Skip to content

Commit b919fa3

Browse files
Merge pull request #5182 from MicrosoftDocs/main
[AutoPublish] main to live - 09/30 13:30 PDT | 10/01 02:00 IST
2 parents 19ef626 + 5e25eac commit b919fa3

File tree

4 files changed

+115
-6
lines changed

4 files changed

+115
-6
lines changed

defender-for-cloud-apps/app-governance-anomaly-detection-alerts.md

Lines changed: 104 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Investigate app governance threat detection alerts | Microsoft Defender for Cloud Apps
3-
ms.date: 08/18/2025
3+
ms.date: 09/18/2025
44
ms.topic: how-to
55
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
66
description: Learn how to investigate threat detection alerts from app governance in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
@@ -1182,6 +1182,109 @@ This detection generates alerts for a multitenant cloud app that has been inacti
11821182
1. Review all activities performed by the app.
11831183
1. Review the scopes granted to the app.
11841184
1. Review the user activity associated with the app.
1185+
1186+
### Suspicious application actions potentially linked to a business email compromise (BEC) attempt
1187+
1188+
**Severity**: Medium
1189+
1190+
**MITRE IDs**: T1567, T1114
1191+
1192+
**MITRE Techniques**: Collection, Exfiltration
1193+
1194+
This alert identifies applications that exhibit strong similarity to known malicious apps involved in business email compromise related attempts. The similarity is determined by using a machine learning model that analyzes a wide range of application features such as metadata, publisher details, and activity patterns. Apps triggering this alert may have high-privilege mail permissions and could be sending spam or malicious emails to other recipients. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well.
1195+
1196+
**TP or FP?**
1197+
1198+
- **TP**: If you’re able to confirm that the consent request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated.
1199+
1200+
**Recommended action**:
1201+
- Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal.
1202+
- Investigate app activity and check affected accounts for suspicious activity.
1203+
- Based on your investigation, disable the app and suspend and reset passwords for all affected accounts.
1204+
- Classify the alert as a true positive.
1205+
1206+
- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated.
1207+
1208+
**Recommended action**:
1209+
- Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert.
1210+
1211+
**Understand the scope of the breach**
1212+
1213+
- Review consent grants to the application made by users and admins.
1214+
- Investigate all activities done by the app, especially access to mailbox of associated users and admin accounts.
1215+
- If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts.
1216+
1217+
### Suspicious application with business email compromise (BEC) like characteristics and mail collection activity
1218+
1219+
**Severity**: Medium
1220+
1221+
**MITRE ID’s**: T1567, T1114
1222+
1223+
**MITRE Techniques**: Collection, Exfiltration
1224+
1225+
This alert detects applications that exhibit similarity to known malicious apps linked to business email compromise attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Along with this similarity, the app has also carried out mail-related activities within the tenant. Apps that trigger this alert may have elevated mail related permissions and might be sending spam or harmful emails to other users. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well.
1226+
1227+
**TP or FP?**
1228+
1229+
- **TP**: If you’re able to confirm that the consent request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated.
1230+
1231+
**Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate app activity and check affected accounts for suspicious activity. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive.
1232+
1233+
- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated.
1234+
1235+
**Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert.
1236+
1237+
**Understand the scope of the breach**
1238+
1239+
Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts.
1240+
1241+
---
1242+
1243+
### Suspicious application actions potentially linked to E5 subscription abuse attempt
1244+
1245+
**Severity**: Medium
1246+
1247+
**MITRE Techniques**: Collection
1248+
1249+
This alert detects applications that exhibit strong similarity to known apps linked to E5 subscription abuse attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Apps that trigger this alert may have elevated permissions and might be involved in abuse activities across Exchange and OneDrive workloads. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well.
1250+
1251+
**TP or FP?**
1252+
1253+
- **TP**: If you’re able to confirm that the consent and sign-in request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated.
1254+
1255+
**Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate app activity and check affected accounts for suspicious activity. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive.
1256+
1257+
- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated.
1258+
1259+
**Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert.
1260+
1261+
**Understand the scope of the breach**
1262+
1263+
Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox and OneDrive of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts.
1264+
1265+
---
1266+
1267+
### Suspicious application with E5 abuse similarity and mailbox rules activity
1268+
1269+
**Severity**: Medium
1270+
1271+
**MITRE Techniques**: Collection
1272+
1273+
This alert detects applications that exhibit strong similarity to known apps linked to E5 subscription abuse attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Along with this similarity, the app has also carried out mailbox rules related activities within the tenant. Apps that trigger this alert may have elevated permissions and might be involved in abuse activities across Exchange and OneDrive workloads. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well.
1274+
1275+
**TP or FP?**
1276+
1277+
- **TP**: If you’re able to confirm that the consent and sign-in request to the app was delivered from an unknown or external source, the mailbox rule creation is not legitimate, and the app does not have a valid business use in the organization, then a true positive is indicated.
1278+
1279+
**Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate the app’s activity, mailbox rule creation, and review affected accounts for any suspicious behavior. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive.
1280+
1281+
- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated.
1282+
1283+
**Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert.
1284+
1285+
**Understand the scope of the breach**
1286+
1287+
Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox and OneDrive of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts.
11851288

11861289
## Impact alerts
11871290

14.8 KB
Loading
29.7 KB
Loading

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ For more information, see [Licensing and privacy FAQs](/defender-for-identity/te
3333
- To create your Defender for Identity workspace, you need a Microsoft Entra ID tenant.
3434
- You must either be a [Security Administrator](/entra/identity/role-based-access-control/permissions-reference), or have the following [Unified RBAC](../role-groups.md#unified-role-based-access-control-rbac) permissions:
3535
- `System settings (Read and manage)`
36-
- `Security setting (All permissions)`
36+
- `Security settings (All permissions)`
3737

3838
## Sensor requirements and recommendations
3939

@@ -62,14 +62,18 @@ The following table describes memory requirements on the server used for the Def
6262

6363
> [!IMPORTANT]
6464
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
65-
## Configure Unified Sensor to support advanced identity detections
65+
66+
## Configure Unified Sensor to support advanced identity detections (Preview)
6667

6768
Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability on the machine, improving security visibility and unlocking additional identity detections. Once applied, the configuration is enforced on **existing and future devices** that match the rule criteria. The tag itself is visible in the Device Inventory, providing admins with transparency and auditing capabilities.
6869

6970
**Steps to apply the configuration:**
7071

7172
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
72-
2. Create a new rule.
73+
1. Create a new rule.
74+
75+
![Screenshot that shows how to add a new rule.](media/prerequisites-sensor-version-3/new-rule.png)
76+
7377
3. In the side panel:
7478

7579
1. Select a **name** for the rule.
@@ -80,9 +84,11 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
8084

8185
1. Matching should primarily target **domain controllers** with the V3.x sensor installed.
8286

83-
1. **Add the tag** `Unified Sensor RPC Audit` to the selected devices.
87+
1. **Add the tag** `Unified Sensor RPC Audit` to the selected devices.
88+
89+
![Screenshot that shows the config tag.](media/prerequisites-sensor-version-3/tag.png)
8490

85-
1. Click **Submit** to save the rule.
91+
5. Click **Submit** to save the rule.
8692

8793
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
8894

0 commit comments

Comments
 (0)