You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/behaviors.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,6 +47,8 @@ Behaviors currently support low-fidelity, Defender for Cloud Apps and Defender f
47
47
|**Suspicious Power BI report sharing**|Suspicious Power BI report sharing |SuspiciousPowerBiReportSharing|
48
48
|**Unusual addition of credentials to an OAuth app**|Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
49
49
50
+
> [!NOTE]
51
+
> *"Multiple VM creation activities"* and *"Multiple delete VM activities"* are scheduled to be deprecated during **May 2026**. After deprecation, these behaviors will stop being generated and won't be available for hunting, custom detections, or correlation in Microsoft Defender XDR. Records generated before the deprecation date will be retained according to the standard data retention policy.
50
52
51
53
## Defender for Cloud Apps' transition from alerts to behaviors
@@ -200,88 +197,13 @@ This detection identifies apps with characters, such as foreign letters, that re
200
197
201
198
1. On the **Google** or **Salesforce** tabs on the **App governance** page, select the app to open the **App drawer**, and then select **Related activity**. This opens the **Activity log** page filtered for activities performed by the app. Keep in mind that some apps perform activities that are registered as having been performed by a user. These activities are automatically filtered out of the results in the activity log. For further investigation using the activity log, see [Activity log](activity-filters.md).
202
199
1. If you suspect that an app is suspicious, we recommended that you investigate the app's name and publisher in different app stores. When checking app stores, focus on the following types of apps:
203
-
- Apps with a low number of downloads.
204
-
- Apps with a low rating or score or bad comments.
205
-
- Apps with a suspicious publisher or website.
206
-
- Apps that haven't been recently updated. This might indicate an app that is no longer supported.
207
-
- Apps that have irrelevant permissions. This might indicate that an app is risky.
200
+
- Apps with a low number of downloads.
201
+
- Apps with a low rating or score or bad comments.
202
+
- Apps with a suspicious publisher or website.
203
+
- Apps that haven't been recently updated. This might indicate an app that is no longer supported.
204
+
- Apps that have irrelevant permissions. This might indicate that an app is risky.
208
205
1. If you still suspect that an app is suspicious, you can research the app name, publisher, and URL online.
209
206
210
-
## Execution alerts
211
-
212
-
This section describes alerts indicating that a malicious actor might be attempting to run malicious code in your organization.
213
-
214
-
### Multiple storage deletion activities
215
-
216
-
Activities in a single session indicating that a user performed an unusual number of cloud storage or database deletions from resources such as Azure blobs, AWS S3 buckets, or Cosmos DB when compared to the baseline learned. This can indicate an attempted breach of your organization.
217
-
218
-
**Learning period**
219
-
220
-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
221
-
222
-
**TP**, **B-TP**, or **FP**?
223
-
224
-
1.**TP**: If you're to confirm that the deletions were unauthorized.
225
-
226
-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact.
227
-
1.**FP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these deletion activities.
228
-
229
-
**Recommended action**: Dismiss the alert.
230
-
231
-
**Understand the scope of the breach**
232
-
233
-
1. Contact the user and confirm the activity.
234
-
1. Review the activity log for other indicators of compromise and see who made the change.
235
-
1. Review that user's activities for changes to other services.
236
-
237
-
### Multiple VM creation activities
238
-
239
-
Activities in a single session indicating that a user performed an unusual number of VM creation actions when compared to the baseline learned. Multiple VM creations on a breached Cloud infrastructure could indicate an attempt to run crypto mining operations from within your organization.
240
-
241
-
**Learning period**
242
-
243
-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
244
-
245
-
**TP**, **B-TP**, or **FP**?
246
-
247
-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents, such as an administrator legitimately created more VMs than the established baseline, and only alert when the unusual behavior is detected.
248
-
249
-
-**TP**: If you're able to confirm that the creation activities weren't performed by a legitimate user.
250
-
251
-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact. In addition, contact the user, confirm their legitimate actions, and then make sure you disable or delete any compromised VMs.
252
-
-**B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these creation activities.
253
-
254
-
**Recommended action**: Dismiss the alert.
255
-
256
-
**Understand the scope of the breach**
257
-
258
-
1. Review all user activity for other indicators of compromise.
259
-
1. Review the resources created or modified by the user and verify that they conform with your organization's policies.
260
-
261
-
### Suspicious creation activity for cloud region (preview)
262
-
263
-
Activities indicating that a user performed an unusual resource creation action in an uncommon AWS region when compared to the baseline learned. Resource creation in uncommon cloud regions could indicate an attempt to perform a malicious activity such as crypto mining operations from within your organization.
264
-
265
-
**Learning period**
266
-
267
-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
268
-
269
-
**TP**, **B-TP**, or **FP**?
270
-
271
-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents.
272
-
273
-
-**TP**: If you're able to confirm that the creation activities weren't performed by a legitimate user.
274
-
275
-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact. In addition, contact the user, confirm their legitimate actions, and then make sure you disable or delete any compromised cloud resources.
276
-
-**B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these creation activities.
277
-
278
-
**Recommended action**: Dismiss the alert.
279
-
280
-
**Understand the scope of the breach**
281
-
282
-
1. Review all user activity for other indicators of compromise.
283
-
1. Review the resources created and verify that they conform with your organization's policies.
284
-
285
207
## Persistence alerts
286
208
287
209
This section describes alerts indicating that a malicious actor might be attempting to maintain their foothold in your organization.
