guidelines when investigating any type of alert to gai
38
39
39
40
This section provides information on each predefined policy alert, along with steps for investigation and remediation.
40
41
42
+
41
43
### Increase in data usage by an overprivileged or highly privileged app
42
44
45
+
> [!NOTE]
46
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
47
+
43
48
**Severity**: Medium
44
49
45
50
Find apps with powerful or unused permissions that exhibit sudden increases in data usage through Graph API. Unusual changes in data usage might indicate compromise.
@@ -58,6 +63,9 @@ To determine if the alert is a true positive (TP) or a false positive (FP), revi
58
63
59
64
### Unusual activity from an app with priority account consent
60
65
66
+
> [!NOTE]
67
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
68
+
61
69
**Severity**: Medium
62
70
63
71
Find unusual increases in either data usage or Graph API access errors exhibited by apps that have been given consent by a priority account.
@@ -68,7 +76,7 @@ Review all activities performed by the app, scopes granted to the app and user a
68
76
69
77
-**TP**: Apply this recommended action if you have confirmed that the increase in data usage or API access errors by an app with consent from a priority account is highly irregular or potentially malicious.
70
78
71
-
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password and then re-enable the app.
79
+
**Recommended action**: Contact priority account users about the app activities that have caused the increase in data usage or API access errors. Temporarily disable the app, reset the password, and then re-enable the app.
72
80
73
81
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is intended and has a legitimate business use in the organization.
74
82
@@ -78,15 +86,15 @@ Review all activities performed by the app, scopes granted to the app and user a
78
86
79
87
**Severity**: Medium
80
88
81
-
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that have exhibited unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
89
+
Consent requests from a newly created app have been rejected frequently by users. Users typically reject consent requests from apps that exhibit unexpected behavior or arrived from an untrusted source. Apps that have low consent rates are more likely to be risky or malicious.
82
90
83
91
**TP or FP?**
84
92
85
93
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
86
94
87
-
-**TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities have been highly irregular or potentially malicious.
95
+
-**TP**: Apply this recommended action if you have confirmed that the app is from an unknown source and its activities are highly irregular or potentially malicious.
88
96
89
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
97
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
90
98
91
99
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
92
100
@@ -104,7 +112,7 @@ Review all activities performed by the app, scopes granted to the app and user a
104
112
105
113
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in OneDrive usage.
106
114
107
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
115
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
108
116
109
117
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
110
118
@@ -122,7 +130,7 @@ Review all activities performed by the app, scopes granted to the app and user a
122
130
123
131
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in SharePoint usage.
124
132
125
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
133
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
126
134
127
135
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
128
136
@@ -140,7 +148,7 @@ Review all activities performed by the app, scopes granted to the app and user a
140
148
141
149
-**TP**: Apply this recommended action if you have confirmed that highly irregular, potentially malicious activities have resulted in the detected increase in Exchange usage.
142
150
143
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
151
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
144
152
145
153
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
146
154
@@ -158,7 +166,7 @@ Review all activities performed by the app, scopes granted to the app and user a
158
166
159
167
-**TP**: Apply this recommended action if you have confirmed that the updates to app certificates or secrets and other app activities have been highly irregular or potentially malicious.
160
168
161
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
169
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
162
170
163
171
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
164
172
@@ -174,9 +182,9 @@ An app made a large number of Graph API calls to create Exchange inbox rules. Th
174
182
175
183
Review all activities performed by the app, scopes granted to the app and user activity associated with the app.
176
184
177
-
-**TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities have been highly irregular or potentially malicious.
185
+
-**TP**: Apply this recommended action if you have confirmed that the creation of inbox rules and other activities are highly irregular or potentially malicious.
178
186
179
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
187
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
180
188
181
189
-**FP**: Apply this recommended action if you have confirmed that the detected app activity is legitimate.
182
190
@@ -194,7 +202,7 @@ Review all activities performed by the app, scopes granted to the app and user a
194
202
195
203
-**TP**: Apply this recommended action if you have confirmed that the content searches on Exchange and other activities have been highly irregular or potentially malicious.
196
204
197
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
205
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
198
206
199
207
-**FP**: If you can confirm that no unusual mail search activities were performed by the app or that the app is intended to make unusual mail search activities through Graph API.
200
208
@@ -212,14 +220,17 @@ Review all activities performed by the app, scopes granted to the app and user a
212
220
213
221
-**TP**: Apply this recommended action if you have confirmed that the sending of email messages and other activities have been highly irregular or potentially malicious.
214
222
215
-
**Recommended action**: Temporarily disable the app, reset the password and then re-enable the app.
223
+
**Recommended action**: Temporarily disable the app, reset the password, and then re-enable the app.
216
224
217
225
-**FP**: If you can confirm that no unusual mail send activities were performed by the app or that the app is intended to make unusual mail send activities through Graph API.
218
226
219
227
**Recommended action**: Dismiss the alert.
220
228
221
229
### Access to sensitive data
222
230
231
+
> [!NOTE]
232
+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled this policy. This policy will remain visible in the Defender portal in a disabled state. If you want to continue using this policy, in the Defender portal, go to **App Governance**, and then the **Policies** page. Select the policy, and then select **Activate**.
233
+
223
234
**Severity**: Medium
224
235
225
236
Find apps that access sensitive data identified by specific sensitively labels.
0 commit comments