Skip to content

Commit 47aa9be

Browse files
authored
Merge pull request #4727 from DeCohen/WI480553-update-ms-date-ms-reviewer
Update images, ms date and add ms reviewer
2 parents 3caef24 + ec60037 commit 47aa9be

File tree

116 files changed

+192
-82
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

116 files changed

+192
-82
lines changed

CloudAppSecurityDocs/access-policy-aad.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Create access policies | Microsoft Defender for Cloud Apps
33
description: Learn how to configure Microsoft Defender for Cloud Apps access policies with Conditional Access app control to control access to cloud apps.
44
ms.date: 05/15/2024
55
ms.topic: how-to
6+
ms.reviewer: AmitMishaeli
67
---
78
# Create Microsoft Defender for Cloud Apps access policies
89

CloudAppSecurityDocs/accounts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate accounts from connected apps | Microsoft Defender for Cloud A
33
description: This article provides information about reviewing accounts from your connected apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: gayasalomon
67
---
78
# Cloud Application Accounts
89

CloudAppSecurityDocs/activity-filters.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate activities
33
description: This article provides a list of activities, filters, and match parameters that can be applied to activity policies.
44
ms.date: 06/24/2025
55
ms.topic: how-to
6+
ms.reviewer: gayasalomon
67
---
78

89
# Investigate activities
@@ -15,7 +16,7 @@ Microsoft Defender for Cloud Apps gives you visibility into all the activities f
1516
>
1617
> Microsoft Defender for Cloud Apps displays these activity names and types exactly as received and doesn't define or modify them. To understand the meaning of an activity, refer to the relevant third‑party API documentation.
1718
18-
The action types for events and activities are determined by the source service, whether it is a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and is not restricted to specific ones.
19+
The action types for events and activities are determined by the source service, whether it's a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and isn't restricted to specific ones.
1920
For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the Microsoft Purview portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
2021

2122

@@ -93,7 +94,7 @@ Selecting it opens the Activity drawer **User** tab provides the following insig
9394
- **ISPs**: The number of ISPs the user connected from in the past 30 days.
9495
- **IP addresses**: The number of IP addresses the user connected from in the past 30 days.
9596

96-
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
97+
:::image type="content" source="media/user-insights.png" alt-text="Screenshot that shows user insights, user activities, and frequent alert locations for Defender for Cloud apps." lightbox="media/user-insights.png":::
9798

9899

99100
#### IP address insights
@@ -122,7 +123,7 @@ To view IP address insights:
122123
- Set as a VPN IP address and add to allowlist
123124
- Set as a Risky IP and add to blocklist
124125

125-
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows Ip address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
126+
:::image type="content" source="media/activity-filters/ip-address-insights.png" alt-text="Screenshot that shows IP address activities over the last 30 days." lightbox="media/activity-filters/ip-address-insights.png":::
126127

127128

128129
> [!NOTE]

CloudAppSecurityDocs/admin-settings.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Configure admin notifications
33
description: This article provides instructions for setting admin preferences in Defender for Cloud Apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: Naama-Goldbart
67
---
78
# Configure admin notifications
89

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Create anomaly detection policies | Microsoft Defender for Cloud Apps
33
description: This article provides a description of Anomaly detection policies and provides reference information about the building blocks of an anomaly detection policy.
44
ms.date: 03/01/2023
55
ms.topic: how-to
6+
ms.reviewer: Ronen-Refaeli
67
---
78

89
# Create Defender for Cloud Apps anomaly detection policies

CloudAppSecurityDocs/api-activities-investigate-script.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Investigate activities using the API
33
description: This article provides information on how to use the API to investigate user activity in Defender for Cloud Apps.
44
ms.date: 01/29/2023
55
ms.topic: how-to
6+
ms.reviewer: Naama-Goldbart
67
---
78
# Investigate activities using the API
89

@@ -18,7 +19,7 @@ The activities API mode is optimized for scanning and retrieval of large quantit
1819
## To use the activity scan script
1920

