Skip to content

Commit 10a81c3

Browse files
committed
Acrolinx fixes
1 parent 6f31e06 commit 10a81c3

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

CloudAppSecurityDocs/data-protection-policies.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,10 @@ To create a new file policy, follow this procedure:
6464
> [!NOTE]
6565
> The file policy,'Contains' filter searches only for complete words. These words must be separated by punctuation marks like commas, dots, hyphens, or spaces.
6666
> * Spaces or hyphens between words function like OR. For example, if you search for 'malware virus' it finds all files with either malware or virus in the name, so it finds both malware-virus.exe and virus.exe.
67-
> * If you want to search for a string, enclose the words in quotation marks. This functions like AND. For example, if you search for "malware" "virus," it finds virus-malware-file.exe but it will not find malwarevirusfile.exe and it will not find malware.exe. However, it searches for the exact string. If you search for "malware virus," it will not find "virus" or "virus-malware."\
67+
> * If you want to search for a string, enclose the words in quotation marks. This functions like AND. For example, if you search for "malware" "virus," it finds virus-malware-file.exe but it won't find malwarevirusfile.exe and it won't find malware.exe. However, it searches for the exact string. If you search for "malware virus," it won't find "virus" or "virus-malware."\
6868
> * **Equals** searches only for the complete string. For example, if you search for malware.exe it finds malware.exe but not *malware.exe.txt.*
6969
70-
1. Under the **Apply to** filter, select either **all files**, **all files excluding selected folders** or **selected folders** for Box, SharePoint, Dropbox, or OneDrive. This setting allows you to enforce the file policy across all files in the app or within specific folders. You are then prompted to sign in to the cloud app and add the relevant folders.
70+
1. Under the **Apply to** filter, select either **all files**, **all files excluding selected folders** or **selected folders** for Box, SharePoint, Dropbox, or OneDrive. This setting allows you to enforce the file policy across all files in the app or within specific folders. You're then prompted to sign in to the cloud app and add the relevant folders.
7171

7272
:::image type="content" source="media/file-policies/screenshot-showing-where-to-apply-file-policies-for-example-all-files-or-selected-folders.png" alt-text="Screenshot showing where to apply file policies, for example to all files or selected folders" lightbox="media/file-policies/screenshot-showing-where-to-apply-file-policies-for-example-all-files-or-selected-folders.png":::
7373

@@ -100,7 +100,7 @@ To create a new file policy, follow this procedure:
100100

101101
## File policy best practices
102102

103-
1. Avoid resetting the file policy using the **Reset results and apply actions again** checkbox in production environments unless it's absolutely necessary. Doing so initiates a full scan of all files covered by the policy, which can negatively impact performance.
103+
1. Avoid resetting the file policy using the **Reset results and apply actions again** checkbox in production environments unless it's necessary. Doing so initiates a full scan of all files covered by the policy, which can negatively affect performance.
104104

105105
1. When applying labels to files in a specific parent folder **and** its subfolders, use the **Apply to** -> **Selected folders** option. Then add each of the parent folders.
106106

@@ -124,7 +124,7 @@ Each policy is composed of the following parts:
124124

125125
* **Content inspection** – Enable you to narrow down the policy, based on DLP engine results. You can include a custom expression or a preset expression. Exclusions can be set and you can choose the number of matches. You can also use anonymization to mask the username.
126126

127-
* **Actions** – The policy provides a set of governance actions that can be automatically applied when violations are found. These actions are divided into collaboration actions, security actions, and investigation actions.
127+
* **Actions** – The policy provides a set of governance actions that can be automatically applied when violations are found. These actions are divided into collaboration actions, security actions, and investigation actions.
128128

129129
* **Extensions** - Content inspection can be performed via 3rd-party engines for improved DLP or anti-malware capabilities.
130130

@@ -148,7 +148,7 @@ You can go to the Policy center to review file policy violations.
148148

149149
## File filters
150150

151-
File filters allow you to apply specific criteria to your file policies, focusing on files that meet conditions such as file type, access level, and sharing status. This includes file types such as PDF, Office files, RTF, HTML, and code files.
151+
File filters allow you to apply specific criteria to your file policies and focus on files that meet conditions such as file type, access level, and share status. This includes file types such as PDF, Office files, RTF, HTML, and code files.
152152

