MCAS

%3CLINGO-SUB%20id%3D%22lingo-sub-3073455%22%20slang%3D%22en-US%22%3EMCAS%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3073455%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20getting%20lot%20of%20false%20positive%20alerts%20for%20Malware%20Detection%3C%2FP%3E%3C%2FLINGO-BODY%3E
Regular Visitor

We are getting lot of false positive alerts for Malware Detection

1 Reply

@Dinesh_Kumar199589 

 

To reduce false positives from MDCA built-in threat detections:

 

  1. First, ensure you have entered your organization's IP address ranges to tell MDCA more about your VPN and corporate IP ranges.  Note that if your corporate egress IPs are also used for egress of VPN clients, then that IP address/range should be categorized as VPN.  More info: Set IP ranges and tags | Microsoft Docs  
  2. Second, ensure that you follow the recommended investigation and feedback mechanisms for the built-in detection alerts.  Feeding back into these detections with the TP, B-TP, and FP information will improve the quality of detections. Defender for Cloud Apps anomaly detection alerts investigation guide | Microsoft Docs