Skip to content

Commit 6c09e29

Browse files
authored
Merge branch 'main' into patch-1-sensitive-roles
2 parents 8ba4698 + 1d1c93e commit 6c09e29

8 files changed

Lines changed: 171 additions & 257 deletions

File tree

defender-for-cloud-apps/behaviors.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ Behaviors currently support low-fidelity, Defender for Cloud Apps and Defender f
4747
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |SuspiciousPowerBiReportSharing|
4848
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
4949

50+
> [!NOTE]
51+
> *"Multiple VM creation activities"* and *"Multiple delete VM activities"* are scheduled to be deprecated during **May 2026**. After deprecation, these behaviors will stop being generated and won't be available for hunting, custom detections, or correlation in Microsoft Defender XDR. Records generated before the deprecation date will be retained according to the standard data retention policy.
5052
5153
## Defender for Cloud Apps' transition from alerts to behaviors
5254

defender-for-cloud-apps/investigate-anomaly-alerts.md

Lines changed: 14 additions & 146 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,12 @@ To explain and make it easier to map the relationship between Defender for Cloud
2323
This guide provides information about investigating and remediating Defender for Cloud Apps alerts in the following categories.
2424

2525
> [!div class="checklist"]
26-
>
27-
> - [Initial Access](#initial-access-alerts)
28-
> - [Execution](#execution-alerts)
29-
> - [Persistence](#persistence-alerts)
30-
> - [Privilege Escalation](#privilege-escalation-alerts)
31-
> - [Credential Access](#credential-access-alerts)
32-
> - [Collection](#collection-alerts)
33-
> - [Exfiltration](#exfiltration-alerts)
34-
> - [Impact](#impact-alerts)
26+
- [Initial Access](#initial-access-alerts)
27+
- [Persistence](#persistence-alerts)
28+
- [Privilege Escalation](#privilege-escalation-alerts)
29+
- [Credential Access](#credential-access-alerts)
30+
- [Collection](#collection-alerts)
31+
- [Exfiltration](#exfiltration-alerts)
3532

3633
## Security alert classifications
3734

@@ -200,88 +197,13 @@ This detection identifies apps with characters, such as foreign letters, that re
200197

201198
1. On the **Google** or **Salesforce** tabs on the **App governance** page, select the app to open the **App drawer**, and then select **Related activity**. This opens the **Activity log** page filtered for activities performed by the app. Keep in mind that some apps perform activities that are registered as having been performed by a user. These activities are automatically filtered out of the results in the activity log. For further investigation using the activity log, see [Activity log](activity-filters.md).
202199
1. If you suspect that an app is suspicious, we recommended that you investigate the app's name and publisher in different app stores. When checking app stores, focus on the following types of apps:
203-
- Apps with a low number of downloads.
204-
- Apps with a low rating or score or bad comments.
205-
- Apps with a suspicious publisher or website.
206-
- Apps that haven't been recently updated. This might indicate an app that is no longer supported.
207-
- Apps that have irrelevant permissions. This might indicate that an app is risky.
200+
- Apps with a low number of downloads.
201+
- Apps with a low rating or score or bad comments.
202+
- Apps with a suspicious publisher or website.
203+
- Apps that haven't been recently updated. This might indicate an app that is no longer supported.
204+
- Apps that have irrelevant permissions. This might indicate that an app is risky.
208205
1. If you still suspect that an app is suspicious, you can research the app name, publisher, and URL online.
209206

210-
## Execution alerts
211-
212-
This section describes alerts indicating that a malicious actor might be attempting to run malicious code in your organization.
213-
214-
### Multiple storage deletion activities
215-
216-
Activities in a single session indicating that a user performed an unusual number of cloud storage or database deletions from resources such as Azure blobs, AWS S3 buckets, or Cosmos DB when compared to the baseline learned. This can indicate an attempted breach of your organization.
217-
218-
**Learning period**
219-
220-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
221-
222-
**TP**, **B-TP**, or **FP**?
223-
224-
1. **TP**: If you're to confirm that the deletions were unauthorized.
225-
226-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact.
227-
1. **FP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these deletion activities.
228-
229-
**Recommended action**: Dismiss the alert.
230-
231-
**Understand the scope of the breach**
232-
233-
1. Contact the user and confirm the activity.
234-
1. Review the activity log for other indicators of compromise and see who made the change.
235-
1. Review that user's activities for changes to other services.
236-
237-
### Multiple VM creation activities
238-
239-
Activities in a single session indicating that a user performed an unusual number of VM creation actions when compared to the baseline learned. Multiple VM creations on a breached Cloud infrastructure could indicate an attempt to run crypto mining operations from within your organization.
240-
241-
**Learning period**
242-
243-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
244-
245-
**TP**, **B-TP**, or **FP**?
246-
247-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents, such as an administrator legitimately created more VMs than the established baseline, and only alert when the unusual behavior is detected.
248-
249-
- **TP**: If you're able to confirm that the creation activities weren't performed by a legitimate user.
250-
251-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact. In addition, contact the user, confirm their legitimate actions, and then make sure you disable or delete any compromised VMs.
252-
- **B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these creation activities.
253-
254-
**Recommended action**: Dismiss the alert.
255-
256-
**Understand the scope of the breach**
257-
258-
1. Review all user activity for other indicators of compromise.
259-
1. Review the resources created or modified by the user and verify that they conform with your organization's policies.
260-
261-
### Suspicious creation activity for cloud region (preview)
262-
263-
Activities indicating that a user performed an unusual resource creation action in an uncommon AWS region when compared to the baseline learned. Resource creation in uncommon cloud regions could indicate an attempt to perform a malicious activity such as crypto mining operations from within your organization.
264-
265-
**Learning period**
266-
267-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
268-
269-
**TP**, **B-TP**, or **FP**?
270-
271-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents.
272-
273-
- **TP**: If you're able to confirm that the creation activities weren't performed by a legitimate user.
274-
275-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact. In addition, contact the user, confirm their legitimate actions, and then make sure you disable or delete any compromised cloud resources.
276-
- **B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these creation activities.
277-
278-
**Recommended action**: Dismiss the alert.
279-
280-
**Understand the scope of the breach**
281-
282-
1. Review all user activity for other indicators of compromise.
283-
1. Review the resources created and verify that they conform with your organization's policies.
284-
285207
## Persistence alerts
286208

