You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/change-password-krbtgt-account.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,9 @@ If the KRBTGT account's password is compromised, an attacker can use its hash to
29
29
1. Take appropriate action on those accounts by resetting their password **twice** to invalidate the Golden Ticket attack.
30
30
31
31
> [!NOTE]
32
-
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
32
+
> The krbtgt Kerberos account in all Active Directory domains supports key storage in all Kerberos Key Distribution Centers (KDC). To renew the Kerberos keys for TGT encryption, periodically change the krbtgt account password. It is recommended to use the [Microsoft-provided script.](https://github.com/microsoft/New-KrbtgtKeys.ps1)
33
+
> When resetting the password twice, wait at least 10 hours between resets to avoid Kerberos authentication issues. This wait time is enforced by the script and aligns with best practices.
34
+
33
35
### Next steps
34
36
35
37
[Learn more about Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-app-policies-get-started.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
---
2
2
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3
-
ms.date: 05/28/2023
3
+
ms.date: 08/31/2025
4
4
ms.topic: how-to
5
5
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6
+
ms.reviewer: shragar456
6
7
---
7
8
8
9
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
23
24
24
25
For example:
25
26
26
-

27
+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
27
28
28
29
> [!NOTE]
29
30
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
30
31
>
31
32
32
33
## What’s available on the app policies dashboard
33
34
34
-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35
+
The **App governance** > **Policies** tab shows the number of activeand disabled policies, and the following information for each policy:
35
36
36
37
-**Policy name**
37
38
-**Status**
38
39
39
40
-**Active**: All policy evaluation and actions are active.
40
-
-**Inactive**: All policy evaluation and actions are disabled.
41
-
-**Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41
+
-**Disabled**: All policy evaluation and actions are disabled.
42
42
43
43
-**Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
44
44
-**Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
74
74
75
75
1. Select **Edit**.
76
76
77
-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77
+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
78
78
79
79
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
80
80
81
-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81
+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82
+
83
+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
82
84
83
85
1. Choose whether to modify the existing conditions of the policy.
84
86
85
87
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
86
88
- Otherwise, select **Use existing conditions of the policy**.
87
89
88
-
When you're done, select **Next**.
90
+
1. When you're done, select **Next**.
89
91
90
92
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
91
93
92
-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94
+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
93
95
94
96
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-app-policies-manage.md
+14-33Lines changed: 14 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
---
2
2
title: Manage app policies
3
-
ms.date: 05/21/2023
3
+
ms.date: 09/08/2025
4
4
ms.topic: how-to
5
5
description: Manage your app governance policies.
6
+
ms.reviewer: shragar456
6
7
---
7
8
8
9
# Manage app policies
@@ -12,55 +13,35 @@ Use app governance to manage OAuth policies for Microsoft 365, Google Workspace,
12
13
You might need to manage your app policies as follows to keep up-to-date with your organization's apps, respond to new app-based attacks, and for ongoing changes to your app compliance needs:
13
14
14
15
- Create new policies targeted at new apps
15
-
- Change the status of an existing policy (active, inactive, audit mode)
16
+
- Change the status of an existing policy (active or disable)
16
17
- Change the conditions of an existing policy
17
18
- Change the actions of an existing policy for auto-remediation of alerts
## Manage OAuth app policies for Microsoft Entra ID
22
-
23
-
Here's an example of a process for managing an existing policy for Microsoft Entra apps:
24
-
25
-
1. Edit the policy:
26
-
27
-
- Change the settings of the policy.
28
-
- If needed, change the status to **Audit mode** for testing.
29
-
30
-
1. Check for expected behavior, such as alerts generated.
31
-
1. If the behavior isn't expected, go back to step 1.
32
-
1. If the behavior is expected, edit the policy and change its status to active (if needed).
33
-
34
-
For example:
35
-
36
-
:::image type="content" source="media/app-governance/mapg-manage-policy-process.png" alt-text="Diagram of the manage app policy workflow." lightbox="media/app-governance/mapg-manage-policy-process.png" border="false":::
21
+
## Editing an app policy configuration
37
22
38
-
> [!NOTE]
39
-
> Following the change in the **Activity type** filter, policies with the previous filter will have a "LEGACY" label attached to the filter and if the policies are edited or deleted the filter can't be restored.
23
+
To change the configuration of a user defined app policy:
40
24
41
-
## Editing an app policy configuration
25
+
1. Select the policy in the policy list, and then select **Edit** on the app policy pane.
42
26
43
-
To change the configuration of an existing app policy:
27
+
1. In the **Edit policy** page, you can make the following changes:
44
28
45
-
- Select the policy in the policy list, and then select **Edit** on the app policy pane.
