Skip to content

Commit 36cd3dc

Browse files
Merge pull request #4962 from MicrosoftDocs/main
[AutoPublish] main to live - 09/08 04:27 PDT | 09/08 16:57 IST
2 parents 566e793 + 809f7ff commit 36cd3dc

File tree

3 files changed

+15
-13
lines changed

3 files changed

+15
-13
lines changed

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: how-to
55
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
2324

2425
For example:
2526

26-
![Screenshot of the app governance policies summary page in Microsoft Defender XDR.](media/app-governance-app-policies-get-started/azure-ad-policies.jpg)
27+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
2728

2829
> [!NOTE]
2930
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
3031
>
3132
3233
## What’s available on the app policies dashboard
3334

34-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35+
The **App governance** > **Policies** tab shows the number of active and disabled policies, and the following information for each policy:
3536

3637
- **Policy name**
3738
- **Status**
3839

3940
- **Active**: All policy evaluation and actions are active.
40-
- **Inactive**: All policy evaluation and actions are disabled.
41-
- **Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41+
- **Disabled**: All policy evaluation and actions are disabled.
4242

4343
- **Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
4444
- **Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
7474

7575
1. Select **Edit**.
7676

77-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
7878

7979
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
8080

81-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82+
83+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
8284

8385
1. Choose whether to modify the existing conditions of the policy.
8486

8587
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
8688
- Otherwise, select **Use existing conditions of the policy**.
8789

88-
When you're done, select **Next**.
90+
1. When you're done, select **Next**.
8991

9092
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
9193

92-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
9395

9496
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
9597

329 KB
Loading

defender-endpoint/onboard-client.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/16/2025
17+
ms.date: 09/07/2025
1818
---
1919

2020
# Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint
@@ -37,15 +37,15 @@ To onboard client devices running Windows or macOS, follow this general process:
3737

3838
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
3939

40-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
4141

42-
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
42+
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint." lightbox="media/mde-device-onboarding-ui.png":::
4343

4444
3. Under **Select operating system to start onboarding process**, select the operating system for the device.
4545

4646
4. Under **Connectivity type**, select either **Streamlined** or **Standard**. (See [prerequisites for streamlined connectivity](/defender-endpoint/configure-device-connectivity#prerequisites).)
4747

48-
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there is one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
48+
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there's one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
4949

5050
|Operating system | Deployment method |
5151
|---|---|

0 commit comments

Comments
 (0)