You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/activity-filters-queries.md
+4-1
Original file line number
Diff line number
Diff line change
@@ -20,8 +20,11 @@ Below is a list of the activity filters that can be applied. Most filters suppor
20
20
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
21
21
- Activity object ID - the ID of the object (file, folder, user, or app ID).
22
22
23
-
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contain**, **Equal**, or **Starts with** the specific item.
23
+
- Item - Enables you to search by the name or ID of any activity object (for example, user names, files, parameters, sites). For the **Activity object Item** filter, you can select whether to filter for items that **Contains**, **Equals**, or **Starts with** the specific item.
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/app-governance-manage-app-governance.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Cyber attacks have become increasingly sophisticated in the ways they exploit th
11
11
12
12
To understand the potential risks and stop these types of attacks, you need to gain clear visibility into your organization’s app compliance posture. You need to be able to quickly identify when an app exhibits anomalous behaviors and respond when these behaviors present risks to your environment, data, and users. <br><br>
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/app-governance-predefined-policies.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ description: Get started learning about predefined app policies.
10
10
App governance contains a set of out of the box policies to detect anomalous app behaviors. These policies are activated by default, but you can deactivate them if you choose to.<br>
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/cas-compliance-trust.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
31
31
|**Customers whose tenants are provisioned in the European Union or the United Kingdom**| Either the European Union and/or the United Kingdom |
32
32
|**Customers whose tenants are provisioned in any other region**| The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
33
33
34
-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34
+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/investigate-anomaly-alerts.md
+4-65
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,6 @@ Following proper investigation, all Defender for Cloud Apps alerts can be classi
40
40
41
41
You should use the following general guidelines when investigating any type of alert to gain a clearer understanding of the potential threat before applying the recommended action.
42
42
43
-
- Review the user's [investigation priority score](tutorial-ueba.md#understand-the-investigation-priority-score) and compare with the rest of the organization. This will help you identify which users in your organization pose the greatest risk.
44
43
- If you identify a **TP**, review all the user's activities to gain an understanding of the impact.
45
44
- Review all user activity for other indicators of compromise and explore the source and scope of impact. For example, review the following user device information and compare with known device information:
46
45
- Operating system and version
@@ -712,74 +711,14 @@ Establishing a new user's activity pattern requires an initial learning period o
712
711
1. Review the deletion activities and create a list of deleted files. If needed, recover the deleted files.
713
712
1. Optionally, create a playbook using Power Automate to contact users and their managers to verify the activity.
Anomalous activities and activities that triggered alerts are given scores based on severity, user impact, and behavioral analysis of the user. The analysis is done based on other users in the tenants.
716
+
Starting November 2024, **Investigate risky users** support for Microsoft Defender for Cloud Apps is retired. If this feature was used in your organization and is needed, we recommend using the Entra risk score feature. Please use the following resources for additional information:
718
717
719
-
When there's a significant and anomalous increase in the investigation priority score of a certain user, the alert will be triggered.
718
+
-[Investigate risk Microsoft Entra ID Protection - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/howto-identity-protection-investigate-risk)
720
719
721
-
This alert enables detecting potential breaches that are characterized by activities that don't necessarily trigger specific alerts but accumulate to a suspicious behavior for the user.
720
+
-[Microsoft Entra ID Protection risk-based access policies - Microsoft Entra ID Protection | Microsoft Learn](/entra/id-protection/concept-identity-protection-policies)
722
721
723
-
**Learning period**
724
-
725
-
Establishing a new user's activity pattern requires an initial learning period of seven days, during which alerts aren't triggered for any score increase.
726
-
727
-
**TP**, **B-TP**, or **FP**?
728
-
729
-
1.**TP**: If you're able to confirm that the activities of the user aren't legitimate.
730
-
731
-
**Recommended action**: Suspend the user, mark the user as compromised, and reset their password.
732
-
733
-
1.**B-TP**: If you're able to confirm that user indeed significantly deviated from usual behavior, but there's no potential breach.
734
-
735
-
1.**FP** (Unusual behavior): If you're able to confirm that the user legitimately performed the unusual activities, or more activities than the established baseline.
736
-
737
-
**Recommended action**: Dismiss the alert.
738
-
739
-
**Understand the scope of the breach**
740
-
741
-
1. Review all user activity and alerts for additional indicators of compromise.
742
-
743
-
#### Deprecation timeline
744
-
745
-
We're gradually retiring the **Investigation priority score increase** alert from Microsoft Defender for Cloud Apps by August 2024.
746
-
747
-
After careful analysis and consideration, we decided to deprecate it due to the high rate of false positives associated with this alert, which we found wasn't contributing effectively to the overall security of your organization.
748
-
749
-
Our research indicated that this feature wasn't adding significant value and wasn't aligned with our strategic focus on delivering high-quality, reliable security solutions.
750
-
751
-
We're committed to continuously improving our services and ensuring that they meet your needs and expectations.
752
-
753
-
For those who wish to continue using this alert, we suggest using the following advanced hunting query instead as a suggested template. Modify the query based on your needs.
754
-
755
-
```kql
756
-
let time_back = 1d;
757
-
let last_seen_threshold = 30;
758
-
// the number of days which the resource is considered to be in use by the user lately, and therefore not indicates anomaly resource usage
759
-
// anomaly score based on LastSeenForUser column in CloudAppEvents table
-[Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
31
31
32
32
Microsoft Defender for Cloud Apps is available inside the Microsoft Defender portal. The Defender portal is the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure, allowing security admins to perform their security tasks in one location, across multiple Microsoft Defender services.
