Skip to content

Commit 52ddd14

Browse files
authored
Merge branch 'public' into patch-3
2 parents 4df40ba + bbb017c commit 52ddd14

31 files changed

+184
-339
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,11 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/file-filters.md",
1000+
"redirect_url": "/defender-cloud-apps/data-protection-policies",
1001+
"redirect_document_id": false
9971002
}
9981003
]
9991004
}

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Microsoft Defender for Identity mapping for [potential lateral movement paths](/
1111

1212
> [!NOTE]
1313
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14-
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
14+
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
1515
>
1616
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
1717
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).

CloudAppSecurityDocs/best-practices.md

Lines changed: 14 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,7 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
5959
* [OAuth app policies](app-permission-policy.md)
6060

6161
---
62-
---
63-
---
64-
---
62+
<br/><br/>
6563

6664
## Apply cloud governance policies
6765

@@ -133,13 +131,12 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
133131
**For more information**:
134132

135133
* [Connect apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
136-
* [File filters](file-filters.md)
134+
* [File policies](data-protection-policies.md)
137135
* [Content inspection](content-inspection.md)
138136

139137
---
140-
---
141-
---
142-
---
138+
<br/><br/>
139+
143140

144141
## Enforce DLP and compliance policies for data stored in the cloud
145142

@@ -150,9 +147,8 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
150147
* [Governing connected apps](governance-actions.md)
151148

152149
---
153-
---
154-
---
155-
---
150+
<br/><br/>
151+
156152

157153
## Block and protect download of sensitive data to unmanaged or risky devices
158154

@@ -164,9 +160,8 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
164160
* [Session policies](session-policy-aad.md)
165161

166162
---
167-
---
168-
---
169-
---
163+
<br/><br/>
164+
170165

171166
## Secure collaboration with external users by enforcing real-time session controls
172167

@@ -178,9 +173,8 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
178173
* [Session policies](session-policy-aad.md)
179174

180175
---
181-
---
182-
---
183-
---
176+
<br/><br/>
177+
184178

185179
## Detect cloud threats, compromised accounts, malicious insiders, and ransomware
186180

@@ -220,9 +214,8 @@ Anomaly detection policies are triggered when there are unusual activities perfo
220214
* [OAuth app policies](app-permission-policy.md)
221215

222216
---
223-
---
224-
---
225-
---
217+
<br/><br/>
218+
226219

227220
## Use the audit trail of activities for forensic investigations
228221

@@ -237,9 +230,8 @@ When dismissing alerts, it's important to investigate and understand why they ar
237230
* [Activities](activity-filters.md)
238231

239232
---
240-
---
241-
---
242-
---
233+
<br/><br/>
234+
243235

244236
## Secure IaaS services and custom apps
245237

CloudAppSecurityDocs/data-protection-policies.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,8 @@ ms.topic: how-to
77

88
# File policies in Microsoft Defender for Cloud Apps
99

10-
11-
1210
File Policies allow you to enforce a wide range of automated processes using the cloud provider's APIs. Policies can be set to provide continuous compliance scans, legal eDiscovery tasks, DLP for sensitive content shared publicly, and many more use cases. Defender for Cloud Apps can monitor any file type based on more than 20 metadata filters (for example, access level, file type).
1311

14-
For a list of file filters that can be applied see [File filters in Microsoft Defender for Cloud Apps](file-filters.md).
15-
1612
## Supported file types
1713

1814
The Defender for Cloud Apps engines perform content inspection by extracting text from all common file types (100+) including Office, Open Office, compressed files, various rich text formats, XML, HTML, and more.
@@ -26,8 +22,9 @@ The engine combines three aspects under each policy:
2622
* Context filters including user roles, file metadata, sharing level, organizational group integration, collaboration context, and additional customizable attributes.
2723

2824
* Automated actions for governance and remediation.
29-
> [!NOTE]
30-
> Only the governance action of the first triggered policy is guaranteed to be applied. For example, if a file policy has already applied a sensitivity label to a file, a second file policy cannot apply another sensitivity label to it.
25+
26+
> [!NOTE]
27+
> Only the governance action of the first triggered policy is guaranteed to be applied. For example, if a file policy has already applied a sensitivity label to a file, a second file policy cannot apply another sensitivity label to it.
3128
3229
Once enabled, the policy continuously scans your cloud environment and identifies files that match the content and context filters, and apply the requested automated actions. These policies detect and remediate any violations for at-rest information or when new content is created. Policies can be monitored using real-time alerts or using console-generated reports.
3330

