Skip to content

Policy management

MDCA allows you to ingest data through app connectors, depending on the connected app, data will be gathered into the activity logs. These activity logs can then be searched/filtered for single or repeated activities and when they match they can generate alerts in your environment. Once you have created or reviewed a policy for a while you can enable governance actions which may allow you to disable a user, mark a user as compromised, or other useful actions can be taken on them.

What I have described above is an activity policy, but MDCA contains other types of policies as well. All the possible policies are:

  • Activity policy
  • File policy
  • App discovery policy
  • Access policy
  • Session policy
  • OAuth app policy

Default policies

Microsoft includes some default policies, these can be disabled or deleted and no filter exists to find the default ones, as of 2024 I believe these are the default policies and their default states. I am sure this has changed over the course of a few years since MDCA was known by a different name so the default policies in your environment may be different.

Policy State Type
Malware detection Disabled Unknown
Multiple delete VM activities Disabled Unknown
Suspicious inbox manipulation rule Enabled Unknown
Unusual administrative activity (by user) Disabled Unknown
Unusual file deletion activity (by user) Disabled Unknown
Activity from suspicious IP addresses Enabled Unknown
Activity from anonymous IP addresses Enabled Unknown
Unusual impersonated activity (by user) Disabled Unknown
Unusual file share activity (by user) Disabled Unknown
Activity performed by terminated user Enabled Unknown
Ransomware activity Enabled Unknown
Unusual file download (by user) Disabled Unknown
Impossible travel Disabled Unknown
Multiple failed login attempts Disabled Unknown
Suspicious inbox forwarding Enabled Unknown
Activity from infrequent country Disabled Unknown
Misleading publisher name for an OAuth app Enabled Unknown
Misleading OAuth app name Enabled Unknown
Multiple storage deletion activities Enabled Unknown
Suspicious Power BI report sharing Disabled Unknown
Suspicious email deletion activity (by user) Enabled Unknown
Suspicious change of CloudTrail logging service Enabled Unknown
Malicious OAuth app consent Enabled Unknown
Suspicious creation activity for cloud region Enabled Unknown
Suspicious OAuth app file download activities Disabled Unknown
Unusual addition of credentials to an OAuth app Disabled Unknown
Unusual ISP for an OAuth App Enabled Unknown
Suspicious file access activity (by user) Enabled Unknown