33
33
34
34
SOC analysts can triage, investigate, and hunt across all Microsoft Defender XDR workloads, including cloud apps.
35
35
36
-
Take a look in Microsoft Defender XDR at <https://security.microsoft.com>.
36
+
Take a look in the Microsoft Defender portal at <https://security.microsoft.com>.
37
37
38
-
Learn more about the benefits: [Overview of Microsoft Defender XDR](microsoft-365-defender.md).
38
+
Learn more about the benefits: [Overview of Microsoft Defender XDR](/defender-xdr/microsoft-365-defender).
39
39
40
40
## Perform cloud app security tasks
41
41
42
42
Find Defender for Cloud Apps functionality in the Microsoft Defender portal under **Cloud Apps**. For example:
43
43
44
-
:::image type="content" source="media/defender-for-cloud-apps/cloud-apps.png" alt-text="Screenshot that shows the Defender for Cloud Apps Cloud discovery page." lightbox="media/defender-for-cloud-apps/cloud-apps.png":::
44
+
:::image type="content" source="media/microsoft-365-security-center-defender-cloud-apps/cloud-apps.png" alt-text="Screenshot that shows the Defender for Cloud Apps Cloud discovery page." lightbox="media/microsoft-365-security-center-defender-cloud-apps/cloud-apps.png":::
45
45
46
46
## Investigate cloud app alerts
47
47
48
-
Defender for Cloud Apps alerts show in the Defender portal's incident and alerts queues, with relevant content inside alert pages for each type of an alert. For more information, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
48
+
Defender for Cloud Apps alerts show in the Defender portal's incident and alerts queues, with relevant content inside alert pages for each type of an alert. For more information, see [Investigate incidents in Microsoft Defender XDR](/defender-xdr/investigate-incidents).
49
49
50
50
## Global search for your connected cloud apps
51
51
@@ -57,7 +57,7 @@ Use the Microsoft Defender portal's global search bar at the top of the page to
57
57
58
58
Use the **Assets > Identities** page to find comprehensive details about entities pulled from connected cloud applications, including a users's activity history and security alerts related to the user. For example:
59
59
60
-
:::image type="content" source="media/defender-for-cloud-apps/dashboard-top-users.png" alt-text="Screenshot that shows cloud app entities in the Identities page." lightbox="media/defender-for-cloud-apps/dashboard-top-users.png":::
60
+
:::image type="content" source="media/microsoft-365-security-center-defender-cloud-apps/dashboard-top-users.png" alt-text="Screenshot that shows cloud app entities in the Identities page." lightbox="media/microsoft-365-security-center-defender-cloud-apps/dashboard-top-users.png":::
@@ -67,7 +67,7 @@ Learn how to protect your cloud apps in Microsoft Defender XDR:
67
67
68
68
**Protecting cloud apps in Microsoft Defender XDR**:<br>
69
69
70
-
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE59yVU title="Protecting cloud apps in Microsoft Defender XDR"]
70
+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=a722f8cd-806b-40dd-ad93-139fa2b487b9 title="Protecting cloud apps in Microsoft Defender XDR"]
71
71
72
72
<br>
73
73
@@ -76,9 +76,9 @@ Learn how to protect your cloud apps in Microsoft Defender XDR:
76
76
> [!VIDEO https://learn.microsoft.com/_themes/docs.theme/master/en-us/_themes/global/video-embed.html?id=2105e5c9-23bf-41fb-a61d-0f0fae8ef05f title="Defender for Cloud Apps in Microsoft Defender XDR for customers migrating from the classic portal"]
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/network-requirements.md
+9
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,15 @@ ms.topic: reference
11
11
12
12
This article provides a list of ports and IP addresses you need to allow and allowlist to work with Microsoft Defender for Cloud Apps.
13
13
14
+
In order to stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Cloud Apps services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
15
+
16
+
| Service tag name | Defender for Cloud Apps services included |
17
+
|:---|:---|
18
+
| MicrosoftCloudAppSecurity | Portal access, Access and session controls, SIEM agent connection, App connector, Mail server, Log collector. |
19
+
20
+
The following tables list the current static IP ranges covered by the MicrosoftCloudAppSecurity service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
21
+
22
+
14
23
## View your data center
15
24
16
25
Some of the requirements below depend on which data center you're connected to.
Copy file name to clipboardexpand all lines: CloudAppSecurityDocs/tutorial-ueba.md
-6
Original file line number
Diff line number
Diff line change
@@ -46,12 +46,6 @@ Defender for Cloud Apps uses the following to measure risk:
46
46
47
47
Select the investigation priority score for an alert or an activity to view the evidence that explains how Defender for Cloud Apps scored the activity.
48
48
49
-
> [!NOTE]
50
-
> We're gradually retiring the [**Investigation priority score increase**](investigate-anomaly-alerts.md#investigation-priority-score-increase-preview) alert from Microsoft Defender for Cloud Apps by August 2024. The investigation priority score and the procedure described in this article are not affected by this change.
51
-
>
52
-
> For more information, see [Investigation priority score increase deprecation timeline](investigate-anomaly-alerts.md#deprecation-timeline).
53
-
54
-
55
49
## Phase 1: Connect to the apps you want to protect<aname="connect-apps-protect"></a>
56
50
57
51
Connect at least one app to Microsoft Defender for Cloud Apps using the [API connectors](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md). We recommend that you start by connecting [Microsoft 365](./connect-office-365.md).
0 commit comments