MS.DEFENDER.5.1v1 - At a minimum, the alerts required by the CISA M365 Security Configuration Baseline for Exchange Online SHALL be enabled.

Information

Potentially malicious or service-impacting events may go undetected without a means of detecting these events. Setting up a mechanism to alert administrators to the list of events linked above draws attention to them to minimize any impact to users and the agency.

Solution

1. Sign in to Microsoft 365 Defender.

2. Under Email & collaboration, select Policies & rules.

3. Select Alert Policy.

4. Select the checkbox next to each alert to enable as determined by the agency and at a minimum those referenced in the [_CISA M365 Security Configuration Baseline for Exchange Online_](./exo.md#msexo161v1) which are:

a. Suspicious email sending patterns detected.

b. Suspicious connector activity.

c. Suspicious Email Forwarding Activity.

d. Messages have been delayed.

e. Tenant restricted from sending unprovisioned email.

f. Tenant restricted from sending email.

g. A potentially malicious URL click was detected.

5. Click the pencil icon from the top menu.

6. Select the Enable selected policies action from the Bulk actions menu.

See Also

https://github.com/cisagov/ScubaGear/tree/v1.5.0/

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-2, 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|CA-7, 800-53|CM-2, 800-53|CM-5, 800-53|CM-6, 800-53|CM-7, 800-53|CM-10, 800-53|IA-2, 800-53|IA-9, 800-53|SC-8, 800-53|SC-23, 800-53|SI-3, 800-53|SI-4, 800-53|SI-7

Plugin: microsoft_azure

Control ID: 1abf1921f039ac9def5f79a2f7ca6f873ea106f846c734b2b1ca408dbea15d9b