2021
1. Run the query on your data.
21-
1. If there are more records than could be listed in a single scan, you will get a return command with `nextQueryFilters` that you should run. You will get this command each time you scan until the query has returned all the results.
22+
1. If there are more records than could be listed in a single scan, you'll get a return command with `nextQueryFilters` that you should run. You'll get this command each time you scan until the query has returned all the results.
2223

2324
## Request body parameters
2425

@@ -32,9 +33,9 @@ The activities API mode is optimized for scanning and retrieval of large quantit
3233

3334
## Response parameters
3435

35-
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records will be dropped to ensure that all data is listed only once.
36+
- "data": the returned data. Will contain up to "limit" number of records each iteration. If there are more records to be pulled (hasNext=true), the last few records are dropped to ensure that all data is listed only once.
3637
- "hasNext": Boolean. Denotes whether another iteration on the data is needed.
37-
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. Note that if the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
38+
- "nextQueryFilters": If another iteration is needed, it contains the consecutive JSON query to be run. Use this as the "filters" parameter in the next request. If the "hasNext" parameter is set to False, this parameter will be missing since you've iterated over all of the data.
3839

3940
The following Python example gets all the activities from the past day from Exchange Online.
4041

CloudAppSecurityDocs/app-activity-threat-hunting.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Hunt for threats in app activities | Microsoft Defender for Cloud Apps
3-
ms.date: 05/23/2025
3+
ms.date: 08/18/2025
44
ms.topic: how-to
55
description: Learn how app governance in Microsoft Defender for Cloud Apps helps you hunt for resources accessed and activities carried out by apps in your environment.
6+
ms.reviewer: shragar
67
---
78

89
# Hunt for threats in app activities

CloudAppSecurityDocs/app-governance-anomaly-detection-alerts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
22
title: Investigate app governance threat detection alerts | Microsoft Defender for Cloud Apps
3-
ms.date: 05/23/2025
3+
ms.date: 08/18/2025
44
ms.topic: how-to
55
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
66
description: Learn how to investigate threat detection alerts from app governance in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
7+
ms.reviewer: shragar
78
---
89

910
# Investigate app governance threat detection alerts

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: Create app governance policies | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/12/2025
44
ms.topic: how-to
5+
ms.reviewer: shragar
56
description: Learn how to create app policies on app governance.
67
---
78

@@ -25,7 +26,7 @@ Use app governance to create OAuth policies for apps connected to Microsoft 365,
2526

2627
For apps connected to Microsoft Entra ID, create app policies from provided templates that can be customized, or create your own custom app policy.
2728

28-
1. To create a new app policy for Microsoft 365 apps, go to **Microsoft Defender XDR** \> **App governance** \> **Policies** \> **Microsoft 365 **.
29+
1. To create a new app policy for Microsoft 365 apps, go to **Microsoft Defender XDR** \> **App governance** \> **Policies** \> **Microsoft 365**.
2930

3031
For example:
3132

@@ -38,7 +39,7 @@ For apps connected to Microsoft Entra ID, create app policies from provided temp
3839

3940
For example:
4041

41-
:::image type="content" source="media/app-governance/app-governance-create-policy.png" alt-text="Screenshot of a Choose a policy template page.":::
42+
:::image type="content" source="media/app-governance/app-governance-create-policy.png" alt-text="Screenshot showing the "Choose a policy template" interface." lightbox="media/app-governance/app-governance-create-policy.png":::
4243

4344
## App policy templates
4445

@@ -87,17 +88,18 @@ Use a custom app policy when you need to do something not already done by one of
8788
- Medium
8889
- Low
8990

90-
2. On the **Choose Policy settings and conditions** page, for **Choose which apps this policy is applicable for**, select:
91+
1. On the **Choose Policy settings and conditions** page, for **Choose which apps this policy is applicable for**, select:
9192
- All Apps
9293
- Choose specific apps
9394
- All apps except
9495

