Skip to content

Commit 4cdbe57

Browse files
authored
Merge branch 'main' into docs-editor/release-notes-1740339573
2 parents c68e72d + 2071e54 commit 4cdbe57

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ description: Get started with app governance capabilities to govern your apps in
1010
This article describes how to turn on Microsoft Defender for Cloud Apps app governance.
1111

1212
> [!NOTE]
13-
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments cannot connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance is not FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees. 
13+
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments can't connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance isn't FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees. 
1414
## Prerequisites
1515

1616
Before you start, verify that you satisfy the following prerequisites:
@@ -21,15 +21,16 @@ Before you start, verify that you satisfy the following prerequisites:
2121

2222
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
2323

24-
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden or United Arab Emirates.
24+
25+
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
2526

2627
## Turn on app governance
2728

2829
If your organization satisfies the [prerequisites](#prerequisites), go to [Microsoft Defender XDR > Settings > Cloud Apps > App governance](https://security.microsoft.com/cloudapps/settings) and select **Use app governance**. For example:
2930

3031
:::image type="content" source="media/app-governance-get-started/app-governance-service-status2.png" alt-text="Screenshot of the App governance toggle in Microsoft Defender XDR." lightbox="media/app-governance-get-started/app-governance-service-status2.png":::
3132

32-
After you've signed up for app governance, you'll need to wait up to 10 hours to see and use the product.
33+
After signing up for app governance, you'll need to wait up to 10 hours to see and use the product.
3334

3435
If you're unable to see the app governance option in the settings page, it might be due to one or more of the following reasons:
3536

@@ -76,7 +77,7 @@ For more information about each role, see [Administrator role permissions](/azur
7677
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
7778
7879
> [!NOTE]
79-
> App governance alerts will not flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
80+
> App governance alerts won't flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
8081
8182
## Next steps
8283

0 commit comments

Comments
 (0)