Skip to content

Commit 4113ebb

Browse files
authored
Merge pull request #3052 from anandd512/docs-editor/app-governance-get-started-1741345302
Recommend MDA customers to enable Microsoft 365 connector for better AppG experience
2 parents fcf30d0 + 8fc9245 commit 4113ebb

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,17 @@ Before you start, verify that you satisfy the following prerequisites:
1818
- Microsoft Defender for Cloud Apps must be present in your account as either a standalone product or as part of the various [license](#licensing) packages.
1919

2020
If you aren't already a Defender for Cloud Apps customer, you can [sign up for a free trial](https://www.microsoft.com/security/business/cloud-apps-defender).
21-
21+
2222
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
2323

2424

2525
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
2626

27+
> [!IMPORTANT]
28+
> Connect to Microsoft 365 connector to get visibility into activities and specific resources accessed by OAuth apps in the Microsoft Defender XDR advanced hunting blade. This will enhance your ability to investigate and respond to certain threat detection policy alerts generated by app governance.
29+
>
30+
> Learn how to [connect to the Microsoft 365 connector](/defender-cloud-apps/protect-office-365).
31+
2732
## Turn on app governance
2833

2934
If your organization satisfies the [prerequisites](#prerequisites), go to [Microsoft Defender XDR > Settings > Cloud Apps > App governance](https://security.microsoft.com/cloudapps/settings) and select **Use app governance**. For example:

0 commit comments

Comments
 (0)