Skip to content

Commit 42d5216

Browse files
committed
Merge branch 'main' into maccruz-privroles
2 parents c5f2bd9 + 4bc8352 commit 42d5216

File tree

170 files changed

+1280
-1039
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+1280
-1039
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,6 +180,11 @@
180180
"source_path": "defender-xdr/portal-submission-troubleshooting.md",
181181
"redirect_url": "/defender-xdr/troubleshoot",
182182
"redirect_document_id": false
183+
},
184+
{
185+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
186+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
187+
"redirect_document_id": false
183188
}
184189
]
185190
}

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 55 additions & 57 deletions
Large diffs are not rendered by default.

CloudAppSecurityDocs/dcs-inspection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ Microsoft Defender for Cloud Apps enables you to natively use the Microsoft Data
1313
>[!NOTE]
1414
> This feature is currently available in the US, Europe, Australia, India, Canada, Japan, and APAC.
1515
16+
>[!NOTE]
17+
> To enable the Data Classification Service option in File Policies, the "Microsoft 365" App Connector is required.
18+
1619
## Enable content inspection with Data Classification Services
1720

1821
You can set the **Inspection method** to use the **Microsoft Data Classification Service** with no additional configuration required. This option is useful when creating a data leak prevention policy for your files in Microsoft Defender for Cloud Apps.

CloudAppSecurityDocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,13 @@
4444
"ms.service": "defender-for-cloud-apps",
4545
"ms.suite": "ems",
4646
"contributors_to_exclude": [
47-
"beccarobins"
47+
"beccarobins",
48+
"rjagiewich",
49+
"claydetels19",
50+
"garycentric",
51+
"padmagit77",
52+
"aditisrivastava07",
53+
"Ruchika-mittal01"
4854
]
4955
},
5056
"fileMetadata": {},

CloudAppSecurityDocs/governance-actions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ The following governance actions can be taken for connected apps either on a spe
3434
- **Apply label** - Ability to add a Microsoft Purview Information Protection sensitivity label.
3535
- **Remove label** - Ability to remove a Microsoft Purview Information Protection sensitivity label.
3636
- **Change sharing**
37-
37+
3838
- **Remove public sharing** – Allow access only to named collaborators, for example: *Remove public access* for Google Workspace, and *Remove direct shared link* for Box and Dropbox.
3939

40-
- **Remove external users** – Allow access only to company users.
41-
40+
- **Remove external users** – Allow access only to company users. When a group, containing both internal and external members, is added as a collaborator, the action removes members at the group level instead of individually. 
41+
4242
- **Make private** – Only Site Admins can access the file, all shares are removed.
4343

4444
- **Remove a collaborator** – Remove a specific collaborator from the file.
@@ -60,7 +60,7 @@ The following governance actions can be taken for connected apps either on a spe
6060
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint, Cisco Webex)
6161

6262
![policy_create alerts.](media/policy_create-alerts.png)
63-
63+
6464
## Malware governance actions (Preview)
6565

6666
The following governance actions can be taken for connected apps either on a specific file, user or from a specific policy. For security reasons, this list is limited only to malware related actions that don't imply risk for the user or the tenant.
@@ -104,7 +104,7 @@ The following governance actions can be taken for connected apps either on a spe
104104

105105
- **Governance actions in apps** - Granular actions can be enforced per app, specific actions vary depending on app terminology.
106106

107-
- **Suspend user** – Suspend the user from the application.
107+
- **Suspend user** – Suspend the user from the application.
108108
> [!NOTE]
109109
> If your Microsoft Entra ID is set to automatically sync with the users in your Active Directory on-premises environment the settings in the on-premises environment will override the Microsoft Entra settings and this governance action will be reverted.
110110
@@ -113,7 +113,7 @@ The following governance actions can be taken for connected apps either on a spe
113113
- **Confirm user compromised** - Set the user's risk level to high. This causes the relevant policy actions defined in Microsoft Entra ID to be enforced. For more information How Microsoft Entra ID works with risk levels, see [How does Microsoft Entra ID use my risk feedback](/azure/active-directory/identity-protection/howto-identity-protection-risk-feedback#how-does-azure-ad-use-my-risk-feedback).
114114

115115
![Defender for Cloud Apps activity policy governance actions.](media/activity-policy-ref6.png)
116-
116+
117117
## Revoke an OAuth app and notify user
118118

119119
For Google Workspace and Salesforce, it's possible to revoke permission to an OAuth app or to notify the user that they should change the permission. When you revoke permission it removes all permissions that were granted to the application under "Enterprise Applications" in Microsoft Entra ID.

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ For more information, see [Conditional Access policies](/azure/active-directory/
3434

3535
> [!NOTE]
3636
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37-
To protect your SaaS applications with Session Controls, you must allow access to this application.
38-
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39-
>
37+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38+
>
39+
>If you have any Conditional Access policies that have **“Block Access”** selected in the **“Grant Access”** Control under a Microsoft Entra ID Conditional Access policy scoped to this app, end users will not be able to access the protected applications under session controls. <br><br>
4040
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
4141
>
4242
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.

0 commit comments

Comments
 (0)