You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/role-groups.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ For more information, see [Custom roles in role-based access control for Microso
28
28
> [!NOTE]
29
29
> Information included from the [Defender for Cloud Apps activity log](classic-mcas-integration.md#activities) may still contain Defender for Identity data. This content adheres to existing Defender for Cloud Apps permissions.
30
30
>
31
-
> Exception: If you have configured [Scoped deployment](/defender-cloud-apps/scoped-deployment) for Microsoft Defender for Identity alerts in the Microsoft Defender for Cloud Apps portal, these permissions do not carry over and you will have to explicitly grant the Security operations \ Security data \ Security data basics (read) permissions for the relevant portal users.
31
+
> Exception: If you have configured [Scoped deployment](/defender-cloud-apps/scoped-deployment) for Microsoft Defender for Identity alerts in Microsoft Defender for Cloud Apps, these permissions do not carry over and you will have to explicitly grant the Security operations \ Security data \ Security data basics (read) permissions for the relevant portal users.
32
32
33
33
## Required permissions Defender for Identity in Microsoft Defender XDR
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/activity-filters-queries.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ This article provides descriptions and instructions for Defender for Cloud Apps
15
15
16
16
Below is a list of the activity filters that can be applied. Most filters support multiple values as well as *NOT* to provide you with a powerful tool for policy creation.
17
17
18
-
- Activity ID - Search only for specific activities by their ID. This filter is useful when you connect Microsoft Defender for Cloud Apps to your SIEM (using the SIEM agent) and you want to further investigate alerts within the Defender for Cloud Apps portal.
18
+
- Activity ID - Search only for specific activities by their ID. This filter is useful when you connect Microsoft Defender for Cloud Apps to your SIEM (using the SIEM agent) and you want to further investigate alerts using Defender for Cloud Apps.
19
19
20
20
- Activity objects – Search for the objects the activity was done on. This filter applies to files, folders, users, or app objects.
21
21
- Activity object ID - the ID of the object (file, folder, user, or app ID).
@@ -70,41 +70,41 @@ Below is a list of the activity filters that can be applied. Most filters suppor
70
70
- Tor exit nodes
71
71
- Zscaler
72
72
73
-
- Impersonated activity – Search only for activities that were performed in the name of another user.
73
+
- Impersonated activity - Search only for activities that were performed in the name of another user.
74
74
75
75
- Instance - The app instance where the activity was or wasn't performed.
76
76
77
-
- Location – The country/region from which the activity was performed.
77
+
- Location - The country/region from which the activity was performed.
78
78
79
-
- Matched Policy – Search for activities that matched a specific policy that was set in the portal.
79
+
- Matched Policy - Search for activities that matched a specific policy that was set in the portal.
80
80
81
-
- Registered ISP – The ISP from which the activity was performed.
81
+
- Registered ISP - The ISP from which the activity was performed.
82
82
83
83
- Source - Search by the source from which the activity was detected. The source can be any of the following:
84
-
- App connector - logs coming directly from the app's API connector.
84
+
- App connector - Logs coming directly from the app's API connector.
85
85
- App connector analysis - Defender for Cloud Apps enrichments based on information scanned by the API connector.
86
86
87
-
- User – The user who performed the activity, which can be filtered into domain, group, name, or organization. In order to filter activities with no specific user, you can use the 'is not set' operator.
87
+
- User - The user who performed the activity, which can be filtered into domain, group, name, or organization. In order to filter activities with no specific user, you can use the 'is not set' operator.
88
88
- User domain - Search for a specific user domain.
89
-
- User organization – The organizational unit of the user who performed the activity, for example, all activities performed by EMEA_marketing users. This is only relevant for connected Google Workspace instances using organizational units.
90
-
- User group – Specific user groups that you can import from connected apps, for example, Microsoft 365 administrators.
89
+
- User organization - The organizational unit of the user who performed the activity, for example, all activities performed by EMEA_marketing users. This is only relevant for connected Google Workspace instances using organizational units.
