|
1 | 1 | ---
|
2 | 2 | title: Investigate app governance threat detection alerts | Microsoft Defender for Cloud Apps
|
3 |
| -ms.date: 08/18/2025 |
| 3 | +ms.date: 09/18/2025 |
4 | 4 | ms.topic: how-to
|
5 | 5 | ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
|
6 | 6 | description: Learn how to investigate threat detection alerts from app governance in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
|
@@ -1182,6 +1182,109 @@ This detection generates alerts for a multitenant cloud app that has been inacti
|
1182 | 1182 | 1. Review all activities performed by the app.
|
1183 | 1183 | 1. Review the scopes granted to the app.
|
1184 | 1184 | 1. Review the user activity associated with the app.
|
| 1185 | + |
| 1186 | +### Suspicious application actions potentially linked to a business email compromise (BEC) attempt |
| 1187 | + |
| 1188 | +**Severity**: Medium |
| 1189 | + |
| 1190 | +**MITRE IDs**: T1567, T1114 |
| 1191 | + |
| 1192 | +**MITRE Techniques**: Collection, Exfiltration |
| 1193 | + |
| 1194 | +This alert identifies applications that exhibit strong similarity to known malicious apps involved in business email compromise related attempts. The similarity is determined by using a machine learning model that analyzes a wide range of application features such as metadata, publisher details, and activity patterns. Apps triggering this alert may have high-privilege mail permissions and could be sending spam or malicious emails to other recipients. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well. |
| 1195 | + |
| 1196 | +**TP or FP?** |
| 1197 | + |
| 1198 | +- **TP**: If you’re able to confirm that the consent request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated. |
| 1199 | + |
| 1200 | + **Recommended action**: |
| 1201 | + - Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. |
| 1202 | + - Investigate app activity and check affected accounts for suspicious activity. |
| 1203 | + - Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. |
| 1204 | + - Classify the alert as a true positive. |
| 1205 | + |
| 1206 | +- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated. |
| 1207 | + |
| 1208 | + **Recommended action**: |
| 1209 | + - Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert. |
| 1210 | + |
| 1211 | +**Understand the scope of the breach** |
| 1212 | + |
| 1213 | +- Review consent grants to the application made by users and admins. |
| 1214 | +- Investigate all activities done by the app, especially access to mailbox of associated users and admin accounts. |
| 1215 | +- If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts. |
| 1216 | + |
| 1217 | +### Suspicious application with business email compromise (BEC) like characteristics and mail collection activity |
| 1218 | + |
| 1219 | +**Severity**: Medium |
| 1220 | + |
| 1221 | +**MITRE ID’s**: T1567, T1114 |
| 1222 | + |
| 1223 | +**MITRE Techniques**: Collection, Exfiltration |
| 1224 | + |
| 1225 | +This alert detects applications that exhibit similarity to known malicious apps linked to business email compromise attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Along with this similarity, the app has also carried out mail-related activities within the tenant. Apps that trigger this alert may have elevated mail related permissions and might be sending spam or harmful emails to other users. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well. |
| 1226 | + |
| 1227 | +**TP or FP?** |
| 1228 | + |
| 1229 | +- **TP**: If you’re able to confirm that the consent request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated. |
| 1230 | + |
| 1231 | + **Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate app activity and check affected accounts for suspicious activity. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive. |
| 1232 | + |
| 1233 | +- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated. |
| 1234 | + |
| 1235 | + **Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert. |
| 1236 | + |
| 1237 | +**Understand the scope of the breach** |
| 1238 | + |
| 1239 | +Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts. |
| 1240 | + |
| 1241 | +--- |
| 1242 | + |
| 1243 | +### Suspicious application actions potentially linked to E5 subscription abuse attempt |
| 1244 | + |
| 1245 | +**Severity**: Medium |
| 1246 | + |
| 1247 | +**MITRE Techniques**: Collection |
| 1248 | + |
| 1249 | +This alert detects applications that exhibit strong similarity to known apps linked to E5 subscription abuse attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Apps that trigger this alert may have elevated permissions and might be involved in abuse activities across Exchange and OneDrive workloads. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well. |
| 1250 | + |
| 1251 | +**TP or FP?** |
| 1252 | + |
| 1253 | +- **TP**: If you’re able to confirm that the consent and sign-in request to the app was delivered from an unknown or external source and the app doesn't have a legitimate business use in the organization, then a true positive is indicated. |
| 1254 | + |
| 1255 | + **Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate app activity and check affected accounts for suspicious activity. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive. |
| 1256 | + |
| 1257 | +- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated. |
| 1258 | + |
| 1259 | + **Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert. |
| 1260 | + |
| 1261 | +**Understand the scope of the breach** |
| 1262 | + |
| 1263 | +Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox and OneDrive of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts. |
| 1264 | + |
| 1265 | +--- |
| 1266 | + |
| 1267 | +### Suspicious application with E5 abuse similarity and mailbox rules activity |
| 1268 | + |
| 1269 | +**Severity**: Medium |
| 1270 | + |
| 1271 | +**MITRE Techniques**: Collection |
| 1272 | + |
| 1273 | +This alert detects applications that exhibit strong similarity to known apps linked to E5 subscription abuse attempts. The similarity is determined by using a machine learning model that evaluates various features of the app, including metadata, publisher information, and activity patterns. Along with this similarity, the app has also carried out mailbox rules related activities within the tenant. Apps that trigger this alert may have elevated permissions and might be involved in abuse activities across Exchange and OneDrive workloads. This alert is based on global intelligence, so please validate if the behavior applies to your tenant as well. |
| 1274 | + |
| 1275 | +**TP or FP?** |
| 1276 | + |
| 1277 | +- **TP**: If you’re able to confirm that the consent and sign-in request to the app was delivered from an unknown or external source, the mailbox rule creation is not legitimate, and the app does not have a valid business use in the organization, then a true positive is indicated. |
| 1278 | + |
| 1279 | + **Recommended action**: Contact users and admins who have granted consent to this app to confirm this was intentional and the excessive privileges are normal. Investigate the app’s activity, mailbox rule creation, and review affected accounts for any suspicious behavior. Based on your investigation, disable the app and suspend and reset passwords for all affected accounts. Classify the alert as a true positive. |
| 1280 | + |
| 1281 | +- **FP**: If after investigation, you can confirm that the app has a legitimate business use in the organization, then a false positive is indicated. |
| 1282 | + |
| 1283 | + **Recommended action**: Classify the alert as a false positive and consider sharing feedback based on your investigation of the alert. |
| 1284 | + |
| 1285 | +**Understand the scope of the breach** |
| 1286 | + |
| 1287 | +Review consent grants to the application made by users and admins. Investigate all activities done by the app, especially access to mailbox and OneDrive of associated users and admin accounts. If you suspect that the app is suspicious, consider disabling the application and rotating credentials of all affected accounts. |
1185 | 1288 |
|
1186 | 1289 | ## Impact alerts
|
1187 | 1290 |
|
|
0 commit comments