Solution: Microsoft Business Applications
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Microsoft Corporation |
| Support Tier | Microsoft |
| Support Link | https://support.microsoft.com |
| Categories | domains |
| Version | 3.2.2 |
| Author | Microsoft |
| First Published | 2023-04-19 |
| Last Updated | 2026-02-25 |
| Solution Folder | Microsoft Business Applications |
| Marketplace | Azure Marketplace · Popularity: 🟢 High (85%) |
Microsoft Power Platform provides a wide range of tools for citizen developers to build, run and manage low-code and no-code applications quickly, simply and at scale. With that, it also introduces a concern around the risk of security vulnerabilities introduced by citizen developers, some of whom may lack the security awareness of traditional pro-dev community. To counter this, early threat detection is crucial and can complement preventative guardrails to enable frictionless productivity while minimizing cyber risk.
The Microsoft Sentinel solution for Microsoft Power Platform allows customers to monitor and detect various suspicious or malicious activities in their Power Platform environments.
It collects activity logs from the different Power Platform components (Power Apps, Power Automate, Power Platform Connectors, Power Platform DLP, Dataverse) as well as the Power Platform inventory data and analyzes those activity logs to detect threats and suspicious activities such as: Power Apps execution from unauthorized geographies, suspicious data destruction by Power Apps, mass deletion of Power Apps, phishing attacks made possible through Power Apps, Power Automate flows activity by departing employees, Microsoft Power Platform connectors added to the an environment, and the update or removal of Microsoft Power Platform data loss prevention policies.
Due to the integration of the Power Platform inventory data, in addition to the activity logs, the solution also allows customers to investigate the detected threats in a full human readable context and understand for example what the name of the suspicious app is, the name of Power Platform environment it belongs to, the details of the user who created or modified the suspicious app, the details of the users using the app, and more.
Important
Additional Information
This solution provides 4 data connector(s):
This solution uses 13 table(s):
| Table | Used By Connectors | Used By Content |
|---|---|---|
AuditLogs |
- | Analytics, Hunting |
DataverseActivity |
Microsoft Dataverse | Analytics, Hunting, Workbooks |
DeviceEvents |
- | Analytics, Hunting |
DeviceFileEvents |
- | Analytics |
DeviceInfo |
- | Analytics, Hunting |
EmailEvents |
- | Analytics |
FinanceOperationsActivity_CL |
Dynamics 365 Finance and Operations | Analytics |
OfficeActivity |
- | Analytics |
PowerAutomateActivity |
Microsoft Power Automate | Analytics |
PowerPlatformAdminActivity |
Microsoft Power Platform Admin Activity | Analytics, Hunting |
SigninLogs |
- | Analytics, Hunting |
ThreatIntelligenceIndicator |
- | Analytics |
UrlClickEvents |
- | Analytics |
The following 2 table(s) are used internally by this solution's content items:
| Table | Used By Connectors | Used By Content |
|---|---|---|
IdentityInfo |
- | Hunting |
SecurityAlert |
- | Analytics, Hunting |
This solution includes 72 content item(s):
| Content Type | Count |
|---|---|
| Analytic Rules | 49 |
| Hunting Queries | 8 |
| Playbooks | 8 |
| Parsers | 5 |
| Workbooks | 1 |
| Watchlists | 1 |
| Name | Tactics | Tables Used |
|---|---|---|
| Dataverse - Activity after Microsoft Entra alerts | InitialAccess | DataverseActivityInternal use: SecurityAlert |
| Dataverse - Activity after failed logons | InitialAccess | DataverseActivitySigninLogs |
| Dataverse - Cross-environment data export activity | Exfiltration, Collection | DataverseActivity |
| Dataverse - Dataverse export copied to USB devices | Exfiltration | DataverseActivityDeviceEventsDeviceInfo |
| Dataverse - Generic client app used to access production environments | Execution | DataverseActivitySigninLogs |
| Dataverse - Identity management activity outside of privileged directory role membership | PrivilegeEscalation | DataverseActivityInternal use: IdentityInfo |
| Dataverse - Identity management changes without MFA | InitialAccess | DataverseActivitySigninLogs |
| Power Apps - Anomalous bulk sharing of Power App to newly created guest users | InitialAccess, LateralMovement, ResourceDevelopment | AuditLogsPowerPlatformAdminActivity |
| Name | Tables Used |
|---|---|
| Dynamics365Activity | DataverseActivity |
| Name | Description | Tables Used |
|---|---|---|
| Dataverse: Add SharePoint sites to watchlist | This playbook is used to add new or updated SharePoint document management sites into the configurat... | - |
| Dataverse: Add user to blocklist (alert trigger) | This playbook can be triggered on-demand when a Microsoft Sentinel alert is raised, allowing the ana... | - |
| Dataverse: Add user to blocklist (incident trigger) | This playbook can be triggered when a Microsoft Sentinel incident is raised and will automatically a... | - |
| Dataverse: Add user to blocklist using Outlook approval workflow | This playbook can be triggered when a Microsoft Sentinel incident is raised and will automatically a... | - |
| Dataverse: Add user to blocklist using Teams approval workflow | This playbook can be triggered when a Microsoft Sentinel incident is raised and will automatically a... | - |
| Dataverse: Remove user from blocklist | This playbook can be triggered on-demand when a Microsoft Sentinel alert is raised, allowing the ana... | - |
| Dataverse: Send notification to manager | This playbook can be triggered when a Microsoft Sentinel incident is raised and will automatically s... | - |
| Security workflow: alert verification with workload owners | This playbook can reduce burden on the SOC by offloading alert verification to IT admins for specifi... | - |
| Name | Description | Tables Used |
|---|---|---|
| DataverseSharePointSites | DataverseSharePointSites | - |
| MSBizAppsNetworkAddresses | MSBizAppsNetworkAddresses | - |
| MSBizAppsOrgSettings | MSBizAppsOrgSettings | - |
| MSBizAppsTerminatedEmployees | MSBizAppsTerminatedEmployees | - |
| MSBizAppsVIPUsers | MSBizAppsVIPUsers | - |
| Name | Description | Tables Used |
|---|---|---|
| MSBizApps-Configuration | - | - |
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.2.3 | 23-02-2026 | Updated Dataverse - Activity after failed logons hunting query to use valid Enterprise technique |
| 3.2.2 | 22-04-2025 |
|
| 3.2.1 | 11-04-2025 |
|
| 3.2.0 | 15-11-2024 |
|
| 3.1.3 | 12-07-2024 |
|
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