Skip to content

Commit 2599d20

Browse files
authored
Merge branch 'main' into Add-preview-brackets-to-release-note
2 parents 30fc661 + dfb33e3 commit 2599d20

26 files changed

+395
-30
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,11 @@
10041004
"source_path": "CloudAppSecurityDocs/file-filters.md",
10051005
"redirect_url": "/defender-cloud-apps/data-protection-policies",
10061006
"redirect_document_id": false
1007+
},
1008+
{
1009+
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
1010+
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
1011+
"redirect_document_id": true
10071012
}
10081013
]
10091014
}
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Application inventory
3+
ms.date: 03/20/2025
4+
ms.topic: overview
5+
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
7+
---
8+
# Applications inventory (Preview)
9+
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and OAuth connected apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Defender for Cloud apps Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11+
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12+
13+
The Application page includes the following tabs:
14+
15+
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16+
* OAuth apps: Displays a list of OAuth apps such as Microsoft Entra ID, Google workspace and Salesforce.
17+
18+
## Navigate to the Applications page
19+
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Applications**. Or, to go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21+
22+
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
23+
24+
:::image type="content" source="media/banner-message-on-app-governance-pages.png" alt-text="Screenshot of the App Governance page with a banner about the new unified application inventory experience for managing OAuth and SaaS apps" lightbox="media/banner-message-on-app-governance-pages.png":::
25+
26+
There are several options you can choose from to customize the SaaS apps and OAuth apps list view. In the top navigation panel you can:
27+
28+
* Add or remove columns.
29+
* Export the entire list in CSV format.
30+
* Select the number of items to show per page.
31+
* Apply filters
32+
33+
> [!NOTE]
34+
>When exporting the applications list to a CSV file, a maximum of 1000 SaaS or OAuth apps are displayed.
35+
36+
The following image depicts the SaaS apps list:
37+
:::image type="content" source="media/applications-tab-in-the-defender-portal.png" alt-text="Screenshot of the applications tab in the Defender portal" lightbox="media/applications-tab-in-the-defender-portal.png"
38+
39+
40+
## SaaS app details
41+
42+
At the top of Saas app tab, you can find actionable insights that allow you to quickly identify apps that need your attention and focus. The following details are displayed:
43+
44+
* **Untagged high risk apps** – Shows apps that aren't tagged and have a high-risk.
45+
* **Untagged high traffic apps** – Shows apps that aren't tagged and have a high usage traffic (greater than 1 GB of data traffic).
46+
* **Untagged GenAI apps** – Shows apps that aren't tagged and are Gen-AI based.
47+
48+
## Sort and filter the SaaS apps list
49+
50+
You can use the sort and filter functionality to get a more focused view. These controls also help you assess and manage the SaaS applications in your organization.
51+
52+
|Filter |Description |
53+
|---------|---------|
54+
|**App tags** | Select **Sanctioned**, **Unsanctioned**, or create custom tags to use in a customized filter. |
55+
|**App** | Filter for specific SaaS apps. |
56+
|**Categories** | Filter according to app categories. |
57+
|**Compliance risk factor** | Filter for specific standards, certifications, and compliance your app might comply with. For example: HIPAA, ISO 27001, SOC 2, and PCI-DSS. |
58+
| **Risk score** | Filter by a specific risk score, such as to view only risky apps. |
59+
|**Security risk factor** | Filter based on specific security measures, such as encryption at rest, multifactor authentication, and others.
60+
|
61+
62+
### OAuth Apps
63+
64+
The OAuth apps tab provides visibility into Microsoft 365, Google workspace and Salesforce. Admins can review applications and decide to disable the apps or apply policies to monitor their behavior in their environment.
65+
66+
* **New apps** – Shows apps added in the last 30 days (Available for Microsoft 365)
67+
68+
* **Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
69+
70+
* **Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
71+
72+
* **Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
73+
74+
For more information on how to create app policies, see:[Create app policies in app governance](app-governance-app-policies-create.md)
75+
76+
The following image depicts the OAuth apps list:
77+
78+
:::image type="content" source="media/oauth-tab-in-the-applications-page.png" alt-text="Screenshot of a list of OAuth apps in the applications page in the Defender portal" lightbox="media/oauth-tab-in-the-applications-page.png":::
79+
80+
## Sort and filter the OAuth apps list
81+
82+
You can apply the following filters to get a more focused view:
83+
84+
|Column name |Description |
85+
|---------|---------|
86+
| **App name** | The display name of the app as registered on Microsoft Entra ID. |
87+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom. |
88+
| **Graph API access**| Shows whether the app has at least one Graph API permission. |
89+
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions. |
90+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
91+
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
92+
| **Publisher**| Publisher of the app and their verification status. |
93+
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
94+
| **Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
95+
| **Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
96+
| **Data usage**| Total data downloaded or uploaded by the app in the last 30 days. |
97+
| **Privilege level** | The app's privilege level. |
98+
| **Certification**| Indicates if an app meets stringent security and compliance standards set by Microsoft 365 or if its publisher has publicly attested to its safety. |
99+
| **Sensitivity label accessed**| Sensitivity labels on content accessed by the app |
100+
| **Service accessed**| Microsoft 365 services accessed by the app
101+
|
102+
103+
104+
> [!TIP]
105+
> To see all columns, you might need to do one or more of the following steps:
106+
> * Horizontally scroll in your web browser.
107+
> * Narrow the width of appropriate columns.
108+
> * Zoom out in your web browser.
109+
110+
## Next steps
111+
112+
> [!div class="nextstepaction"]
113+
> [Best practices for protecting your organization](best-practices.md)
114+
115+
[!INCLUDE [Open support ticket](includes/support.md)]
135 KB
Loading
14 KB
Loading
7.31 KB
Loading
112 KB
Loading

