You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/governance-actions.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,6 +83,13 @@ The following governance actions can be taken for connected apps either on a spe
83
83
84
84
-**Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
85
85
86
+
> [!NOTE]
87
+
> These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
88
+
- Security Operator
89
+
- Security administrator
90
+
- Global administrator
91
+
- Cloud app security administrator
92
+
86
93
:::image type="content" source="media/governance-actions/governance-actions-dropbox-google-workspace.png" alt-text="Screenshot that shows malware governance actions." lightbox="media/governance-actions/governance-actions-dropbox-google-workspace.png":::
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,9 +29,18 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
29
29
30
30
## June 2025
31
31
32
+
### “Behaviors” data type in Microsoft Defender for Cloud Apps - General Availability
33
+
34
+
The **Behaviors** data type significantly enhances overall threat detection accuracy by reducing alerts on generic anomalies and surfacing alerts only when observed patterns align with real security scenarios. You can now use **Behaviors** to conduct investigations in [Advanced Hunting](https://learn.microsoft.com/defender-xdr/advanced-hunting-overview), build better [custom detections](https://learn.microsoft.com/defender-xdr/custom-detection-rules) based on behavioral signals, and benefit from automatic inclusion of context-related behaviors into [incidents](https://learn.microsoft.com/defender-xdr/incidents-overview). This provides clearer context and helps security operations teams to reduce alert fatigue, prioritize, and respond more efficiently.
35
+
36
+
For more information, see:
37
+
-[Investigate behaviors with advanced hunting](/defender-cloud-apps/behaviors).
Microsoft Defender for Cloud Apps new dynamic threat detection model continuously adapts to the ever-changing SaaS apps threat landscape. This approach ensures your organization remains protected with up-to-date detection logic without the need for manual policy updates or reconfiguration. Several legacy anomaly detection policies have already been seamlessly transitioned to this adaptive model, delivering smarter and more responsive security coverage.
43
+
35
44
For more information, see [Create Defender for Cloud Apps anomaly detection policies](anomaly-detection-policy.md).
36
45
37
46
@@ -111,7 +120,7 @@ Defender for Cloud Apps customers can now configure Role-Based Access Control (R
Copy file name to clipboardExpand all lines: defender-office-365/email-authentication-dkim-configure.md
+22-6Lines changed: 22 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
ms.author: chrisda
6
6
author: chrisda
7
7
manager: deniseb
8
-
ms.date: 04/14/2025
8
+
ms.date: 06/19/2025
9
9
audience: ITPro
10
10
ms.topic: how-to
11
11
@@ -94,7 +94,7 @@ In Microsoft 365, two public-private key pairs are generated when DKIM signing u
94
94
The selector that's used to verify the DKIM signature (which infers the private key that was used to sign the message) is stored in the **s=** value in the **DKIM-Signature** header field (for example, `s=selector1-contoso-com`).
95
95
96
96
> [!IMPORTANT]
97
-
> Use the Defender portal or Exchange Online PowerShell to view the required CNAME values for DKIM signing of outbound messages using a custom domain. The values presented here are for illustration only. To get the required values for your custom domains or subdomains, use the procedures later in this article.
97
+
> Use the Defender portal or Exchange Online PowerShell to view the required CNAME values for DKIM signing of outbound messages using a custom domain. **The values presented here are for illustration only**. To get the required values for your custom domains or subdomains, use the procedures later in this article.
98
98
99
99
The basic syntax of the DKIM CNAME records for custom domains that send mail from Microsoft 365 is:
100
100
@@ -109,7 +109,23 @@ Points to address or value: selector2-<CustomDomainWithDashes>._domainkey.<Initi
109
109
-**Hostname**: The values are the same for all Microsoft 365 organizations: `selector1._domainkey` and `selector2._domainkey`.
110
110
-**\<CustomDomainWithDashes\>**: The custom domain or subdomain with periods replaced by dashes. For example, `contoso.com` becomes `contoso-com`, or `marketing.contoso.com` becomes `marketing-contoso-com`.
111
111
-**\<InitialDomainPrefix\>**: The custom part of the \*.onmicrosoft.com you used to enroll in Microsoft 365. For example, if you used `contoso.onmicrosoft.com`, the value is `contoso`.
112
-
-**\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors.
112
+
-**\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors (for example, r or n). The value is automatically assigned by Microsoft when you add a new custom domain and enable DKIM. The value is determined by Microsoft's internal routing logic and isn't configurable.
113
+
- This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025. Existing custom domains and initial domains continue to use the old DKIM format:
114
+
115
+
```text
116
+
Hostname: selector1._domainkey
117
+
Points to address or value: selector1-contoso-com._domainkey.contoso.onmicrosoft.com
118
+
119
+
Hostname: selector2._domainkey
120
+
Points to address or value: selector2-contoso-com._domainkey.contoso.onmicrosoft.com
121
+
```
122
+
123
+
- **The old and new and old formats can't coexist for the same selector**. To retrieve the correct DKIM CNAME values for a domain, including the assigned \<DynamicPartitionCharacter\> value, replace contoso.com with the domain value, and then run the following command in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell):
- **v1**: The current CNAME format version that's used for both selectors.
114
130
- **dkim.mail.microsoft**: The parent DNS zone that's the same for both selectors.
115
131
@@ -120,15 +136,15 @@ For example, your organization has the following domains in Microsoft 365:
120
136
121
137
You need to create two CNAME records in DNS in each custom domain, for a total of four CNAME records:
122
138
123
-
-**CNAME records in the cohovineyard.com domain**:
139
+
- <u>CNAME records in the cohovineyard.com domain</u>:
124
140
125
141
**Hostname**: `selector1._domainkey`<br>
126
142
**Points to address or value**: `selector1-cohovineyard-com._domainkey.cohovineyardandwinery.n-v1.dkim.mail.microsoft`
127
143
128
144
**Hostname**: `selector2._domainkey`<br>
129
145
**Points to address or value**: `selector2-cohovineyard-com._domainkey.cohovineyardandwinery.n-v1.dkim.mail.microsoft`
130
146
131
-
-**CNAME records in the cohowinery.com domain**:
147
+
- <u>CNAME records in the cohowinery.com domain</u>:
132
148
133
149
**Hostname**: `selector1._domainkey`<br>
134
150
**Points to address or value**: `selector1-cohowinery-com._domainkey.cohovineyardandwinery.r-v1.dkim.mail.microsoft`
@@ -201,7 +217,7 @@ Proceed if the domain satisfies these requirements.
201
217
202
218
It takes a few minutes (or possibly longer) for Microsoft 365 to detect the new CNAME records that you created.
203
219
204
-
7. After a while, return to the domain properties flout that you left open in Step 5, and select the **Sign messages for this domain with DKIM signatures** toggle.
220
+
7. After a while, return to the domain properties flyout that you left open in Step 5, and select the **Sign messages for this domain with DKIM signatures** toggle.
0 commit comments