153153
Below is a list of the file filters that can be applied:
154154

@@ -167,7 +167,7 @@ Below is a list of the file filters that can be applied:
167167
> [!NOTE]
168168
> Files shared into your connected storage apps by external users are handled as follows by Defender for Cloud Apps:
169169
> - **OneDrive:** OneDrive assigns an internal user as the owner of any file placed into your OneDrive by an external user. Because these files are then considered owned by your organization, Defender for Cloud Apps scans these files and applies policies as it does to any other file in your OneDrive.
170-
> - **Google Drive:** Google Drive considers these as being owned by the external user, and because of legal restrictions on files and data that your organization doesn't own, Defender for Cloud Apps doesn't have access to these files.
170+
> - **Google Drive:** Google Drive considers these files owned by the external user. Due to legal restrictions on files and data that your organization doesn't own, Defender for Cloud Apps doesn't have access to these files.
171171
> - **Box:** Because Box considers externally owned files to be private information, Box Global Admins can't see the content of the files. For this reason, Defender for Cloud Apps doesn't have access to these files.
172172
> - **Dropbox:** Because Dropbox considers externally owned files to be private information, Dropbox Global Admins can't see the content of the files. For this reason, Defender for Cloud Apps doesn't have access to these files.
173173
@@ -178,7 +178,7 @@ Below is a list of the file filters that can be applied:
178178
* **Any from domain** – If any user from this domain has direct access to the file.
179179
> [!NOTE]
180180
> - This filter doesn't support files that were shared with a group, only with specific users.
181-
> - For SharePoint and OneDrive, the filter doesn't support files shared with a specific user through a shared link.
181+
> - This filter doesn't support files shared with a specific user through a shared link for SharePoint and OneDrive.
182182
183183
- **Entire organization** – If the entire organization has access to the file.
184184

@@ -191,9 +191,7 @@ Below is a list of the file filters that can be applied:
191191

192192
- **Created** – File creation time. The filter supports before/after dates and a date range.
193193

194-
- **Extension** – Focus on specific file extensions. For example, all files that are executables (*.exe). This filter is case sensitive.
195-
> - Use the OR clause to apply the filter on more than a single capitalization variation.
196-
194+
- **Extension** – Focus on specific file extensions. For example, all files that are executables (*.exe). This filter is case sensitive. Use the OR clause to apply the filter on more than a single capitalization variation.
197195

198196
- **File ID** – Search for specific file IDs. File ID is an advanced feature that allows you to track certain high-value files without a dependency on owner, location, or name.
199197

@@ -229,7 +227,7 @@ Labels include:
229227

230228
- **Matched policy** - Files that are matched by an active Defender for Cloud Apps policy.
231229

232-
- **MIME type** – File MIME type check. It accepts free text.
230+
- **MIME type** – File Multipurpose Internet Mail Extensions (MIME) type check. It accepts free text.
233231

234232
- **Owner** -Include/exclude specific file owners. For example, track all files shared by *rogue_employee_#100*.
235233

@@ -238,12 +236,12 @@ Labels include:
238236
- **Parent folder** – Include or exclude a specific folder (doesn't apply to subfolders). For example, all publicly shared files except for files in this folder.
239237

240238
> [!NOTE]
241-
> Defender for Cloud Apps only detects new SharePoint and OneDrive folders after some file activity has been performed in them.
239+
> Defender for Cloud Apps only detects new SharePoint and OneDrive folders after some file activity occurs in them.
242240
- **Quarantined** – If the file quarantined by the service. For example, show me all files that are quarantined.
243241

244242
## Authorizing files
245243

246-
After Defender for Cloud Apps has identified files as posing a malware or DLP risk, we recommend you investigate the files. If you determine the files are safe, you can authorize them. Authorizing a file removes it from the malware detection report and suppresses future matches on this file.
244+
After Defender for Cloud Apps identifies files as posing a malware or DLP risk, we recommend you investigate the files. If you determine the files are safe, you can authorize them. Authorizing a file removes it from the malware detection report and suppresses future matches on this file.
247245

248246
### To authorize files
249247

@@ -252,9 +250,11 @@ After Defender for Cloud Apps has identified files as posing a malware or DLP ri
252250

253251
> [!TIP]
254252
> You can filter the list of policies by type. The following table lists, per risk type, which filter type to use:
255-
> |Risk type |Filter type |
256-
>|DLP |File policy|
257-
>|Malware | Malware detection policy |
253+
>
254+
> | Risk type | Filter type |
255+
> | --- | --- |
256+
> | DLP | File policy |
257+
> | Malware | Malware detection policy |
258258
259259
1. In the list of matched files, on the row in which the file under investigation appears, select the ✓ to **Authorize**.
260260

0 commit comments

Comments
 (0)