You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/sensor-settings.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,8 @@ The sensors page provides the following information about each sensor:
58
58
59
59
***Standalone sensor**
60
60
61
+
***Entra Connect sensor**. If your sensor is installed on a domain controller server with Entra Connect configured, such as in a testing environment, the sensor type is shown as **Domain controller sensor** instead.
62
+
61
63
***ADCS sensor** (Active Directory Certificate Services). If your sensor is installed on a domain controller server with AD CS configured, such as in a testing environment, the sensor type is shown as **Domain controller sensor** instead.
62
64
63
65
***Domain**: Displays the fully qualified domain name of the Active Directory domain where the sensor is installed.
@@ -186,9 +188,9 @@ Every few minutes, Defender for Identity sensors check whether they have the lat
186
188
187
189
1. Sensors selected for **Delayed update** start their update process 72 hours after the Defender for Identity cloud service is updated. These sensors will then use the same update process as automatically updated sensors.
188
190
189
-
For any sensor that fails to complete the update process, a relevant [health alert](health-alerts.md#sensor-outdated) is triggered, and is sent as a notification.
191
+
For any sensor that fails to complete the update process, a relevant [health alert](health-alerts.md#sensor-outdated) is triggered, and is sent as a notification.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/activity-filters.md
+26-15Lines changed: 26 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,39 +1,45 @@
1
1
---
2
2
title: Investigate activities
3
3
description: This article provides a list of activities, filters, and match parameters that can be applied to activity policies.
4
-
ms.date: 01/29/2023
4
+
ms.date: 06/24/2025
5
5
ms.topic: how-to
6
6
---
7
7
8
8
# Investigate activities
9
9
10
10
11
-
12
11
Microsoft Defender for Cloud Apps gives you visibility into all the activities from your connected apps. After you connect Defender for Cloud Apps to an app using the App connector, Defender for Cloud Apps scans all the activities that happened - the retroactive scan period differs per app - and then it's updated constantly with new activities.
13
12
14
13
> [!NOTE]
15
-
> For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the compliance center](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
14
+
> The activity types (such as `FileCreated`, `FileCreatedOnNetworkShare`, `ArchiveCreated`, or `FileDeleted`) and their associated data are sourced directly from the connected app’s third-party API (for example, Salesforce or ServiceNow).
15
+
>
16
+
> Microsoft Defender for Cloud Apps displays these activity names and types exactly as received and doesn't define or modify them. To understand the meaning of an activity, refer to the relevant third‑party API documentation.
17
+
18
+
For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the Microsoft Purview portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
19
+
16
20
17
21
The **Activity log** can be filtered to enable you to find specific activities. You create policies based on the activities and then define what you want to be alerted about and act on. You can search for activities performed on certain files. The type of activities and the information we get for each activity depends on the app and what kind of data the app can provide.
18
22
19
23
For example, you can use the **Activity log** to find users in your organization who are using operating systems or browsers that are out of date, as follows:
20
24
After you connect an app to Defender for Cloud Apps in the **Activity log** page, use the advanced filter and select **User agent tag**. Then select **Outdated browser** or **Outdated operating system**.
:::image type="content" source="media/activity-filters/activity-example-outdated.png" alt-text="Screenshot that shows the Activity log with an outdated browser example." lightbox="media/activity-filters/activity-example-outdated.png":::
27
+
23
28
24
29
The basic filter provides great tools to start filtering your activities.
:::image type="content" source="media/activity-log-filter-advanced.png" alt-text="Screenshot that shows the advanced activity log filter.":::
37
+
31
38
32
39
> [!NOTE]
33
40
>
34
-
> - The Legacy tag is added to any activity policy that uses the older "user" filter. This filter will continue to work as usual. If you want to remove the Legacy tag, you can remove the filter and add the filter again using the new **User name** filter.
35
-
>
36
-
> - In some rare cases, the count of the events presented in the activity log may show a slightly higher number than the real number of events that apply for the filter and being presented.
