Target
- Admins of HENNGE Cloud Protection
Purpose
- This article explains the items that admins should consider in advance when a threat is detected in HENNGE Cloud Protection.
Notes
- The content of this article is based on the product details as of February 2025 and may change without notice thereafter.
Types of Detectable Threats
HENNGE Cloud Protection can monitor the following threats that may occur on Microsoft 365 in real-time and automatically respond when a threat is detected.
- Exchange Online
・Files containing malware (viruses, trojans, ransomware, etc.) attached to items on Exchange Online (※)
・Malicious URLs on Exchange Online items
・Leakage of Microsoft 365 accounts to third parties (account compromise)
・Malicious inbox rules
※ Microsoft Office 365 user mailbox items such as emails, attachments, calendar events, notes, contacts, groups, etc. - SharePoint
・Files containing malware (viruses, trojans, ransomware, etc.) uploaded to created sites - OneDrive
・Files containing malware (viruses, trojans, ransomware, etc.) uploaded - Teams
・Files containing malware (viruses, trojans, ransomware, etc.) uploaded
Response to Threats
The following responses are possible when a threat is detected.
Exchange Online
1. Malware files attached to Exchange Online items+
2. Malicious URLs on Exchange Online items+
3. Malicious inbox rules+
4. Compromised accounts+
5. Notifications+
SharePoint
1. Malware files uploaded to SharePoint Online sites+
2. Notification+
OneDrive
1. Malware files uploaded to OneDrive site+
2. Notification+
Teams
1. Malware files uploaded to Teams site+
2. Notification+
Considerations for Policy Settings
In Cloud Protection, you can start operations by setting policies in the following three ways:
- Set notifications only without taking any action
- Protect only some users
- Start detection/quarantine for all users
※ Please refer to the following for how to create policies
▼ Set Notifications Only Without Any Processing+
▼ Connect Only to Some Users+
▼ Start Applying to All Users+
Please use the optimal method from the above operation methods to prepare for full deployment.
Reference
Response When a Threat is Detected