SOLVED

MCAS - High Severity Alert - "BUL-OauthAppPermissions-MicrosoftAccounts"

%3CLINGO-SUB%20id%3D%22lingo-sub-1112630%22%20slang%3D%22en-US%22%3EMCAS%20-%20High%20Severity%20Alert%20-%20%22BUL-OauthAppPermissions-MicrosoftAccounts%22%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1112630%22%20slang%3D%22en-US%22%3E%3CP%3EI%20recently%20reviewed%20a%20customers%20MCAS%20high%20severity%20alerts%20and%20noted%20a%20number%20of%20alerts%20with%20the%20subject%20-%26nbsp%3BBUL-OauthAppPermissions-MicrosoftAccounts%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20cannot%20find%20any%20information%20online%20regarding%20this%20detection%20and%20what%20it%20signifies%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20reviewed%20this%20documentation%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapp-permission-policy%23oauth-app-anomaly-detection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapp-permission-policy%23oauth-app-anomaly-detection-policies%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20outlines%202%20built%20in%20Oauth%20related%20policies%20but%20neither%20relate%20to%20the%20alerts%20I%20witnessed.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20customer%20in%20question%20has%20not%20created%20any%20custom%20policies.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20have%20also%20reviewed%20the%20release%20notes%20for%20MCAS%20and%20the%20notes%20for%20Release%20154%20(July%2021%202019)%20state%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EOAuth%20app%20anomaly%20detections%3C%2FSTRONG%3E%3CBR%20%2F%3E%3CSPAN%3EWe%20have%20expanded%20our%20current%20capability%20to%20detect%20suspicious%20OAuth%20apps.%20%3CSTRONG%3EFour%20new%20detections%20are%20now%20available%20out-of-the-box%3C%2FSTRONG%3E%20that%20profile%20the%20metadata%20of%20OAuth%20apps%20authorized%20in%20your%20organization%20to%20identify%20ones%20that%20are%20potentially%20malicious.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EI%20cant%20seem%20to%20find%20details%20of%20these%2C%20as%20I%20thought%20they%20may%20include%20the%20alert%20I%20am%20seeing.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EHas%20anyone%20seen%20these%20alerts%20before%3F%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EThanks%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%3EPaul%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1112630%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1156119%22%20slang%3D%22en-US%22%3ERe%3A%20MCAS%20-%20High%20Severity%20Alert%20-%20%22BUL-OauthAppPermissions-MicrosoftAccounts%22%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1156119%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F414254%22%20target%3D%22_blank%22%3E%40PJR_CDF%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHi%20PJR_CDF%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20policy%20BUL-OauthAppPermissions-MicrosoftAccounts%20is%20not%20a%20built-in%20OAuth%20detection%20policy.%20You%20can%20find%20the%20built-in%20OAuth%20policies%20by%20navigating%20to%20%E2%80%9CPolicies%E2%80%9D%20and%20filtering%20on%20type%20%E2%80%9COAuth%20app%20anomaly%20detection%20policy%E2%80%9D.%20In%20addition%2C%20setting%20the%20policy%20filter%20to%20show%20%E2%80%9COAuth%20app%20policy%E2%80%9D%20will%20reveal%20custom%20policies%20created%20by%20administrators.%20Using%20the%20cogwheel%20to%20edit%20the%20policy%20will%20reveal%20the%20criteria%20for%20triggering%20the%20alert%20and%20adjustments%20can%20be%20made.%20Also%2C%20accessing%20the%20%E2%80%9CActions%E2%80%9D%20on%20the%20policy%20page%20will%20allow%20you%20to%20disable%20the%20policy.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Contributor

I recently reviewed a customers MCAS high severity alerts and noted a number of alerts with the subject - BUL-OauthAppPermissions-MicrosoftAccounts

 

I cannot find any information online regarding this detection and what it signifies?

 

I have reviewed this documentation:

https://docs.microsoft.com/en-us/cloud-app-security/app-permission-policy#oauth-app-anomaly-detectio...

 

This outlines 2 built in Oauth related policies but neither relate to the alerts I witnessed.

 

The customer in question has not created any custom policies.

 

I have also reviewed the release notes for MCAS and the notes for Release 154 (July 21 2019) state

 

OAuth app anomaly detections
We have expanded our current capability to detect suspicious OAuth apps. Four new detections are now available out-of-the-box that profile the metadata of OAuth apps authorized in your organization to identify ones that are potentially malicious.

 

I cant seem to find details of these, as I thought they may include the alert I am seeing.

 

Has anyone seen these alerts before?

 

Thanks

 

Paul

1 Reply
Best Response confirmed by PJR_CDF (Contributor)
Solution

@PJR_CDF 

 

Hi PJR_CDF,

 

The policy BUL-OauthAppPermissions-MicrosoftAccounts is not a built-in OAuth detection policy. You can find the built-in OAuth policies by navigating to “Policies” and filtering on type “OAuth app anomaly detection policy”. In addition, setting the policy filter to show “OAuth app policy” will reveal custom policies created by administrators. Using the cogwheel to edit the policy will reveal the criteria for triggering the alert and adjustments can be made. Also, accessing the “Actions” on the policy page will allow you to disable the policy.