46
-
- Select the vertical ellipses for the policy in the list, and then select **Edit**.
29
+
-**Description**: Change the description to make it easier to understand the policy's purpose.
30
+
-**Severity** : Change the severity for your app policy to low, medium, or high.
31
+
-**Policy settings**: Change the set of apps to which the policy applies. You can also choose to use the existing conditions or modify the conditions
32
+
-**Actions**: Change the autoremediation action for alerts generated by the policy.
33
+
-**Status**: Change the policy status.
47
34
48
-
For the **Edit policy** page, step through the pages and make the appropriate changes:
35
+
:::image type="content" source="media/app-governance-app-policies-manage/edit-user-defined-policy.png" alt-text="Screenshot that shows how to edit a user defined policy in the Defender portal. " lightbox="media/app-governance-app-policies-manage/edit-user-defined-policy.png":::
49
36
50
-
-**Description**: Change the description to make it easier to understand the policy's purpose.
51
-
-**Severity**
52
-
-**Policy settings**: Change the set of apps to which the policy applies. You can also choose to use the existing conditions or modify the conditions
53
-
-**Actions**: Change the autoremediation action for alerts generated by the policy.
54
-
-**Status**: Change the policy status.
55
37
56
38
## Deleting an app policy
57
39
58
40
To delete an app policy, you can:
59
41
60
42
- Select the policy in the policy list, and then select **Delete** on the app policy pane.
61
-
- Select the vertical ellipses for the policy in the list, and then select **Delete**.
62
43
63
-
An alternative to deleting an app policy is to change its status to inactive. Once inactive, the policy doesn't generate alerts. For example, rather than deleting an app policy for an app with a specific set of conditions that are useful for a future policy, rename the app policy to indicate its usefulness and set its status to inactive. You can later return to the policy and modify it for a similar app and set its status to audit mode or inactive.
44
+
An alternative to deleting an app policy is to change its status to disabled. Once disabled, the policy doesn't generate alerts. For example, rather than deleting an app policy for an app with a specific set of conditions that are useful for a future policy, rename the app policy to indicate its usefulness and set its status to disabled.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-detect-remediate-get-started.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
---
2
2
title: Get started with app governance threat detection and remediation | Microsoft Defender for Cloud Apps
3
-
ms.date: 05/28/2023
3
+
ms.date: 08/31/2025
4
4
ms.topic: overview
5
5
description: Get started with app governance threat detection and remediation in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
6
+
ms.reviewer: shragar456
6
7
---
7
8
8
9
# Get started with app threat detection and remediation
@@ -13,7 +14,8 @@ To view the latest incidents associated with these alerts, go to the **App gover
13
14
14
15
For example:
15
16
16
-
:::image type="content" source="media/app-governance/mapg-cc-overview-alerts.png" alt-text="Screenshot of the App governance > Overview tab with the Latest alerts section highlighted." lightbox="media/app-governance/mapg-cc-overview-alerts.png":::
17
+
:::image type="content" source="media/app-governance/app-governance-overview.png" alt-text="Screenshot that shows the App Governance overview tab." lightbox="media/app-governance/app-governance-overview.png":::
18
+
17
19
18
20
On the **Overview** tab, the **Latest alerts** section lists the most recent alerts. You can use these recent alerts to quickly see the current app alert activity for your tenant.
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-client.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: install-set-up-deploy
15
15
ms.subservice: onboard
16
16
search.appverid: met150
17
-
ms.date: 04/16/2025
17
+
ms.date: 09/07/2025
18
18
---
19
19
20
20
# Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint
@@ -37,15 +37,15 @@ To onboard client devices running Windows or macOS, follow this general process:
37
37
38
38
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
39
39
40
-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40
+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
41
41
42
-
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
42
+
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint." lightbox="media/mde-device-onboarding-ui.png":::
43
43
44
44
3. Under **Select operating system to start onboarding process**, select the operating system for the device.
45
45
46
46
4. Under **Connectivity type**, select either **Streamlined** or **Standard**. (See [prerequisites for streamlined connectivity](/defender-endpoint/configure-device-connectivity#prerequisites).)
47
47
48
-
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there is one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
48
+
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there's one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
Copy file name to clipboardExpand all lines: defender-office-365/mdo-support-teams-about.md
+19-8Lines changed: 19 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,40 +16,51 @@ ms.collection:
16
16
- tier1
17
17
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365.
