Skip to content

Commit

Permalink
Merge pull request #2203 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 12/17, 5:00 PM IST
  • Loading branch information
aditisrivastava07 authored Dec 17, 2024
2 parents d4c19df + bcbc62d commit daf2d49
Showing 1 changed file with 0 additions and 4 deletions.
4 changes: 0 additions & 4 deletions CloudAppSecurityDocs/anomaly-detection-policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -141,10 +141,6 @@ These policies look for activities within a single session with respect to the b

* This detection identifies users that failed multiple login attempts in a single session with respect to the baseline learned, which could indicate on a breach attempt.

### Data exfiltration to unsanctioned apps

* This policy is automatically enabled to alert you when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.

### Multiple delete VM activities

* This policy profiles your environment and triggers alerts when users delete multiple VMs in a single session, relative to the baseline in your organization. This might indicate an attempted breach.
Expand Down

0 comments on commit daf2d49

Please sign in to comment.