You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/app-governance-get-started.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ description: Get started with app governance capabilities to govern your apps in
10
10
This article describes how to turn on Microsoft Defender for Cloud Apps app governance.
11
11
12
12
> [!NOTE]
13
-
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments cannot connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance is not FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees.
13
+
> By default, the Microsoft Defender for Cloud Apps instance in the US Government environments can't connect to resources in Azure commercial and is FedRAMP compliant. However, App Governance isn't FedRAMP certified. App Governance will only store and process data in secure locations within the United States and the data will only be accessible by approved Microsoft employees.
14
14
## Prerequisites
15
15
16
16
Before you start, verify that you satisfy the following prerequisites:
@@ -21,15 +21,16 @@ Before you start, verify that you satisfy the following prerequisites:
21
21
22
22
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
23
23
24
-
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden or United Arab Emirates.
24
+
25
+
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
25
26
26
27
## Turn on app governance
27
28
28
29
If your organization satisfies the [prerequisites](#prerequisites), go to [Microsoft Defender XDR > Settings > Cloud Apps > App governance](https://security.microsoft.com/cloudapps/settings) and select **Use app governance**. For example:
29
30
30
31
:::image type="content" source="media/app-governance-get-started/app-governance-service-status2.png" alt-text="Screenshot of the App governance toggle in Microsoft Defender XDR." lightbox="media/app-governance-get-started/app-governance-service-status2.png":::
31
32
32
-
After you've signed up for app governance, you'll need to wait up to 10 hours to see and use the product.
33
+
After signing up for app governance, you'll need to wait up to 10 hours to see and use the product.
33
34
34
35
If you're unable to see the app governance option in the settings page, it might be due to one or more of the following reasons:
35
36
@@ -76,7 +77,7 @@ For more information about each role, see [Administrator role permissions](/azur
76
77
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
77
78
78
79
> [!NOTE]
79
-
> App governance alerts will not flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
80
+
> App governance alerts won't flow to Microsoft Defender XDR or show up in app governance until you have provisioned both Defender for Cloud Apps and Microsoft Defender XDR by accessing their respective portals at least once.
0 commit comments