You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/use-case-admin-quarantine.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,10 +26,10 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
26
26
> - For a list of apps that support admin quarantine, see the list of [governance actions](governance-actions.md).
27
27
> - Files labeled by Defender for Cloud Apps can't be quarantined.
28
28
> - Defender for Cloud Apps admin quarantine actions are limited to 100 actions per day.
29
-
> - Sharepoint sites that are renamed either directly or as part of domain rename cannot be used as a folder location for admin quarantine.
29
+
> - Sharepoint sites that are renamed either directly or as part of domain rename can't be used as a folder location for admin quarantine.
30
30
31
31
32
-
1. When a file matches a policy, the **Admin quarantine** option will be available for the file.
32
+
1. When a file matches a policy, the **Admin quarantine** option is available for the file.
33
33
34
34
1. Do one of the following actions to quarantine the file:
35
35
@@ -51,7 +51,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
51
51
52
52
1. The user can only access the tombstone file. In the file, they can read the custom guidelines provided by IT and the correlation ID to give IT to release the file.
53
53
54
-
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This will bring you the report of matches, where you can see the matching and quarantined files:
54
+
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
0 commit comments