Skip to content

Commit 1f4b547

Browse files
Merge pull request #5557 from MicrosoftDocs/main
[AutoPublish] main to live - 11/11 01:33 PST | 11/11 15:03 IST
2 parents 548abb7 + cd3c94d commit 1f4b547

File tree

1 file changed

+17
-2
lines changed

1 file changed

+17
-2
lines changed

defender-for-cloud-apps/anomaly-detection-policy.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,9 @@ Based on the policy results, security alerts are triggered. Defender for Cloud A
3434
> - [Suspicious email deletion activity](#suspicious-email-deletion-activity-preview)
3535
> - [Activity from anonymous IP addresses](#activity-from-anonymous-ip-addresses)
3636
> - [Suspicious inbox forwarding](#suspicious-inbox-forwarding).
37+
> - [Unusual ISP for an OAuth App](#unusual-isp-for-an-oauth-app).
38+
> - [Suspicious file access activity (by user)](#unusual-activities-by-user).
39+
> - [Ransomware activity](#ransomware-activity).
3740
>
3841
> You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
3942
@@ -89,6 +92,10 @@ This detection identifies that users were active from an IP address that has bee
8992

9093
### Ransomware activity
9194

95+
> [!NOTE]
96+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Ransomware payment instruction file uploaded to {Application}**.
97+
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
98+
9299
Defender for Cloud Apps extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity, Defender for Cloud Apps ensures holistic and robust protection. If Defender for Cloud Apps identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Defender for Cloud Apps detects ransomware, see [Protecting your organization against ransomware](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware).
93100

94101
### Activity performed by terminated user
@@ -101,7 +108,7 @@ The detection looks for users whose accounts were deleted in Microsoft Entra ID,
101108
### Activity from suspicious IP addresses
102109

103110
> [!NOTE]
104-
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Successful logon from a suspicious IP address**.
111+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Successful logon from a suspicious IP address** and **Activity from a password-spray associated IP address**.
105112
>
106113
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
107114
@@ -146,6 +153,11 @@ Scans the OAuth apps connected to your environment and triggers an alert when an
146153

147154
### Unusual ISP for an OAuth App
148155

156+
> [!NOTE]
157+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **OAuth application activity from an unknown ISP**.
158+
>
159+
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
160+
149161
This policy profiles your environment and triggers alerts when an OAuth app connects to your cloud applications from an uncommon ISP. This policy may indicate that an attacker tried to use a legitimate compromised app to perform malicious activities on your cloud applications.
150162

151163
### Unusual activities (by user)
@@ -161,7 +173,10 @@ These detections identify users who perform:
161173
* Unusual multiple VM creation activities (preview)
162174
* Unusual multiple storage deletion activities (preview)
163175
* Unusual region for cloud resource (preview)
164-
* Unusual file access
176+
177+
> [!NOTE]
178+
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, the policy with the title "Suspicious file access activity (by user)" has been disabled, migrated to the new dynamic model and renamed to **Suspicious file access indicative of lateral movement** and **Suspicious file access from untrusted ISP and user agent with malicious IP indicator**.
179+
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
165180
166181
These policies look for activities within a single session with respect to the baseline learned, which could indicate on a breach attempt. These detections leverage a machine-learning algorithm that profiles the users log on pattern and reduces false positives. These detections are part of the heuristic anomaly detection engine that profiles your environment and triggers alerts with respect to a baseline that was learned on your organization's activity.
167182

0 commit comments

Comments
 (0)