Skip to content

Commit 37ccf5f

Browse files
committed
Fixed a broken link
Fixed formatting
1 parent b523608 commit 37ccf5f

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ Due to improvements being made to Microsoft Defender for Cloud Apps to improve s
2525

2626
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
2727

28-
- cdn.cloudappsecurity.com
29-
- cdn-discovery.cloudappsecurity.com
28+
- cdn.cloudappsecurity.com
29+
- cdn-discovery.cloudappsecurity.com
3030

31-
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access.'
31+
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access'.
3232

3333
- To use Defender for Cloud Apps in the Microsoft Defender portal, make sure you add outbound port 443 for all IP addresses and DNS names listed in our documentation to your firewall's allowlist.
3434

@@ -44,13 +44,14 @@ Due to improvements being made to Microsoft Defender for Cloud Apps to improve s
4444

4545
- **EU2**: - 20.0.210.84 - 20.90.9.64
4646

47-
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://learn.microsoft.com/azure/virtual-network/service-tags-overview).
47+
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
4848

4949
## November 2024
5050

5151
### Internal Session Controls application notice
52-
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
53-
Ensure there's no CA policy restricting access to this application.
52+
53+
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
54+
Ensure there's no CA policy restricting access to this application.
5455
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
5556

5657
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
@@ -100,13 +101,13 @@ For more information, see [OAuth app data usage insights on app governance](/def
100101
### New anomaly data in advanced hunting CloudAppEvents table
101102

102103
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
103-
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
104+
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
104105

105106
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
106107

107108
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
108109

109-
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
110+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
110111
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
111112

112113
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
@@ -127,8 +128,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
127128

128129
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
129130

130-
For more information see:
131-
[Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps)
131+
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132132

133133
### Connect Mural to Defender for Cloud Apps (Preview)
134134

@@ -178,11 +178,12 @@ For more information, see [Export activities six months back](activity-filters-q
178178

179179
Customize the Microsoft Defender for Cloud Apps(MDA) block experience for apps that are blocked using Cloud Discovery.
180180

181-
You can set up a custom redirect URL on block pages
181+
You can set up a custom redirect URL on block pages:
182+
182183
- To educate and redirect end users to organization acceptable use policy
183184
- To guide end users on steps to follow to secure an exception for block
184185

185-
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page)
186+
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page).
186187

187188

188189
### In-browser protection for macOS users and newly supported policies (Preview)

0 commit comments

Comments
 (0)