Skip to content

Commit 2d0d43e

Browse files
Merge branch 'main' into AdvHunt-chrisda
2 parents ad1b40f + 09c19a7 commit 2d0d43e

14 files changed

+122
-81
lines changed

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Cloud Apps – privacy
33
description: Learn about how Microsoft Defender for Cloud Apps manages user privacy.
4-
ms.date: 11/24/2024
4+
ms.date: 06/17/2025
55
ms.topic: concept-article
66
---
77
# Privacy with Microsoft Defender for Cloud Apps
@@ -22,7 +22,7 @@ Microsoft Defender for Cloud Apps collects information from your configured clou
2222
- User and group configurations
2323

2424
> [!NOTE]
25-
> The data collected from the various applications is dependent on the customer-provided data from the various applications and may include personal information.
25+
> The data collected from the various applications is dependent on the customer-provided data from the various applications and might include personal information.
2626
2727
## Data storage location
2828

@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|Customer provisioning location |Data storage location |
3232
|---------|---------|
3333
|**Customers whose tenants are provisioned in the United States** | United States |
34-
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
34+
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | The European Union or the United Kingdom, depending on service availability. |
3535
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned. |
3636

3737
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
@@ -52,7 +52,13 @@ In addition to the locations above, the App Governance features within Defender
5252

5353
Customer data collected by Defender for Cloud Apps is either stored in your tenant location, as described in the previous tables, or in the geographic location of another online service that Defender for Cloud Apps shares data with, as defined by the data storage rules of that online service.
5454

55-
If Defender for Cloud Apps data is stored in your tenant location, your tenant isn't movable after having been created. To view your Defender for Cloud Apps tenant location in the Microsoft Defender portal, go to **Settings > Cloud Apps > About > Region**.
55+
56+
### View your data storage location
57+
58+
To view your Defender for Cloud Apps tenant location in the Microsoft Defender portal, go to **Settings > Cloud Apps > About > Region**.
59+
60+
> [!NOTE]
61+
> If Defender for Cloud Apps data is stored in your tenant location, your tenant isn't movable after having been created.
5662
5763
## Data retention
5864

@@ -62,7 +68,7 @@ Your data is kept and is available to you while the license is under grace perio
6268

6369
## Data sharing for Microsoft Defender for Cloud Apps
6470

65-
Defender for Cloud Apps shares data, including customer data, among the following Microsoft products also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
71+
Defender for Cloud Apps shares data, including customer data, among the following Microsoft products also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments might occur, depending on the location of the service offering.
6672

6773
- Microsoft Defender XDR
6874
- Microsoft Defender for Cloud

CloudAppSecurityDocs/discovered-apps-api-graph.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,16 @@
22
title: Work with discovered apps via Graph API | Microsoft Defender for Cloud Apps
33
description: Learn how to work with apps discovered by Microsoft Defender for Cloud Apps via Graph API.
44
ms.topic: how-to #Don't change
5-
ms.date: 06/24/2024
6-
5+
ms.date: 06/18/2025
76
#customer intent: As a security engineer, I want to work with discovered apps via API so that I can customize and automate the Microsoft Defender for Cloud Apps **Discovered apps** page functionality.
8-
97
---
108

119
# Work with discovered apps via Graph API (Preview)
1210

1311
Microsoft Defender for Cloud Apps supports a Microsoft Graph API that you can use to work with discovered cloud apps, to customize and automate the **Discovered apps** page functionality in the Microsoft Defender portal.
1412

15-
This article provides sample procedures for using the [uploadedStreams API](/graph/api/security-datadiscoveryreport-list-uploadedstreams?view=graph-rest-beta) for common purposes.
13+
This article provides sample procedures for using the [uploadedStreams API](/graph/api/security-datadiscoveryreport-list-uploadedstreams?view=graph-rest-beta&preserve-view=true&tabs=http) for common purposes.
14+
1615

1716
## Prerequisites
1817

@@ -22,7 +21,7 @@ Before you start using the Graph API, make sure to create an app and get an acce
2221

2322
- Take note of your app secret and copy its value to use later on in your scripts.
2423

25-
You'll also need cloud app data streaming into Microsoft Defender for Cloud Apps.
24+
- You need cloud app data streaming into Microsoft Defender for Cloud Apps.
2625

2726
For more information, see:
2827

@@ -36,7 +35,7 @@ For more information, see:
3635
To get a high level summary of all the data available on your **Discovered apps** page, run the following GET command:
3736

3837
```http
39-
GET https://graph.microsoft.com/beta/dataDiscovery/cloudAppDiscovery/uploadedStreams
38+
GET https://graph.microsoft.com/beta/security/dataDiscovery/cloudAppDiscovery/uploadedStreams
4039
```
4140

4241
To drill down to data for a specific stream:
@@ -88,4 +87,4 @@ GET  https://graph.microsoft.com/beta/security/dataDiscovery/cloudAppDiscovery
8887

8988
## Related content
9089

91-
For more information, see [Working with discovered apps](discovered-apps.md) and the [Microsoft Graph API reference](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta).
90+
For more information, see [Working with discovered apps](discovered-apps.md) and the [Microsoft Graph API reference](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta&preserve-view=true).

