Skip to content

Commit 29fadaa

Browse files
authored
Merge branch 'main' into fix-a-staging-issue
2 parents 06ffee0 + acf0e65 commit 29fadaa

33 files changed

+281
-297
lines changed

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,22 @@ ms.custom: include file
1414

1515
This procedure provides a high-level example of how to create a Conditional Access policy for use with Defender for Cloud Apps.
1616

17-
1. In Microsoft Entra ID Conditional Access, select **Create new policy**.
18-
19-
1. Enter a meaningful name for your policy, and then select the link under **Session** to add controls to your policy.
20-
21-
1. In the **Session** area, select **Use Conditional Access App Control**.
22-
23-
1. In the **Users** area, select to include all users, or specific users and groups only.
24-
25-
1. In the **Conditions** and **Client apps** areas, select the conditions and client apps that you want to include in your policy.
26-
27-
1. Save the policy by toggling **Report-only** to **On**, and then selecting **Create**.
28-
29-
Microsoft Entra ID supports both browser-based and non browser-based policies. We recommend that you create both types for increased security coverage.
30-
31-
Repeat this procedure to create a nonbrowser based Conditional Access policy. In the **Client apps** area, toggle the **Configure** option to **Yes**. Then, under **Modern authentication clients**, clear the **Browser** option. Leave all other default selections selected.
17+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/entra/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
18+
1. Browse to **Entra ID** > **Conditional Access** > **Policies**.
19+
1. Select **New policy**.
20+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
21+
1. Under **Assignments**, select **Users or workload identities**.
22+
1. Under **Include**, select **All users**
23+
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
24+
1. Under **Target resources** > **Resources (formerly cloud apps)**, select the following options:
25+
1. Under **Include**, choose **Select resources**.
26+
1. Select the client apps that you want to include in your policy.
27+
1. Under **Conditions**, select any conditions that you want to include in your policy.
28+
1. Under **Access controls** > **Session**, select **Use app enforced restrictions**, then select **Select**.
29+
1. Confirm your settings and set **Enable policy** to **Report-only**.
30+
1. Select **Create** to create to enable your policy.
31+
32+
After confirming your settings using [policy impact or report-only mode](/entra/identity/conditional-access/concept-conditional-access-report-only#reviewing-results), move the **Enable policy** toggle from **Report-only** to **On**.
3233

3334
For more information, see [Conditional Access policies](/azure/active-directory/conditional-access/overview) and [Building a Conditional Access policy](/entra/identity/conditional-access/concept-conditional-access-policies).
3435

defender-business/get-defender-business.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Defender for Business provides advanced security protection for your company's d
8080
8181
## [Get Microsoft 365 Business Premium](#tab/getpremium)
8282

83-
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Productivity and security for small and medium-sized businesses](/Microsoft-365/business-premium/why-choose-microsoft-365-business-premium).
83+
Microsoft 365 Business Premium includes Defender for Business, Microsoft Defender for Office 365 Plan 1, and Microsoft 365 Apps (formerly referred to as Office apps). For more information, see [Why should I choose Microsoft 365 Business Premium?](/microsoft-365/admin/security-and-compliance/m365bp-security-benefits).
8484

8585
1. Visit the [Microsoft 365 Business Premium product page](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium?activetab=pivot%3aoverviewtab).
8686

@@ -90,10 +90,7 @@ Microsoft 365 Business Premium includes Defender for Business, Microsoft Defende
9090

9191
4. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), where you view and manage security settings and devices for your organization. In the navigation bar, go to **Assets** > **Devices**. This action initiates the provisioning of Defender for Business for your tenant.
9292

93-
5. Follow the guidance in [Boost your security protection](/Microsoft-365/business-premium/m365bp-security-overview) to set up your security capabilities.
94-
95-
> [!IMPORTANT]
96-
> Make sure to complete all the steps described in [Microsoft 365 Business Premium – productivity and cybersecurity for small business](/Microsoft-365/business-premium/m365bp-overview).
93+
5. Follow the guidance in [Microsoft 365 for business security best practices](/microsoft-365/admin/security-and-compliance/m365b-security-best-practices) to set up your security capabilities.
9794

9895
---
9996

defender-business/mdb-add-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ One good way to make sure MFA is enabled for all users is by using [security def
6161

6262
> [!NOTE]
6363
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
64-
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
64+
> - [Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
6767
5. Save your changes.

defender-business/mdb-onboard-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 12/12/2024
12+
ms.date: 09/12/2025
1313
ms.reviewer: efratka, nehabha, muktaagarwal
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -187,7 +187,7 @@ When you run the local script on Mac, it creates a trust with Microsoft Entra ID
187187
```bash
188188
/usr/bin/unzip WindowsDefenderATPOnboardingPackage.zip \
189189
&& /bin/chmod +x MicrosoftDefenderATPOnboardingMacOs.sh \
190-
&& /bin/bash -c MicrosoftDefenderATPOnboardingMacOs.sh
190+
&& Sudo bash -x MicrosoftDefenderATPOnboardingMacOs.sh
191191
```
192192

193193
After Mac is enrolled in Intune, you can add it to a device group. [Learn more about device groups in Defender for Business](mdb-create-edit-device-groups.md).

defender-business/mdb-requirements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following table lists the basic requirements you need to configure and use D
5353
> - If you don't have a Microsoft 365 subscription before you start your trial, Microsoft Entra ID will be provisioned for you during the activation process.
5454
> - If you do have another Microsoft 365 subscription when you start your Defender for Business trial, you can use your existing Microsoft Entra service.
5555
>
56-
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa).
56+
> 3. Security defaults are included in Defender for Business. If you prefer to use Conditional Access policies instead, you'll need Microsoft Entra ID P1 or P2 Plan 1 (included in [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview)). To learn more, see [Multifactor authentication in Microsoft 365](/microsoft-365/admin/security-and-compliance/multi-factor-authentication-microsoft-365).
5757
5858
## Next steps
5959

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1157,7 +1157,7 @@
11571157
href: api/api-power-bi.md
11581158
- name: Configure integration with other Microsoft solutions
11591159
items:
1160-
- name: Configure conditional access
1160+
- name: Configure Conditional Access
11611161
href: configure-conditional-access.md
11621162
- name: Configure Microsoft Defender for Cloud Apps integration
11631163
href: microsoft-cloud-app-security-config.md
@@ -1553,7 +1553,7 @@
15531553
items:
15541554
- name: Microsoft Defender for Endpoint integrations
15551555
href: threat-protection-integration.md
1556-
- name: Protect users, data, and devices with conditional access
1556+
- name: Protect users, data, and devices with Conditional Access
15571557
href: conditional-access.md
15581558
- name: Microsoft Defender for Cloud Apps integration overview
15591559
href: microsoft-cloud-app-security-integration.md

0 commit comments

Comments
 (0)