287209
This section describes alerts indicating that a malicious actor might be attempting to maintain their foothold in your organization.
@@ -303,29 +225,12 @@ Activity performed by a terminated user can indicate that a terminated employee
303225

304226
1. Cross-reference HR records to confirm that user is terminated.
305227
1. Validate the existence of the Microsoft Entra user account.
306-
> [!NOTE]
307-
> If using Microsoft Entra Connect, validate the on-premises Active Directory object and confirm a successful sync cycle.
228+
> [!NOTE]
229+
> If using Microsoft Entra Connect, validate the on-premises Active Directory object and confirm a successful sync cycle.
230+
308231
1. Identify all apps that the terminated user had access to and decommission the accounts.
309232
1. Update decommissioning procedures.
310233

311-
### Suspicious change of CloudTrail logging service
312-
313-
Activities in a single session indicating that, a user performed suspicious changes to the AWS CloudTrail logging service. This can indicate an attempted breach of your organization. When disabling CloudTrail, operational changes are no longer be logged. An attacker can perform malicious activities while avoiding a CloudTrail audit event, such as modifying an S3 bucket from private to public.
314-
315-
**TP**, **B-TP**, or **FP**?
316-
317-
1. **TP**: If you're able to confirm that the activity wasn't performed by a legitimate user.
318-
319-
**Recommended action**: Suspend the user, reset their password, and reverse the CloudTrail activity.
320-
1. **FP**: If you're able to confirm that the user legitimately disabled the CloudTrail service.
321-
322-
**Recommended action**: Dismiss the alert.
323-
324-
**Understand the scope of the breach**
325-
326-
1. Review the activity log for other indicators of compromise and see who made the change to the CloudTrail service.
327-
1. Optional: Create a playbook using Power Automate to contact users and their managers to verify their activity.
328-
329234
### Suspicious email deletion activity (by user)
330235

331236
> [!NOTE]
@@ -652,34 +557,6 @@ Establishing a new user's activity pattern requires an initial learning period o
652557
1. Review the sensitivity of the shared files with the resource owner and validate the access level.
653558
1. Create a file policy for similar documents to detect future sharing of sensitive files.
654559

655-
## Impact alerts
656-
657-
This section describes alerts indicating that a malicious actor might be attempting to manipulate, interrupt, or destroy your systems and data in your organization.
658-
659-
### Multiple delete VM activities
660-
661-
Activities in a single session indicating that a user performed an unusual number of VM deletions when compared to the baseline learned. Multiple VM deletions could indicate an attempt to disrupt or destroy an environment. However, there are many normal scenarios where VMs are deleted.
662-
663-
**TP**, **B-TP**, or **FP**?
664-
665-
To improve accuracy and alert only when there's a strong indication of a breach, this detection establishes a baseline on each environment in the organization to reduce **B-TP** incidents and only alert when the unusual behavior is detected.
666-
667-
**Learning period**
668-
669-
Establishing a new user's activity pattern requires an initial learning period of seven days during which alerts aren't triggered for any new locations.
670-
671-
- **TP**: If you're able to confirm that the deletions were unauthorized.
672-
673-
**Recommended action**: Suspend the user, reset their password, and scan all devices for malicious threats. Review all user activity for other indicators of compromise and explore the scope of impact.
674-
- **B-TP**: If, after your investigation, you're able to confirm that the administrator was authorized to perform these deletion activities.
675-
676-
**Recommended action**: Dismiss the alert.
677-
678-
**Understand the scope of the breach**
679-
680-
1. Contact the user and confirm the activity.
681-
1. Review all user activity for additional indicators of compromise such as the alert is followed by one of the following alerts: [Impossible Travel](#impossible-travel), [Activity from anonymous IP address](#activity-from-anonymous-ip-address), or [Activity from infrequent country](#activity-from-infrequent-country).
682-
683560
### Ransomware activity
684561

685562
Ransomware is a cyberattack in which an attacker locks victims out of their devices or blocks them from accessing their files until the victim pays a ransom. Ransomware can be spread by a malicious shared file or compromised network. Defender for Cloud Apps uses security research expertise, threat intelligence, and learned behavioral patterns to identify ransomware activity. For example, a high rate of file uploads, or files deletions, might represent an encryption process that is common among ransomware operations.
@@ -732,15 +609,6 @@ Establishing a new user's activity pattern requires an initial learning period o
732609
1. Review the deletion activities and create a list of deleted files. If needed, recover the deleted files.
733610
1. Optionally, create a playbook using Power Automate to contact users and their managers to verify the activity.
734611

735-
### Investigation priority score increase (legacy)
736-
737-
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
738-
739-
- [Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
740-
741-
- [Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
742-
743-
744612
## See also
745613

746614
> [!div class="nextstepaction"]

0 commit comments

Comments
 (0)