You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-app-policies-create.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ Use a custom app policy when you need to do something not already done by one of
99
99
> [!NOTE]
100
100
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceed to check only other policy conditions.
101
101
102
-
5. Here are the available conditions for a custom app policy:
102
+
1. Here are the available conditions for a custom app policy:
@@ -123,9 +123,9 @@ Use a custom app policy when you need to do something not already done by one of
123
123
|**Sensitivity labels accessed**|Select one or more sensitivity labels from the list|Apps that accessed data with specific sensitivity labels in the last 30 days.||
124
124
|**Services accessed** (Graph only)|Exchange and/or OneDrive and/or SharePoint and/or Teams|Apps that have accessed OneDrive, SharePoint, or Exchange Online using Microsoft Graph and EWS APIs|Multiple selections allowed.|
125
125
|**Error rate** (Graph only)|Error rate is greater than X% in the last seven days|Apps whose Graph API error rates in the last seven days are greater than a specified percentage||
126
-
|**App origin** (Preview)|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127
-
128
-
All of the specified conditions must be met for this app policy to generate an alert.
126
+
|**App origin**|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127
+
128
+
All of the specified conditions must be met for this app policy to generate an alert.
129
129
130
130
6. When you're done specifying the conditions, select **Save**, and then select **Next**.
131
131
@@ -166,7 +166,7 @@ Policies for OAuth apps trigger alerts only on policies that are authorized by u
166
166
1. Go to **Microsoft Defender XDR > App governance > Policies > Other apps**. For example:
2. Filter the apps according to your needs. For example, you might want to view all apps that request **Permission** to **Modify calendars in your mailbox**.
0 commit comments