@@ -303,29 +225,12 @@ Activity performed by a terminated user can indicate that a terminated employee
303
225
304
226
1. Cross-reference HR records to confirm that user is terminated.
305
227
1. Validate the existence of the Microsoft Entra user account.
306
-
> [!NOTE]
307
-
> If using Microsoft Entra Connect, validate the on-premises Active Directory object and confirm a successful sync cycle.
228
+
> [!NOTE]
229
+
> If using Microsoft Entra Connect, validate the on-premises Active Directory object and confirm a successful sync cycle.
230
+
308
231
1. Identify all apps that the terminated user had access to and decommission the accounts.
309
232
1. Update decommissioning procedures.
310
233
311
-
### Suspicious change of CloudTrail logging service
312
-
313
-
Activities in a single session indicating that, a user performed suspicious changes to the AWS CloudTrail logging service. This can indicate an attempted breach of your organization. When disabling CloudTrail, operational changes are no longer be logged. An attacker can perform malicious activities while avoiding a CloudTrail audit event, such as modifying an S3 bucket from private to public.
314
-
315
-
**TP**, **B-TP**, or **FP**?
316
-
317
-
1.**TP**: If you're able to confirm that the activity wasn't performed by a legitimate user.
318
-
319
-
**Recommended action**: Suspend the user, reset their password, and reverse the CloudTrail activity.
320
-
1.**FP**: If you're able to confirm that the user legitimately disabled the CloudTrail service.
321
-
322
-
**Recommended action**: Dismiss the alert.
323
-
324
-
**Understand the scope of the breach**
325
-
326
-
1. Review the activity log for other indicators of compromise and see who made the change to the CloudTrail service.
327
-
1. Optional: Create a playbook using Power Automate to contact users and their managers to verify their activity.
328
-
329
234
### Suspicious email deletion activity (by user)
330
235
331
236
> [!NOTE]
@@ -652,34 +557,6 @@ Establishing a new user's activity pattern requires an initial learning period o
652
557
1. Review the sensitivity of the shared files with the resource owner and validate the access level.
653
558
1. Create a file policy for similar documents to detect future sharing of sensitive files.
654
559
655
-
## Impact alerts
656
-
657
-
This section describes alerts indicating that a malicious actor might be attempting to manipulate, interrupt, or destroy your systems and data in your organization.
658
-
659
-
### Multiple delete VM activities
660
-
661
-
Activities in a single session indicating that a user performed an unusual number of VM deletions when compared to the baseline learned. Multiple VM deletions could indicate an attempt to disrupt or destroy an environment. However, there are many normal scenarios where VMs are deleted.
662
-
663
-
**TP**, **B-TP**, or **FP**?
664
-
665
-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents and only alert when the unusual behavior is detected.
666
-
667
-
**Learning period**
668
-
669
-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
670
-
671
-
-**TP**: If you're able to confirm that the deletions were unauthorized.
672
-
673
-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact.
674
-
-**B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these deletion activities.
675
-
676
-
**Recommended action**: Dismiss the alert.
677
-
678
-
**Understand the scope of the breach**
679
-
680
-
1. Contact the user and confirm the activity.
681
-
1. Review all user activity for additional indicators of compromise such as the alert is followed by one of the following alerts: [Impossible Travel](#impossible-travel), [Activity from anonymous IP address](#activity-from-anonymous-ip-address), or [Activity from infrequent country](#activity-from-infrequent-country).
682
-
683
560
### Ransomware activity
684
561
685
562
Ransomware is a cyberattack in which an attacker locks victims out of their devices or blocks them from accessing their files until the victim pays a ransom. Ransomware can be spread by a malicious shared file or compromised network. Defender for Cloud Apps uses security research expertise, threat intelligence, and learned behavioral patterns to identify ransomware activity. For example, a high rate of file uploads, or files deletions, might represent an encryption process that is common among ransomware operations.
@@ -732,15 +609,6 @@ Establishing a new user's activity pattern requires an initial learning period o
732
609
1. Review the deletion activities and create a list of deleted files. If needed, recover the deleted files.
733
610
1. Optionally, create a playbook using Power Automate to contact users and their managers to verify the activity.
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
738
-
739
-
-[Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
740
-
741
-
-[Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/protect-azure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You can use the following built-in policy templates to detect and notify you abo
31
31
32
32
| Type | Name |
33
33
| ---- | ---- |
34
-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple storage deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (preview)<br />[Multiple delete VM activities](anomaly-detection-policy.md#multiple-delete-vm-activities)<br />[Unusual multiple VM creation activities](anomaly-detection-policy.md#unusual-activities-by-user) (preview) |
34
+
| Built-in anomaly detection policy |[Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)|
35
35
36
36
For more information about creating policies, see [Create a policy](control-cloud-apps-with-policies.md#create-a-policy).
37
37
@@ -41,7 +41,7 @@ In addition to monitoring for potential threats, you can apply and automate the
41
41
42
42
| Type | Action |
43
43
| ---- | ---- |
44
-
| User governance |- Notify user on alert (via Microsoft Entra ID)<br />- Require user to sign in again (via Microsoft Entra ID)<br />- Suspend user (via Microsoft Entra ID) |
44
+
| User governance |- Notify user on alert (via Microsoft Entra ID)<br />- Require user to sign in again (via Microsoft Entra ID)<br />- Suspend user (via Microsoft Entra ID) |
45
45
46
46
For more information about remediating threats from apps, see [Governing connected apps](governance-actions.md).
0 commit comments