Skip to content

Commit 1df22f1

Browse files
authored
Merge branch 'main' into batamig-patch-2
2 parents 6c7b12e + 4e312c8 commit 1df22f1

File tree

2 files changed

+8
-7
lines changed

2 files changed

+8
-7
lines changed

CloudAppSecurityDocs/protect-egnyte.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your Egnyte environment (Preview) | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Egnyte app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/05/2023
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77
# How Defender for Cloud Apps helps protect your Egnyte environment
@@ -77,9 +77,9 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
7777
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7878

7979
>[!NOTE]
80-
>Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice.
81-
>To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token).
82-
>Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
80+
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81+
>
82+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
8383
8484
## Next steps
8585

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/11/2024
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77

@@ -45,7 +45,8 @@ In Secure Score, select **Recommended actions** and filter by **Product** = **Se
4545

4646
For more information, see:
4747
- [Security posture management for SaaS apps](security-saas.md)
48-
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
48+
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score
49+
)
4950

5051
## Control ServiceNow with built-in policies and policy templates
5152

@@ -181,7 +182,7 @@ Revoke to the old refresh token. We don't recommend keeping old keys for securit
181182

182183
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
183184

184-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
185+
After connecting ServiceNow, you'll receive events for 1 hour prior to connection.
185186

186187
### Legacy ServiceNow connection
187188

0 commit comments

Comments
 (0)