CloudAppSecurityDocs/toc.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,6 @@ items:
118118
href: protect-zendesk.md
119119
- name: Zoom
120120
href: protect-zoom.md
121-
- name: Troubleshooting API connectors using error messages
122-
href: troubleshooting-api-connectors-using-error-messages.md
123121
- name: Cloud app discovery
124122
items:
125123
- name: Overview
@@ -157,6 +155,8 @@ items:
157155
href: log-collector-advanced-management.md
158156
- name: Use the custom log parser
159157
href: custom-log-parser.md
158+
- name: Troubleshooting API connector errors
159+
href: troubleshooting-api-connectors-errors.md
160160
- name: Integrate with Microsoft Defender for Endpoint
161161
items:
162162
- name: Overview
@@ -424,6 +424,12 @@ items:
424424
href: app-activity-threat-hunting.md
425425
- name: App governance FAQ
426426
href: app-governance-faq.yml
427+
- name: Investigate and respond
428+
items:
429+
- name: Assets
430+
items:
431+
- name: Applications inventory
432+
href: applications-inventory.md
427433
- name: Operations guide
428434
items:
429435
- name: Operations guide overview
Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ ms.topic: conceptual
66
---
77
# Troubleshooting App Connector errors
88

9-
10-
119
This article provides a list of API App connector error messages and resolution recommendations for each error.
1210

1311
## Troubleshooting

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 03/12/2025
6+
ms.date: 04/01/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -98,17 +98,36 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101-
### February-2025 (Engine: 1.1.25020.1007)
101+
### March-2025 (Engine 1.1.25030.1)
102+
103+
- Security intelligence update version: **1.427.3.0**
104+
- Release date: **April 1, 2025** (Engine only)
105+
- Platform: **4.18.25020.1009**
106+
- Engine: **1.1.25030.1**
107+
- Support phase: **Security and Critical Updates**
108+
109+
#### What's new
110+
111+
- Product improvements
112+
113+
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
102114

103115
- Security intelligence update version: **1.425.1.0**
104-
- Release date: **March 12, 2025** (Engine only)
105-
- Platform: **4.18.25010.11**
116+
- Release date: **March 12, 2025** (Engine) / **March 31, 2025** (Platform)
117+
- Platform: **4.18.25020.1009**
106118
- Engine: **1.1.25020.1007**
107119
- Support phase: **Security and Critical Updates**
108120