@@ -57,7 +54,7 @@ To create a new file policy, follow this procedure:
5754

5855
1. Select **Create policy** and select **File policy**.
5956

60-
![Create a Information Protection policy.](media/create-policy-from-information-protection-tab.png)
57+
![Create a Information Protection policy.](media/create-policy-from-information-protection-tab.png)
6158

6259
1. Give your policy a name and description, if you want you can base it on a template, for more information on policy templates, see [Control cloud apps with policies](control-cloud-apps-with-policies.md).
6360

@@ -66,10 +63,12 @@ To create a new file policy, follow this procedure:
6663
1. Within **Category**, link the policy to the most appropriate risk type. This field is informative only and helps you search for specific policies and alerts later, based on risk type. The risk may already be preselected according to the category for which you chose to create the policy. By default, File policies are set to DLP.
6764

6865
1. **Create a filter for the files this policy will act on** to set which discovered apps trigger this policy. Narrow down the policy filters until you reach an accurate set of files you wish to act upon. Be as restrictive as possible to avoid false positives. For example, if you wish to remove public permissions, remember to add the **Public** filter, if you wish to remove an external user, use the "External" filter and so on.
66+
6967
> [!NOTE]
7068
> When using the policy filters, **Contains** searches only for full words – separated by commas, dots, spaces, or underscores. For example if you search for **malware** or **virus**, it finds virus_malware_file.exe but it does not find malwarevirusfile.exe. If you search for **malware.exe**, then you find ALL files with either malware or exe in their filename, whereas if you search for **"malware.exe"** (with the quotation marks) you find only files that contain exactly "malware.exe". **Equals** searches only for the complete string, for example if you search for **malware.exe** it finds malware.exe but not malware.exe.txt.
7169
>
7270
> For more information about File Policy Filters, see [File filters in Microsoft Defender for Cloud Apps](file-filters.md#file-filters).
71+
7372
1. Under the first **Apply to** filter, select **all files excluding selected folders** or **selected folders** for Box, SharePoint, Dropbox, or OneDrive, where you can enforce your file policy over all files on the app or on specific folders. You're redirected to sign in the cloud app, and then add the relevant folders.
7473

7574
1. Under the second **Apply to** filter, select either **all file owners**, **file owners from selected user groups** or **all file owners excluding selected groups**. Then select the relevant user groups to determine which users and groups should be included in the policy.
@@ -127,15 +126,18 @@ Each policy is composed of the following parts:
127126
You can go to the Policy center to review file policy violations.
128127

129128
1. In the Microsoft Defender Portal, under **Cloud Apps**, go to **Policies** -> **Policy management**, and then select the **Information protection** tab.
129+
130130
1. For each file policy, you can see the file policy violations by selecting the **matches**.
131131

132-
![Screenshot of sample PCI matches.](media/pci-matches.png "Screenshot of sample PCI matches.")
132+
:::image type="content" alt-text="Screenshot of sample PCI matches." source="media/pci-matches.png" lightbox="media/pci-matches.png":::
133133

134134
1. You can select the file itself to get information about the files.
135135

136-
![Screenshot of sample PCI content matches.](media/pci-content-matches.png "Screenshot of sample PCI content matches.")
136+
:::image type="content" alt-text="Screenshot of sample PCI content matches." source="media/pci-content-matches.png" lightbox="media/pci-content-matches.png":::
137+
138+
1. For example, you can select **Collaborators** to see who has access to this file, and you can select **Matches** to see the Social Security numbers.
137139

138-
1. For example, you can select **Collaborators** to see who has access to this file, and you can select **Matches** to see the Social Security numbers. ![Content matches credit card numbers.](media/content-matches-ccn.png "content matches Social Security numbers")
140+
:::image type="content" alt-text="Content matches Social Security numbers." source="media/content-matches-ccn.png" lightbox="media/content-matches-ccn.png":::
139141

140142
## Related videos
141143

0 commit comments

Comments
 (0)