90
+
- User group - Specific user groups that you can import from connected apps, for example, Microsoft 365 administrators.
91
91
- User name - Search for a specific username. To see a list of users in a specific user group, in the **Activity drawer**, select the name of the user group. Clicking will take you to the Accounts page, which lists all the users in the group. From there, you can drill down into the details of the accounts of specific users in the group.
92
92
- The **User group** and **User name** filters can be further filtered by using the **As** filter and selecting the role of the user, which can be any of the following:
93
93
- Activity object only - meaning that the user or user group selected didn't perform the activity in question; they were the object of the activity.
94
94
- Actor only - meaning that the user or user group performed the activity.
95
95
- Any role - Meaning that the user or user group was involved in the activity, either as the person who performed the activity or as the object of the activity.
96
96
97
-
- User agent – The user agent of from with the activity was performed.
97
+
- User agent - The user agent of from with the activity was performed.
98
98
99
-
- User agent tag – Built-in user agent tag, for example, all activities from outdated operating systems or outdated browsers.
99
+
- User agent tag - Built-in user agent tag, for example, all activities from outdated operating systems or outdated browsers.
100
100
101
101
## Activity queries
102
102
103
103
To make investigation even simpler, you can now create custom queries and save them for later use.
104
104
105
105
1. In the **Activity log** page, use the filters as described above to drill down into your apps as necessary.
106
106
107
-
:::image type="content" source="media/activity-log-query.png" alt-text="Use filters to make query.":::
107
+
:::image type="content" source="media/activity-log-query.png" alt-text="Use filters to make query.":::
108
108
109
109
1. After you've finished building your query, select the **Save as** button.
110
110
@@ -118,23 +118,23 @@ To make investigation even simpler, you can now create custom queries and save t
118
118
119
119
Defender for Cloud Apps also provides you with **Suggested queries**. Suggested queries provide you with recommended avenues of investigation that filter your activities. You can edit these queries and save them as custom queries. The following are optional suggested queries:
120
120
121
-
- Admin activities - filters all your activities to display only those activities that involve admins.
121
+
- Admin activities - Filters all your activities to display only those activities that involve admins.
122
122
123
-
- Download activities - filters all your activities to display only those activities that were download activities, including downloading user list as a .csv file, downloading shared content, and downloading a folder.
123
+
- Download activities - Filters all your activities to display only those activities that were download activities, including downloading user list as a .csv file, downloading shared content, and downloading a folder.
124
124
125
-
- Failed log-in - filters all your activities to display only failed sign-in and failed sign-ins via SSO
125
+
- Failed log-in - Filters all your activities to display only failed sign-in and failed sign-ins via SSO
126
126
127
-
- File and folder activities - filters all your activities to display only those involving files and folders. The filter includes uploading, download, and accessing folders, along with creating, deleting, uploading, downloading, quarantining, and accessing files and transferring content.
127
+
- File and folder activities - Filters all your activities to display only those involving files and folders. The filter includes uploading, download, and accessing folders, along with creating, deleting, uploading, downloading, quarantining, and accessing files and transferring content.
128
128
129
-
- Impersonation activities - filters all your activities to display only impersonation activities.
129
+
- Impersonation activities - Filters all your activities to display only impersonation activities.
130
130
131
-
- Password changes and reset requests - filters all your activities to display only those activities that involve password reset, change password, and force a user to change the password on the next sign-in.
131
+
- Password changes and reset requests - Filters all your activities to display only those activities that involve password reset, change password, and force a user to change the password on the next sign-in.
132
132
133
-
- Sharing activities - filters all your activities to display only those activities that involve sharing folders and files, including creating a company link, creating an anonymous link, and granting read/write permissions.
133
+
- Sharing activities - Filters all your activities to display only those activities that involve sharing folders and files, including creating a company link, creating an anonymous link, and granting read/write permissions.