95-
3. If you choose specific apps, or all apps except for this policy, select **Add apps** and select the desired apps from the list. In the **Choose apps** pane, you can select multiple apps to which this policy applies, and then select **Add**. Select **Next** when you're satisfied with the list.
96+
1. If you choose specific apps, or all apps except for this policy, select **Add apps** and select the desired apps from the list. In the **Choose apps** pane, you can select multiple apps to which this policy applies, and then select **Add**. Select **Next** when you're satisfied with the list.
9697

97-
4. Select **Edit conditions**. Select **Add condition** and choose a condition from the list. Set the desired threshold for your selected condition. Repeat to add more conditions. Select **Save** to save the rule, and when you're finished adding rules, select **Next**.
98+
1. Select **Edit conditions** > **Add condition** and choose a condition from the list. Set the desired threshold for your selected condition. Repeat to add more conditions.
99+
1. Select **Save** to save the rule, and when you're finished adding rules, select **Next**.
98100

99101
> [!NOTE]
100-
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceed to check only other policy conditions.
102+
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceeds to check only other policy conditions.
101103
102104
1. Here are the available conditions for a custom app policy:
103105

@@ -127,16 +129,16 @@ Use a custom app policy when you need to do something not already done by one of
127129

128130
All of the specified conditions must be met for this app policy to generate an alert.
129131

130-
6. When you're done specifying the conditions, select **Save**, and then select **Next**.
132+
1. When you're done specifying the conditions, select **Save**, and then select **Next**.
131133

132-
7. On the **Define Policy Actions** page, select **Disable app** if you want app governance to disable the app when an alert based on this policy is generated, and then select **Next**. Use caution when applying actions because a policy may affect users and legitimate app use.
134+
1. On the **Define Policy Actions** page, select **Disable app** if you want app governance to disable the app when an alert based on this policy is generated, and then select **Next**. Use caution when applying actions because a policy may affect users and legitimate app use.
133135

134-
8. On the **Define Policy Status** page, select one of these options:
136+
1. On the **Define Policy Status** page, select one of these options:
135137
- **Audit mode**: Policies are evaluated but configured actions won't occur. Audit mode policies appear with the status of **Audit** in the list of policies. You should use Audit mode for testing a new policy.
136138
- **Active**: Policies are evaluated and configured actions will occur.
137139
- **Inactive**: Policies aren't evaluated and configured actions won't occur.
138140

139-
9. Carefully review all parameters of your custom policy. Select **Submit** when you're satisfied. You can also go back and change settings by selecting **Edit** beneath any of the settings.
141+
1. Carefully review all parameters of your custom policy. Select **Submit** when you're satisfied. You can also go back and change settings by selecting **Edit** beneath any of the settings.
140142

141143
## Test and monitor your new app policy
142144

@@ -153,9 +155,9 @@ Here's an example of a process for creating a new policy, testing it, and then m
153155
3. If the behavior isn't expected, edit the policy apps, conditions, and action settings as needed and go back to step 2.
154156
4. If the behavior is expected, edit the policy and change its status to **Active**.
155157

156-
For example, the following flow chart shows the steps involved:
158+
For example, the following flow chart shows the steps involved:
157159

158-
:::image type="content" source="media/app-governance/mapg-create-new-policy-process.png" alt-text="Diagram of the create app policy workflow." lightbox="media/app-governance/mapg-create-new-policy-process.png" border="false":::
160+
:::image type="content" source="media/app-governance/mapg-create-new-policy-process.png" alt-text="Screenshot illustrating the steps involved in the create app policy workflow." lightbox="media/app-governance/mapg-create-new-policy-process.png" border="false":::
159161

160162
## Create a new policy for OAuth apps connected to Salesforce and Google Workspace
161163

CloudAppSecurityDocs/app-governance-app-policies-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Learn about app policies with app governance | Microsoft Defender for Cloud Apps
3-
ms.date: 05/23/2025
3+
ms.date: 08/18/2025
44
ms.topic: overview
55
description: Learn about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR.
6+
ms.reviewer: shragar
67
---
78

89
# Learn about app policies

0 commit comments

Comments
 (0)