41
+
> - The Legacy tag is added to any activity policy that uses the older "user" filter. This filter continues to work as usual. If you want to remove the Legacy tag, you can remove the filter and add the filter again using the new **User name** filter.
42
+
> - In some rare cases, the count of the events presented in the activity log might show a slightly higher number than the real number of events that apply for the filter and being presented.
37
43
38
44
## The Activity drawer
39
45
@@ -53,7 +59,7 @@ You can view more information about each activity, by selecting the Activity its
53
59
54
60
- IP address category and tags: Select the IP tag to view the list of IP tags found in this activity. You can then filter by all activities matching this tag.
55
61
56
-
The fields in the Activity drawer provide contextual links to additional activities and drill-downs you may want to perform from the drawer directly. For example, if you move your cursor next to the IP address category, you can use the **add to filter** icon  to immediately add the IP address to the current page's filter. You can also use the settings cog icon  that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as **User groups**.
62
+
The fields in the Activity drawer provide contextual links to additional activities and drill-downs you might want to perform from the drawer directly. For example, if you move your cursor next to the IP address category, you can use the **add to filter** icon  to immediately add the IP address to the current page's filter. You can also use the settings cog icon  that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as **User groups**.
57
63
58
64
You can also use the icons at the top of the tab to:
59
65
@@ -63,7 +69,9 @@ You can also use the icons at the top of the tab to:
63
69
- View activities from the exact geographic location
:::image type="content" source="media/activity-filters/activity-drawer.png" alt-text="Screenshot that shows the activity drawer." lightbox="media/activity-filters/activity-drawer.png":::
74
+
67
75
68
76
For a list of governance actions available, see [Activity governance actions](governance-actions.md#activity-governance-actions).
69
77
@@ -84,7 +92,8 @@ Selecting it opens the Activity drawer **User** tab provides the following insig
84
92
- **ISPs**: The number of ISPs the user connected from in the past 30 days.
85
93
- **IP addresses**: The number of IP addresses the user connected from in the past 30 days.
86
94
87
-

95
+
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
96
+
88
97
89
98
#### IP address insights
90
99
@@ -112,10 +121,11 @@ To view IP address insights:
112
121
- Set as a VPN IP address and add to allowlist
113
122
- Set as a Risky IP and add to blocklist
114
123
115
-

124
+
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows Ip address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
125
+
116
126
117
127
> [!NOTE]
118
-
>- Internal IPv4 or IPv6 IP addresses audited by the cloud applications connected with API, may indicate internal services communications within the network of the cloud application, and shouldn't be confused with internal IPs from the source network the device connected from, as the cloud application is not exposed to the internal IPs of the devices.
128
+
>- Internal IPv4 or IPv6 IP addresses audited by the cloud applications connected with API, might indicate internal services communications within the network of the cloud application, and shouldn't be confused with internal IPs from the source network the device connected from, as the cloud application isn't exposed to the internal IPs of the devices.
119
129
>- To avoid raising [impossible travel](anomaly-detection-policy.md#impossible-travel) alerts when employees connect from their home locations via the corporate VPN, it's recommended to tag the IP address as **VPN**.
120
130
121
131
## Export activities
@@ -124,7 +134,8 @@ You can export all user activities to a CSV file.
124
134
125
135
In the **Activity log**, select the **Export** button in the top-left corner.
126
136
127
-

137
+
:::image type="content" source="media/activity-filters/export-button.png" alt-text="Screenshot that shows the export button in the Activity log.":::
138
+
128
139
129
140
[!INCLUDE [Handle personal data](../includes/gdpr-intro-sentence.md)]
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ Defender for Cloud Apps supports "File Sandboxing" malware detection for the fol
88
88
### Activity from anonymous IP addresses
89
89
90
90
> [!NOTE]
91
-
> As part of ongoing improvements to Defender for Cloud Apps alert accuracy, this policy has been disabledand renamed to **Activity from a TOR IP address**.
91
+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Activity from a TOR IP address** and **Anonymous proxy activity**.
