You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,10 +25,10 @@ Due to improvements being made to Microsoft Defender for Cloud Apps to improve s
25
25
26
26
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
27
27
28
-
- cdn.cloudappsecurity.com
29
-
- cdn-discovery.cloudappsecurity.com
28
+
- cdn.cloudappsecurity.com
29
+
- cdn-discovery.cloudappsecurity.com
30
30
31
-
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access.'
31
+
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access'.
32
32
33
33
- To use Defender for Cloud Apps in the Microsoft Defender portal, make sure you add outbound port 443 for all IP addresses and DNS names listed in our documentation to your firewall's allowlist.
34
34
@@ -44,13 +44,14 @@ Due to improvements being made to Microsoft Defender for Cloud Apps to improve s
44
44
45
45
-**EU2**: - 20.0.210.84 - 20.90.9.64
46
46
47
-
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://learn.microsoft.com/azure/virtual-network/service-tags-overview).
47
+
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
48
48
49
49
## November 2024
50
50
51
51
### Internal Session Controls application notice
52
-
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
53
-
Ensure there's no CA policy restricting access to this application.
52
+
53
+
The Enterprise application 'Microsoft Defender for Cloud Apps – Session Controls' is used internally by the Conditional Access App Control service.
54
+
Ensure there's no CA policy restricting access to this application.
54
55
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
55
56
56
57
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
@@ -100,13 +101,13 @@ For more information, see [OAuth app data usage insights on app governance](/def
100
101
### New anomaly data in advanced hunting CloudAppEvents table
101
102
102
103
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
103
-
The new columns are designed to assist you to better __identify uncommon activities__that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
104
+
The new columns are designed to assist you to better __identify uncommon activities__that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
104
105
105
106
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
106
107
107
108
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
108
109
109
-
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
110
+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
110
111
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
111
112
112
113
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
@@ -127,8 +128,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
127
128
128
129
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
129
130
130
-
For more information see:
131
-
[Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps)
131
+
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132
132
133
133
### Connect Mural to Defender for Cloud Apps (Preview)
134
134
@@ -178,11 +178,12 @@ For more information, see [Export activities six months back](activity-filters-q
178
178
179
179
Customize the Microsoft Defender for Cloud Apps(MDA) block experience for apps that are blocked using Cloud Discovery.
180
180
181
-
You can set up a custom redirect URL on block pages
181
+
You can set up a custom redirect URL on block pages:
182
+
182
183
- To educate and redirect end users to organization acceptable use policy
183
184
- To guide end users on steps to follow to secure an exception for block
184
185
185
-
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page)
186
+
For more information, see [Configure custom URL for MDA block pages](mde-govern.md#educate-users-when-accessing-blocked-apps--customize-the-block-page).
186
187
187
188
188
189
### In-browser protection for macOS users and newly supported policies (Preview)
0 commit comments