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -119,11 +119,11 @@ Scenarios and default settings for PUA protection depend on whether devices are
119119

120120
##### Microsoft Defender Antivirus with devices onboarded to Defender for Endpoint Plan 1/Plan 2 or Defender for Business
121121

122-
| Scenarios |Security intelligence update version | Smart App Locker | PUA protection default setting|
122+
| Scenarios |Security intelligence update version | Smart App Control| PUA protection default setting|
123123
| -------- | -------- | -------- | -------- |
124-
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2)<br/>Windows Server 2019 or later | older than 1.329.495.0 | Feature not available | Audit mode (2)|
124+
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2)<br/>Windows Server 2019 or later |Older than 1.329.495.0 |Feature not available | Audit mode (2)|
125125
| Windows 11, version 22H2 or later | 1.329.495.0 or later | Available | Audit mode (2)|
126-
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2)<br/>Windows Server 2019 or later | 1.329.495.0 or later | Feature not available | Block mode (1)|
126+
| Windows 10, version 2004 or later<br/>Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2)<br/>Windows Server 2019 or later | 1.329.495.0 or later |Feature not available | Block mode (1)|
127127

128128
> [!TIP]
129129
> To enforce PUA protection in block mode, use any of the following management methods:

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 05/20/2025
7+
ms.date: 06/16/2025
88
ms.topic: how-to
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -221,7 +221,7 @@ You can use one of several methods to confirm the state of Microsoft Defender An
221221
> [!IMPORTANT]
222222
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
223223
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, Microsoft Defender Antivirus remains disabled.
224-
> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
224+
> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#manually-set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
225225
226226
> [!Note]
227227
> The modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.

defender-endpoint/microsoft-defender-antivirus-on-windows-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: ewalsh
99
ms.reviewer: pahuijbr
1010
manager: deniseb
1111
ms.topic: how-to
12-
ms.date: 04/18/2025
12+
ms.date: 06/16/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -82,7 +82,7 @@ To view verify the state of all services using Command Prompt, run the following
8282
>
8383
> If "Turn off Windows Defender" is already set before onboarding the device to Defender for Endpoint, there's no change and Microsoft Defender Antivirus remains disabled.
8484
>
85-
> To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
85+
> To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#manually-set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
8686
>
8787
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevents Microsoft Defender Antivirus from going into passive mode, even if `ForceDefenderPassiveMode` is set to `1`.
8888

defender-endpoint/microsoft-defender-antivirus-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus in Windows Overview
33
description: Learn how to manage, configure, and use Microsoft Defender Antivirus, built-in antimalware and antivirus protection.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 05/02/2024
6+
ms.date: 06/16/2025
77
ms.topic: overview
88
author: emmwalshh
99
ms.author: ewalsh
@@ -93,7 +93,7 @@ You can use one of several methods, such as the Windows Security app or Windows
9393
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it will place it into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) feature will allow a switch to active mode but not to passive mode.
9494
>
9595
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, there will be no change and Defender Antivirus will remain disabled.
96-
> - To switch Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
96+
> - To switch Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#manually-set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
9797
>
9898
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevent it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
9999

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 06/10/2025
9+
ms.date: 06/16/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -621,7 +621,7 @@ Microsoft regularly releases [security intelligence updates and product updates
621621
- Improved WARN mode for [ASR rule](attack-surface-reduction-rules-reference.md)
622622
- Improved certificate handling of OSX
623623
- Improved logging for scanning FilesStash location
624-
- Beginning with platform version 4.18.2208.0 and later: If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy setting](configure-endpoints-gp.md#update-endpoint-protection-configuration) will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later operating systems. Instead, it is either ignored (if [ForceDefenderPassiveMode](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) is configured explicitly) or it places Microsoft Defender Antivirus into [passive mode](microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode) (if `ForceDefenderPassiveMode` isn't configured). Moreover, [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode via changing `ForceDefenderPassiveMode` to `0`, but not to passive mode. These changes apply only to servers onboarded to Microsoft Defender for Endpoint. For more information, please refer to [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md#microsoft-defender-antivirus-and-non-microsoft-antivirusantimalware-solutions)
624+
- Beginning with platform version 4.18.2208.0 and later: If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy setting](configure-endpoints-gp.md#update-endpoint-protection-configuration) will no longer completely disable Windows Defender Antivirus on Windows Server 2012 R2 and later operating systems. Instead, it is either ignored (if [ForceDefenderPassiveMode](switch-to-mde-phase-2.md#manually-set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) is configured explicitly) or it places Microsoft Defender Antivirus into [passive mode](microsoft-defender-antivirus-windows.md#comparing-active-mode-passive-mode-and-disabled-mode) (if `ForceDefenderPassiveMode` isn't configured). Moreover, [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode via changing `ForceDefenderPassiveMode` to `0`, but not to passive mode. These changes apply only to servers onboarded to Microsoft Defender for Endpoint. For more information, please refer to [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md#microsoft-defender-antivirus-and-non-microsoft-antivirusantimalware-solutions)
625625

626626
#### Known Issues
627627

0 commit comments

Comments
 (0)