Unlock instant, AI-driven research and patent intelligence for your innovation.

Security and compliance alerts based on content, activities, and metadata in cloud

A content metadata and metadata technology, applied in the field of security and compliance alerts based on content, activities, and metadata in the cloud, can solve problems such as false negatives, false positives, and deletion of pointed threats

Inactive Publication Date: 2019-10-22
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional methods of detection, analysis, and alerting are often mechanistic, which can lead to false negatives or false positives
For example, the deletion of a large number of files in a tenant's cloud storage may raise an alarm, but may not necessarily indicate a threat, whereas the deletion of the same number of files with certain types of sensitive data may point to a threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and compliance alerts based on content, activities, and metadata in cloud
  • Security and compliance alerts based on content, activities, and metadata in cloud
  • Security and compliance alerts based on content, activities, and metadata in cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] As briefly described above, embodiments relate to security and compliance alerts based on content, activity, and metadata in the cloud. In some examples, correlation signals associated with one or more of a tenant's stored content, content metadata, and activity associated with stored content may be analyzed and based on alert thresholds or broader "anomaly" patterns detection to determine the alert. Different recipients for different alerts or alert levels can be designated and alerts sent to the designated recipients. Alerts can also be displayed through the protection service's alert management dashboard. Alerts and analysis results can also be provided to the policy engine for use in tuning or creating rules, alert thresholds, and signal collection / analysis within policies. Postmortem investigations can also be initiated following an alert.

[0015] In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be analyzed and alert(s) determined based on alertthreshold(s) or broader "abnormal" pattern detection. Different recipients for different alerts or alert levels may be designated and the alert(s) transmitted to the designated recipients. Alerts mayalso be displayed through an alert management dashboard of a protection service. The alert(s) and the results of the analysis may also be provided to a policy engine for use in adjusting or creatingrules within a policy, alert thresholds, and signal collection / analysis. Post-fact investigations may also be initiated upon alerts.

Description

Background technique [0001] A hosted service provided by a service provider's tenants to its users (eg, a company to its employees or an organization to its members) is an increasingly common software usage model. Managed services cover a wide range of software applications and systems from cloud storage to productivity, and from collaboration to communications. Accordingly, any number of users may utilize the applications provided under the hosted service umbrella to generate, process, store, and collaborate on documents and other data. [0002] Use of such hosted services and processing of data may be subject to regulatory, legal, industry, and other rules. Different rules may apply depending on the particular service, data processed, type of organization, and many other factors. When policies are implemented for various data types and related actions, alerts can be raised in response to detected breaches or increased risk of breaches. However, traditional methods of dete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0227H04L63/1416H04L63/20H04L67/10H04L41/06H04L41/14H04L43/16H04L63/1425H04L63/145H04L63/1483
Inventor 陈彬彦B·阿普尔比A·加纳汉R·陈K·K·帕塔萨拉蒂S·C·帕拉尼P·韦特里维尔P·K·纽曼M·A·维尔德
Owner MICROSOFT TECH LICENSING LLC