Skip to content

Commit 43ebbfe

Browse files
authored
Merge branch 'main' into custom-data-collection-mde
2 parents c8a810f + 141b7a3 commit 43ebbfe

File tree

7 files changed

+51
-19
lines changed

7 files changed

+51
-19
lines changed
Lines changed: 50 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,47 +1,79 @@
11
---
2-
title: Secure apps accessing non-Graph APIs using app governance | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
2+
title: Secure apps accessing non-Graph APIs using app governance
3+
ms.date: 10/30/2025
44
ms.topic: how-to
5-
description: Learn how to secure apps accessing non-Graph APIs using app governance in Microsoft Defender XDR with Microsoft Defender for Cloud Apps
5+
description: Learn how to secure apps accessing other APIs using app governance in the Microsoft Defender portal.
6+
ms.reviewer: shragar
67
---
78

89
# Secure apps accessing non-Graph APIs using app governance
910

10-
Many apps use APIs other than Microsoft Graph to access Microsoft 365 and other resources. With visibility over such apps, you can identify and defend against risks inherent to these apps as well as risks from APIs that they access, some of which might receive limited support and updates.
11+
Many apps use APIs other than Microsoft Graph to access Microsoft 365 and other resources. With visibility over such apps, you can identify and defend against risks inherent to these apps including APIs that they access, some of which might receive limited support and updates.
1112

1213
App governance provides visibility over OAuth apps registered on Microsoft Entra ID, regardless of whether they access Graph API or other APIs. Additionally, you can monitor these apps and automatically take action if they're noncompliant or exhibit suspicious behavior.
1314

1415
You can better protect your organization with the new functionalities and enhancements in the following ways:
1516

1617
- Get improved coverage of OAuth apps with powerful app governance insights and monitoring capabilities.
17-
- Automatically get alerted for any threats or anomalies by apps using non-Graph or legacy APIs.
18+
- Automatically get alerted for any threats or anomalies from apps using non-Graph or legacy APIs.
1819
- Get an enhanced experience for investigation of apps with more filters, columns, and properties.
1920

20-
## Identify apps that use only non-Graph APIs
21+
## Identify apps that use non-Graph APIs
2122

22-
App governance lists all Microsoft Entra ID OAuth apps on the [Apps governance](https://security.microsoft.com/cloudapps/app-governance?viewid=allApps) page. To find apps that don't use Graph API, apply the API access filter, and select **Non-Graph only**. You can also use the Graph API access column to identify apps that don't have Graph API permissions among the listed apps.
23+
To view Microsoft 365 apps that access non-Graph APIs:
2324

24-
For example:
25+
1. Go to **Settings** > **Cloud apps** > **[Apps governance](https://security.microsoft.com/cloudapps/app-governance?viewid=allApps)** in the [Microsoft Defender portal](https://security.microsoft.com).
26+
1. Select the **Microsoft 365** tab
27+
1. Open the **API access** filter
28+
1. Select one of the options:
29+
- Office 365 Exchange Online
30+
- Office 365 SharePoint Online
31+
- Windows Azure Active Directory
32+
- Other APIs
33+
1. Select **Apply**.
2534

26-
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/apps-page-non-graph-only.png" alt-text="Screenshot of the Microsoft Entra apps tab showing non-Graph apps only.":::
2735

28-
## View non-Graph APIs used by OAuth apps
36+
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/other-apis-app-governance.png" alt-text="Screenshot that shows the list of APIs plus the option to view other APIs." lightbox="media/app-governance-secure-apps-access-non-graph-api/other-apis-app-governance.png":::
2937

30-
To view the APIs used by an app, go to the **Permissions** tab on an app details pane. You can find the names of the consented permissions and the APIs accessed by the app.
3138

32-
For example:
39+
## View APIs used by an app
3340

34-
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/permissions-tab.png" alt-text="Screenshot of the Permissions tab on an app details pane.":::
41+
To view the APIs that an app uses:
3542

36-
## Track API access
43+
1. In the App governance page, select the app you want to investigate.
3744

38-
With visibility over apps that access non-Graph APIs, you can now use the **New app with non-Graph API permissions** policy template or the **Non-graph API permission** policy condition to find and monitor such apps.
45+
1. In the app details pane, select the **Permissions** tab.
3946

40-
For example:
47+
The Permissions tab lists all permissions granted to the app, including Graph API permissions and non-Graph API permissions.
4148

42-
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/choose-policy-template.png" alt-text="Screenshot of the policy template page.":::
49+
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/other-apis-permissions.png" alt-text="Screenshot that shows the list of APIs and their assigned permissions." lightbox="media/app-governance-secure-apps-access-non-graph-api/other-apis-permissions.png":::
4350

51+
## Create policies for apps accessing non-graph APIs
52+
53+
Create app governance policies to monitor and take action on apps that access non-Graph APIs.
54+
55+
You can decide to create a custom policy or use an existing template.
56+
57+
1. In the App governance page, select the **Policies** tab.
58+
1. Select **+ Create policy**.
59+
1. To create a custom policy, select **Custom policy** and then configure the policy settings as needed. Select the the **Non-Graph API permissions** policy condition to identify and monitor apps that access non-Graph APIs.
60+
61+
62+
63+
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/choose-policy-template.png" alt-text="Screenshot that shows the option to create a custom policy.":::
64+
65+
1. To use a template, select **usage** and then the template **New app with Non-Graph API permissions**.
66+
67+
:::image type="content" source="media/app-governance-secure-apps-access-non-graph-api/new-policy-non-graph-api.png" alt-text="Screenshot that shows the option to use a template for a new policy.":::
68+
69+
1. Configure the policy settings as follows:
70+
- Give the policy a name and description
71+
- Set the severity level to low, medium, or high.
72+
- Set policy scope and conditions, you can choose to apply the default settings or customize the policy.
73+
- Choose an action you'd like to take on apps that match the conditions in this policy. For example, disabling the app.
74+
- Set the policy actions to active or disabled.
4475

4576
## Next steps
4677

47-
[Secure apps with app hygiene features](app-governance-secure-apps-app-hygiene-features.md)
78+
[Secure apps with app hygiene features](app-governance-secure-apps-app-hygiene-features.md)<br>
79+
[View your app details with app governance](app-governance-visibility-insights-view-apps.md#getting-detailed-information-on-an-app)
251 KB
Loading
365 KB
Loading
442 KB
Loading
Binary file not shown.

defender-for-cloud-apps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -420,7 +420,7 @@ items:
420420
href: app-governance-manage-alerts.md
421421
- name: Secure apps and other assets
422422
items:
423-
- name: Secure apps accessing non-Graph APIs
423+
- name: Secure apps accessing non-Graph APIs using app governance
424424
href: app-governance-secure-apps-access-non-graph-api.md
425425
- name: Secure apps with app hygiene features
426426
href: app-governance-secure-apps-app-hygiene-features.md

0 commit comments

Comments
 (0)