Microsoft 365 security alerts

In the Security & Compliance Center (protection.office.com), you can select Alerts | View alerts from the left navigation pane to view, filter, and resolve alerts:

To view more detail on an alert, check the box to its left. This opens a pane with more detail and the option to resolve it as seen in the screenshot that follows:

If you select Resolve on an alert, you're able to modify its status and add additional comments. For the status drop-down list, you can choose from the following to help track the status of the alert:

  • Keep it Active and just add comments: No change, except perhaps notes.
  • Investigating: Currently being looked into.
  • Resolved: Action has been taken so that the alert is no longer a concern.
  • Dismissed: The alert is a false positive or no action will be taken.

As seen in the following screenshot you can choose the alert status from a dropdown, enter accompanying comments, and save to update the alert accordingly.

Under Alert policies, you can adjust existing policies (and some default policies). For each policy, you'll configure the severity, category, conditions, actions, and so on. In the following example, the policy is default and is looking for anomalous activity in external file sharing: 

Here's a list of other activities (conditions) you could base a policy on. For the exam, be sure to become familiar with the types of policies you can create with these actions:

Common user activities

File and folder activities

File sharing activities

Synchronization events

Site administration activities

Detected malware in an email message

Accessed file

Accepted access request

Allowed computer to sync files

Added exempt user agent

Phishing email detected at time of delivery

Checked in file

Accepted sharing invitation

Blocked computer from syncing files

Added site collection admin

User submitted email

Checked out file

Created a company shareable link

Downloaded files to computer

Added user or group to SharePoint group

Detected malware in file

Copied file

Created access request

Downloaded file changes to computer

Allowed user to create groups

Shared file or folder

Deleted file

Created an anonymous link

Uploaded files to document library

Changed exempt user agents

Created mail forward/redirect rule

Discarded file checkout

Created sharing invitation

Uploaded file changes to document library

Changed a sharing policy

Any file or folder activity

Downloaded file

Denied access request

Created group

Changed file or folder

Modified file

Removed a company shareable link

Created Sent To connection

Shared file externally

Moved file

Removed an anonymous link

Created site collection

Granted Exchange admin permission

Renamed file

Shared file, folder, or site

Deleted group

Granted mailbox permission

Restored file

Updated an anonymous link

Deleted Sent To connection

External user file activity

Uploaded file

Used an anonymous link

Enabled document preview

DLP policy match

Enabled legacy workflow

An eDiscovery search was started or exported

Enabled Office on Demand

Enabled RSS feeds

Enabled result source for people searches

Modified site permissions

Removed user or group from SharePoint group

Renamed site

Requested site admin permissions

Set host site

Updated group

 

A good example of an alert you might be asked to create would be one that notifies someone when a file from a particularly sensitive site, or with a certain name, is shared externally. The following screenshot shows the configuration of an alert's trigger and scope:

Manage advanced alerts takes you to the Cloud App Security dashboard we discussed in a previous chapter.

In the next section, we'll look into the Azure AD Identity Protection dashboard and its alerts.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.217.21.95