Skip to content

Commit 3be5f93

Browse files
committed
Learn Editor: Update app-governance-app-policies-create.md
1 parent ef1d190 commit 3be5f93

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Use a custom app policy when you need to do something not already done by one of
9999
> [!NOTE]
100100
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceed to check only other policy conditions.
101101
102-
5. Here are the available conditions for a custom app policy:
102+
1. Here are the available conditions for a custom app policy:
103103

104104
|Condition|Condition values accepted|Description|More information|
105105
|---|---|---|---|
@@ -123,9 +123,9 @@ Use a custom app policy when you need to do something not already done by one of
123123
|**Sensitivity labels accessed**|Select one or more sensitivity labels from the list|Apps that accessed data with specific sensitivity labels in the last 30 days.||
124124
|**Services accessed** (Graph only)|Exchange and/or OneDrive and/or SharePoint and/or Teams|Apps that have accessed OneDrive, SharePoint, or Exchange Online using Microsoft Graph and EWS APIs|Multiple selections allowed.|
125125
|**Error rate** (Graph only)|Error rate is greater than X% in the last seven days|Apps whose Graph API error rates in the last seven days are greater than a specified percentage||
126-
|**App origin** (Preview)|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127-
128-
All of the specified conditions must be met for this app policy to generate an alert.
126+
|**App origin**|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127+
128+
All of the specified conditions must be met for this app policy to generate an alert.
129129

130130
6. When you're done specifying the conditions, select **Save**, and then select **Next**.
131131

@@ -166,7 +166,7 @@ Policies for OAuth apps trigger alerts only on policies that are authorized by u
166166
1. Go to **Microsoft Defender XDR > App governance > Policies > Other apps**. For example:
167167

168168
![Other apps-policy creation](media/app-governance-app-policies-create/other-apps-policy-creation.jpg)
169-
169+
170170
2. Filter the apps according to your needs. For example, you might want to view all apps that request **Permission** to **Modify calendars in your mailbox**.
171171

172172
> [!TIP]

0 commit comments

Comments
 (0)