92
92
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
93
93
94
94
This detection identifies that users were active from an IP address that has been identified as an anonymous proxy IP address. These proxies are used by people who want to hide their device's IP address, and may be used for malicious intent. This detection uses a machine-learning algorithm that reduces "false positives", such as mis-tagged IP addresses that are widely used by users in the organization.
@@ -107,7 +107,7 @@ The detection looks for users whose accounts were deleted in Microsoft Entra ID,
107
107
### Activity from suspicious IP addresses
108
108
109
109
> [!NOTE]
110
-
> As part of ongoing improvements to Defender for Cloud Apps alert accuracy, this policy has been disabled and renamed to **Successful logon from a suspicious IP address**.
110
+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Successful logon from a suspicious IP address**.
111
111
>
112
112
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
113
113
@@ -116,7 +116,7 @@ This detection identifies that users were active from an IP address identified a
116
116
### Suspicious inbox forwarding
117
117
118
118
> [!NOTE]
119
-
> As part of ongoing improvements to Defender for Cloud Apps alert accuracy, this policy has been disabled and renamed to **Suspicious email forwarding rule created by third-party app**.
119
+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Suspicious email forwarding rule created by third-party app**.
120
120
>
121
121
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
122
122
@@ -128,15 +128,15 @@ This detection looks for suspicious email forwarding rules, for example, if a us
128
128
### Suspicious inbox manipulation rules
129
129
130
130
> [!NOTE]
131
-
> As part of ongoing improvements to Defender for Cloud Apps alert accuracy, this policy has been disabled.
131
+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model.
132
132
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
133
133
134
134
This detection profiles your environment and triggers alerts when suspicious rules that delete or move messages or folders are set on a user's inbox. This may indicate that the user's account is compromised, that messages are being intentionally hidden, and that the mailbox is being used to distribute spam or malware in your organization.
135
135
136
136
### Suspicious email deletion activity (Preview)
137
137
138
138
> [!NOTE]
139
-
> As part of ongoing improvements to Defender for Cloud Apps alert accuracy, this policy has been disabled and renamed to **Suspicious email deletion activity**.
139
+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Suspicious email deletion activity**.
140
140
>
141
141
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/data-protection-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -268,7 +268,7 @@ You can view more information about each file, by selecting the file itself in t
268
268
-**Matched policies** - See a list of policies the file matched.
269
269
-**Sensitivity labels** - View the list of sensitivity labels from Microsoft Purview Information Protection found in this file. You can then filter by all files matching this label.
270
270
271
-
The fields in the File drawer provide contextual links to files and drill downs you might want to perform from the drawer directly. For example, if you move your cursor next to the **Owner** field, you can use the "add to filter" icon  to add the owner immediately to the filter of the current page. You can also use the settings cog icon  that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as **Sensitivity labels**.
271
+
The fields in the File drawer provide contextual links to files and drill downs you might want to perform from the drawer directly. For example, if you move your cursor next to the **Owner** field, you can use the "add to filter" icon  to add the owner immediately to the filter of the current page. You can also use the settings cog icon  that pops up to arrive directly at the settings page necessary to modify the configuration of one of the fields, such as **Sensitivity labels**.
272
272
273
273
:::image type="content" source="media/file-policies/file-drawer.png" alt-text="Screenshot showing the file drawer" lightbox="media/file-policies/file-drawer.png":::
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/governance-actions.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,6 +83,13 @@ The following governance actions can be taken for connected apps either on a spe
83
83
84
84
-**Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
85
85
86
+
> [!NOTE]
87
+
> These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
88
+
- Security Operator
89
+
- Security administrator
90
+
- Global administrator
91
+
- Cloud app security administrator
92
+
86
93
:::image type="content" source="media/governance-actions/governance-actions-dropbox-google-workspace.png" alt-text="Screenshot that shows malware governance actions." lightbox="media/governance-actions/governance-actions-dropbox-google-workspace.png":::
0 commit comments