
Please provide any MS links associated with these types of attack to avoid these in the future. Verifying an app includes using a Microsoft Cloud Partner Program (MCPP), formerly known as Microsoft Partner Network (MPN), account that's been verified and associating the verified PartnerID with an app registration. Please suggest what are the recommendations based on above information and which team should involve? List of exploits such as cross site scripting, DOC type injection attempt were targeted, Please clarify following 3 questions It is remote IP from where suspicious scripts ad files uploaded.

Security team, they have give source ip, destination ip and source host name Looks like following screenshot indicates site assets and documents library are involved in the attack Tried to verify in ULS logs but not found.Ĭan you please suggest how we can figure out this, is there any PowerShell command to get the exact IIS logs and ULS logs.Īlso apart from these what else we can do to check what activity done on this dates.įollowing information provided from security team: I have tried to search withe error, web app name and also with IP but not found anything. I have verified the IIS logs for those dates. We need to check the activity from 2 particular IPs, we have those ips.

We have received message from Security team, there was attack attempt on SharePoint farm,and it is for the particular web application.
