Skip to content

Commit 50cbbaf

Browse files
authored
Merge branch 'main' into patch-3
2 parents 439185c + fc5f7a0 commit 50cbbaf

File tree

6 files changed

+28
-15
lines changed

6 files changed

+28
-15
lines changed

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Use a custom app policy when you need to do something not already done by one of
9999
> [!NOTE]
100100
> Some policy conditions are only applicable to apps that access Graph API permissions. When evaluating apps that access only non-Graph APIs, app governance skips these policy conditions and proceed to check only other policy conditions.
101101
102-
5. Here are the available conditions for a custom app policy:
102+
1. Here are the available conditions for a custom app policy:
103103

104104
|Condition|Condition values accepted|Description|More information|
105105
|---|---|---|---|
@@ -123,9 +123,9 @@ Use a custom app policy when you need to do something not already done by one of
123123
|**Sensitivity labels accessed**|Select one or more sensitivity labels from the list|Apps that accessed data with specific sensitivity labels in the last 30 days.||
124124
|**Services accessed** (Graph only)|Exchange and/or OneDrive and/or SharePoint and/or Teams|Apps that have accessed OneDrive, SharePoint, or Exchange Online using Microsoft Graph and EWS APIs|Multiple selections allowed.|
125125
|**Error rate** (Graph only)|Error rate is greater than X% in the last seven days|Apps whose Graph API error rates in the last seven days are greater than a specified percentage||
126-
|**App origin** (Preview)|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127-
128-
All of the specified conditions must be met for this app policy to generate an alert.
126+
|**App origin**|External or Internal|Apps that originated within the tenant or registered in an external tenant||
127+
128+
All of the specified conditions must be met for this app policy to generate an alert.
129129

130130
6. When you're done specifying the conditions, select **Save**, and then select **Next**.
131131

@@ -166,7 +166,7 @@ Policies for OAuth apps trigger alerts only on policies that are authorized by u
166166
1. Go to **Microsoft Defender XDR > App governance > Policies > Other apps**. For example:
167167

168168
![Other apps-policy creation](media/app-governance-app-policies-create/other-apps-policy-creation.jpg)
169-
169+
170170
2. Filter the apps according to your needs. For example, you might want to view all apps that request **Permission** to **Modify calendars in your mailbox**.
171171

172172
> [!TIP]

CloudAppSecurityDocs/app-governance-get-started.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ Before you start, verify that you satisfy the following prerequisites:
2121

2222
- You must have [one of the appropriate roles](#roles) to turn on app governance and access it.
2323

24-
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, South Africa, Sweden, or United Arab Emirates.
24+
25+
- Your organization's billing address must be in a region **other than** Brazil, Singapore, Latin America, South Korea, Switzerland, Norway, Poland, Italy, Qatar, Israel, Spain, Mexico, South Africa, Sweden, or United Arab Emirates.
2526

2627
## Turn on app governance
2728

CloudAppSecurityDocs/app-governance-visibility-insights-get-started.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ One of the primary value points for app governance is the ability to quickly vie
4545

4646
- **Privilege level**
4747

48-
- **Permission** (Preview)
48+
- **Permission**
4949

5050
- **Permission usage**
5151

@@ -56,8 +56,8 @@ One of the primary value points for app governance is the ability to quickly vie
5656
- **Publisher verified**
5757

5858
Use one of the following nondefault filters to further customize the apps listed:
59-
60-
- **Last modified**
59+
60+
- **Last modified**
6161

6262
- **Added on**
6363

CloudAppSecurityDocs/app-governance-visibility-insights-view-apps.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ On the **Microsoft 365** tab, the apps in your tenant are listed with the follow
3131
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom |
3232
| **Graph API access**| Shows whether the app has at least one Graph API permission |
3333
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions |
34-
| **App origin** (Preview)| Shows whether the app originated within the tenant or was registered in an external tenant |
34+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant |
3535
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app |
3636
| **Publisher**| Publisher of the app and their verification status |
3737
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
@@ -69,10 +69,10 @@ In the details pane, select any of the following tabs to view more details:
6969

7070
- Select the **Users** tab to see a list of users who are using the app, whether they're a priority account, and the amount of data downloaded and uploaded. For example:
7171

72-
:::image type="content" source="media/app-governance-visibility-insights-view-apps/users.png" alt-text="Screenshot of the Users tab.":::
73-
74-
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
75-
72+
![Screenshot 2025-02-24 005703](media/app-governance-visibility-insights-view-apps/screenshot-2025-02-24-005703.png)
73+
74+
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
75+
7676
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, privilege level and whether they are in use. For example:
7777

7878
:::image type="content" source="media/app-governance-visibility-insights-view-apps/permissions.png" alt-text="Screenshot of the Permissions tab.":::
142 KB
Loading

CloudAppSecurityDocs/release-notes.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,26 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## February 2025
2323

24+
### Enhanced Visibility into OAuth Apps Connected to Microsoft 365 - General Availability
25+
26+
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
27+
28+
The new *Permissions* filter and export capabilities allows you to quickly identify apps with specific permissions to access Microsoft 365.
29+
30+
You can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights will enable you to get deeper visibility into apps accessing emails using legacy EWS API.
31+
32+
We are also expanding the coverage of privilege level feature for all popular Microsoft first-party API permissions. The enhanced coverage of privilege level classification will enable you to view and monitor apps with powerful permissions into legacy and other non-Graph APIs that have access to Microsoft 365.
33+
34+
For more information, see [detailed insights into OAuth apps](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
35+
2436
### Enhanced alert source accuracy
2537

2638
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
2739
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
2840

2941
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
3042

31-
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
43+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0&preserve-view=true)
3244

3345
### Network requirement updates
3446

0 commit comments

Comments
 (0)