18
18
ms.service: defender-office-365
19
-
ms.date: 08/18/2025
19
+
ms.date: 09/03/2025
20
20
appliesto:
21
21
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased. Microsoft Defender for Office 365 already provides the following Teams protection features:
31
+
With the increased use of collaboration tools like Microsoft Teams, the possibility of malicious attacks using chat messages has also increased.
32
+
33
+
All licenses of Microsoft Teams in Microsoft 365 include the following built-in protections:
34
+
35
+
-[Built-in virus protection in SharePoint, SharePoint Embedded, OneDrive, and Microsoft Teams](anti-malware-protection-for-spo-odfb-teams-about.md)
36
+
-**Near real-time URL protection in Teams messages (currently in Preview)**: Known, malicious URLs in Teams messages are delivered with a warning. Messages found to contain malicious URLs up to 48 hours after delivery also receive a warning. The warning is added to messages in internal and external chats and teams for all URL verdicts (not just malware or high confidence phishing).
37
+
38
+
:::image type="content" source="media/teams-message-url-warning.png" alt-text="Screenshot showing a Microsoft Teams message with a URL warning." lightbox="media/teams-message-url-warning.png":::
39
+
40
+
To turn this feature off or on, see [Verify warnings for unsafe links are shown in Microsoft Teams messages](mdo-support-teams-quick-configure.md#step-3-verify-warnings-for-unsafe-links-are-shown-in-microsoft-teams-messages).
41
+
42
+
Microsoft Defender for Office 365 provides the following extra Teams protection features:
32
43
33
44
- Time of click protection for URLs and files in Teams messages through [Safe Links for Microsoft Teams](safe-links-about.md#safe-links-settings-for-microsoft-teams) and [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md).
34
45
- Allow/block [domains](tenant-allow-block-list-teams-domains-configure.md), [URLs](tenant-allow-block-list-urls-configure.md) and [files](tenant-allow-block-list-files-configure.md) inside Teams using the Tenant Allow Block List.
35
46
36
-
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
47
+
Microsoft 365 E5 and Defender for Office 365 Plan 2 extend Teams protection with a set of extra capabilities designed to disrupt the attack chain:
37
48
38
49
-**Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
39
50
40
51
-**Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
41
52
42
-
ZAP for Teams quarantines messages in Teams chats or channels that are found to be malware or high confidence phishing. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
53
+
ZAP for Teams quarantines messages in internal Teams chats or channels that are found to be malware or high confidence phishing. For more information, see [Zero-hour auto purge (ZAP) in Microsoft Teams](zero-hour-auto-purge.md#zero-hour-auto-purge-zap-in-microsoft-teams).
43
54
44
55
Instructions to configure ZAP for Teams protection are in the next section.
45
56
46
-
-**Teams messages in quarantine**: As with email messages that are identified as malware or high confidence phishing, only admins are able to manage Teams messages that are quarantined by ZAP for Teams by default. For more information, see [Manage quarantined Teams messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).
57
+
-**Teams messages in quarantine**: By default, only admins are allowed to manage Teams messages quarantined by ZAP for Teams. This is the same default limitation for email messages identified as malware or high confidence phishing. For more information, see [Manage quarantined Teams messages](quarantine-admin-manage-messages-files.md#use-the-microsoft-defender-portal-to-manage-microsoft-teams-quarantined-messages).
47
58
48
-
-The **Teams message entity panel** is a single place to store all Teams message metadata for immediate SecOps review. Any threats coming from Teams chats, group chats, meeting chats, and other channels can be found in one place as soon as they're assessed. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
59
+
-**Teams message entity panel**: A single place to store all Teams message metadata for immediate SecOps review. Any threats coming from Teams chats, group chats, meeting chats, and other channels can be found in one place as soon as they're assessed. For more information, see [The Teams message entity panel in Microsoft Defender for Office 365 Plan 2](teams-message-entity-panel.md).
49
60
50
61
-**Attack simulation training using Teams messages**: To ensure users are resilient to phishing attacks in Microsoft Teams, admins can configure phishing simulations using Teams messages instead of email messages. For more information, see [Microsoft Teams in Attack simulation training](attack-simulation-training-teams.md).
51
62
52
-
-**Hunting on Teams messages with URLs**: You can now hunt on Teams messages containing URL across three new advanced hunting tables: [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table), [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table), and [MessageURLInfo](/defender-xdr/advanced-hunting-messageurlinfo-table).
63
+
-**Hunting on Teams messages with URLs**: You can hunt for Teams messages containing URL across three new advanced hunting tables: [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table), [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table), and [MessageURLInfo](/defender-xdr/advanced-hunting-messageurlinfo-table).
53
64
54
65
## Configure ZAP for Teams protection in Defender for Office 365 Plan 2
0 commit comments