134
134
135
-
- Successful log-in - filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
135
+
- Successful log-in - Filters all your activities to display only those activities that involve successful sign-ins, including impersonate action, impersonate sign-in, single sign-o sign-ins, and sign-in from a new device.
136
136
137
-

137
+

138
138
139
139
Additionally, you can use the suggested queries as a starting point for a new query. First, select one of the suggested queries. Then, make changes as needed and finally select **Save as** to create a new **Saved query**.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-tokens-legacy.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,15 @@ ms.topic: reference
8
8
9
9
10
10
11
-
In order to access the Defender for Cloud Apps API, you have to create an API token and use it in your software to connect to the API. This token will be included in the header when Defender for Cloud Apps makes API requests.
11
+
In order to access the Defender for Cloud Apps API, you have to create an API token and use it in your software to connect to the API. This token is included in the header when Defender for Cloud Apps makes API requests.
12
12
13
13
The API tokens tab enables you to help you manage all the API tokens of your tenant.
14
14
15
15
## Generate a token
16
16
17
17
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **System**, select **API tokens**.
18
18
19
-
1. Select the **Add token** and provide a name to identify the token in the future, and select **Generate**.
19
+
1. Select **Add token** and provide a name to identify the token in the future, and select **Generate**.
20
20
21
21

22
22
@@ -26,9 +26,9 @@ The API tokens tab enables you to help you manage all the API tokens of your ten
26
26
27
27
-**Generated:** Tokens that have never been used.
28
28
-**Active:** Tokens that were generated and were used within the past seven days.
29
-
-**Inactive:** Tokens that were used but there was no activity in the last seven days.
29
+
-**Inactive:** Tokens that were used, but there was no activity in the last seven days.
30
30
31
-
1. After you generate a new token, you'll be provided with a new URL to use to access the Defender for Cloud Apps portal.
31
+
1. After you generate a new token, you'll be provided with a new URL to use to access Defender for Cloud Apps.
32
32
33
33

34
34
@@ -46,7 +46,7 @@ After a token is revoked, it's removed from the table, and the software that was
46
46
47
47
> [!NOTE]
48
48
>
49
-
> - SIEM connectors and log collectors also use API tokens. These tokens should be managed from the log collectors and SIEM agent sections and do not appear in this table.
50
-
> - Deprovisioned users API tokens are retained in Defender for Cloud Apps but cannot be used. Any attempt to use them will result in a permission denied response. However, we recommend that such tokens are revoked on the **API tokens** page.
49
+
> - SIEM connectors and log collectors also use API tokens. These tokens should be managed from the log collectors and SIEM agent sections and don't appear in this table.
50
+
> - Deprovisioned users API tokens are retained in Defender for Cloud Apps but can't be used. Any attempt to use them will result in a permission denied response. However, we recommend that such tokens are revoked on the **API tokens** page.
51
51
52
52
[!INCLUDE [Open support ticket](includes/support.md)]
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/azip-integration.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.topic: how-to
6
6
---
7
7
# Integrate with Microsoft Purview for information protection
8
8
9
-
Microsoft Defender for Cloud Apps lets you automatically apply sensitivity labels from Microsoft Purview. These labels are applied to files as a file policy governance action, and depending on the label configuration, can apply encryption for additional protection. You can also investigate files by filtering for the applied sensitivity label within the Defender for Cloud Apps portal. Using labels enables greater visibility and control of your sensitive data in the cloud. Integrating Microsoft Purview with Defender for Cloud Apps is as easy as selecting a single checkbox.
9
+
Microsoft Defender for Cloud Apps lets you automatically apply sensitivity labels from Microsoft Purview. These labels are applied to files as a file policy governance action, and depending on the label configuration, can apply encryption for additional protection. You can also investigate files by filtering for the applied sensitivity label within Defender for Cloud Apps. Using labels enables greater visibility and control of your sensitive data in the cloud. Integrating Microsoft Purview with Defender for Cloud Apps is as easy as selecting a single checkbox.