109121
#### What's new
110122

111-
- Product improvements
123+
- Fixed deadlock issue on [VDI](deployment-vdi-microsoft-defender-antivirus.md) that occurred when loading corrupted update files from UNC share.
124+
- Systems controlled by `SharedSignatureRoot` can be updated by running signature update commands.
125+
- If you're currently using a shared signature path to update VDI environments, you can now use signature update commands through [MpCmdRun](/defender-endpoint/command-line-arguments-microsoft-defender-antivirus), PowerShell, and the user interface to update to latest drops in your signature update shares.
126+
- Shared root signature setting updates are now applied without requiring a system restart. (If this setting is turned off and on multiple times, a system reboot is necessary.)
127+
- Improved logic for handling [restore from quarantine](/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus).
128+
- Fixed fallback issue with [Update-MpSignature](/powershell/module/defender/update-mpsignature).
129+
- Increased [device control policy](device-control-policies.md) limits.
130+
- Improved security resilience for Defender update process.
112131

113132
### January-2025 (Platform: 4.18.25010.11 | Engine: 1.1.25010.7)
114133

@@ -124,8 +143,8 @@ Updates contain:
124143
- Improved AMSI scan performance with changes to exclusion handling.
125144
- Fixed [Controlled Folder Access](controlled-folders.md) (CFA) protection for OneDrive when backup is enabled.
126145
- Fixed performance issues with [full scans](schedule-antivirus-scans.md) when initiated from the Microsoft Defender portal.
127-
- Fixed ASR warn mode processing for containerized objects (such as Office files) when the unblock option is selected.
128-
- Fixed ASR warn mode processing when exclusions are applied.
146+
- Fixed attack surface reduction warn mode processing for containerized objects (such as Office files) when the unblock option is selected.
147+
- Fixed attack surface reduction warn mode processing when exclusions are applied.
129148
- Fixed performance handling with file transfers having Mark of the Web (MoTW) set.
130149
- Implemented `AzureAd` cache to handle offline environments with [device control](device-control-overview.md).
131150
- Resolved an issue with `TrustLabelProtectionStatus` being reset after a Microsoft Defender platform update.
@@ -161,22 +180,6 @@ Updates contain:
161180
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
162181
163182

164-
### August-2024 (Platform: 4.18.24080.9 | Engine: 1.1.24080.9)
165-
166-
- Security intelligence update version: **1.419.1.0**
167-
- Release date: **September 17, 2024** (Engine and Platform)
168-
- Platform: **4.18.24080.9**
169-
- Engine: **1.1.24080.9**
170-
- Support phase: **Security and Critical Updates**
171-
172-
#### What's new
173-
174-
- Added a new parameter (`ControlledFolderAccessDefaultProtectedFolders`) to [Get-MpPreference](/powershell/module/defender/get-mppreference) cmdlet to show default protected folders for [controlled folder access](enable-controlled-folders.md).
175-
- Fixed an issue with device control regarding printer security checks.
176-
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
177-
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
178-
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
179-
180183
### Previous version updates: Technical upgrade support only
181184

182185
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 03/05/2025
9+
ms.date: 04/01/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,22 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### August-2024 (Platform: 4.18.24080.9 | Engine: 1.1.24080.9)
33+
34+
- Security intelligence update version: **1.419.1.0**
35+
- Release date: **September 17, 2024** (Engine and Platform)
36+
- Platform: **4.18.24080.9**
37+
- Engine: **1.1.24080.9**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Added a new parameter (`ControlledFolderAccessDefaultProtectedFolders`) to [Get-MpPreference](/powershell/module/defender/get-mppreference) cmdlet to show default protected folders for [controlled folder access](enable-controlled-folders.md).
43+
- Fixed an issue with device control regarding printer security checks.
44+
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
45+
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
46+
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
47+
3248
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
3349

3450
- Security intelligence update version: **1.417.14.0**

0 commit comments

Comments
 (0)