10
10
11
11
By integrating Microsoft Purview into Defender for Cloud Apps, you can use the full power of both services and secure files in your cloud, including:
12
12
@@ -76,13 +76,13 @@ All you have to do to integrate Microsoft Purview with Defender for Cloud Apps i
76
76
77
77
To enable Defender for Cloud Apps to scan files with content inspection enabled for sensitivity labels:
78
78
79
-
In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Then go to **Information Protection** -> **Microsoft Information Protection**.
79
+
In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Then go to **Information Protection** -> **Microsoft Information Protection**.
80
80
81
81
1. Under **Microsoft Information Protection settings**, select **Automatically scan new files for sensitivity labels from Microsoft Information Protection and content inspection warnings**.
82
82
83
83

84
84
85
-
After enabling Microsoft Purview, you'll be able to see files that have sensitivity labels and filter them per label in Defender for Cloud Apps. After Defender for Cloud Apps is connected to the cloud app, you'll be able to use the Microsoft Purview integration features to apply sensitivity labels from Microsoft Purview (with or without encryption) in the Defender for Cloud Apps portal, by adding them directly to files or by configuring a file policy to apply sensitivity labels automatically as a governance action.
85
+
After enabling Microsoft Purview, you'll be able to see files that have sensitivity labels and filter them per label in Defender for Cloud Apps. After Defender for Cloud Apps is connected to the cloud app, you'll be able to use the Microsoft Purview integration features to apply sensitivity labels from Microsoft Purview (with or without encryption) in the Defender for Cloud Apps, by adding them directly to files or by configuring a file policy to apply sensitivity labels automatically as a governance action.
86
86
87
87
> [!NOTE]
88
88
> Automatic scan does not scan existing files until they are modified again. To scan existing files for sensitivity labels from Microsoft Purview, you must have at least one **File policy** that includes content inspection. If you have none, create a new **File policy**, delete all the preset filters, under **Inspection method** select **Built-in DLP**. In the **Content inspection** field, select **Include files that match a preset expression** and select any predefined value, and save the policy. This enables content inspection, which automatically detects sensitivity labels from Microsoft Purview.
@@ -91,7 +91,7 @@ After enabling Microsoft Purview, you'll be able to see files that have sensitiv
91
91
92
92
By default, Defender for Cloud Apps scans sensitivity labels that were defined in your organization and external ones defined by other organizations.
93
93
94
-
To ignore sensitivity labels set external to your organization, go to the Microsoft Defender Portal and select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, select **Microsoft Information Protection**. Then select **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**.
94
+
To ignore sensitivity labels set external to your organization, go to the Microsoft Defender Portal and select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, select **Microsoft Information Protection**. Then select **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**.
95
95
96
96

97
97
@@ -112,7 +112,7 @@ To ignore sensitivity labels set external to your organization, go to the Micros
112
112
113
113
4. You can also remove sensitivity labels by choosing the **Remove sensitivity label** option.
114
114
115
-
For more information about how Defender for Cloud Apps and Microsoft Purview work together, see [Automatically apply sensitivity labels from Microsoft Purview](use-case-information-protection.md).
115
+
For more information about how Defender for Cloud Apps and Microsoft Purview work together, see [Automatically apply sensitivity labels from Microsoft Purview](use-case-information-protection.md).
116
116
117
117
### Automatically label files
118
118
@@ -148,8 +148,8 @@ Follow these instructions to create the file policy:
148
148
149
149
1. Then, you can create file policies in Defender for Cloud Apps to control files that are shared inappropriately and find files that are labeled and were recently modified.
150
150
151
-
- You can create a policy that automatically applies a sensitivity label to specific files.
152
-
- You can also trigger alerts on activities related to file classification.
151
+
- You can create a policy that automatically applies a sensitivity label to specific files.
152
+
- You can also trigger alerts on activities related to file classification.
153
153
154
154
> [!NOTE]
155
155
> When sensitivity labels are disabled on a file, the disabled labels appear as disabled in Defender for Cloud Apps. Deleted labels are not displayed.
0 commit comments