Skip to content

Commit 53abbcb

Browse files
authored
Merge pull request #2173 from MicrosoftDocs/main
Published main to live, Thursday 5:00 PM IST, 12/12
2 parents 77a2f20 + 4e312c8 commit 53abbcb

File tree

3 files changed

+9
-8
lines changed

3 files changed

+9
-8
lines changed

CloudAppSecurityDocs/protect-egnyte.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your Egnyte environment (Preview) | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Egnyte app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/05/2023
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77
# How Defender for Cloud Apps helps protect your Egnyte environment
@@ -77,9 +77,9 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
7777
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7878

7979
>[!NOTE]
80-
>Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice.
81-
>To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token).
82-
>Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
80+
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81+
>
82+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
8383
8484
## Next steps
8585

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/11/2024
4+
ms.date: 12/12/2024
55
ms.topic: how-to
66
---
77

@@ -45,7 +45,8 @@ In Secure Score, select **Recommended actions** and filter by **Product** = **Se
4545

4646
For more information, see:
4747
- [Security posture management for SaaS apps](security-saas.md)
48-
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score)
48+
- [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score
49+
)
4950

5051
## Control ServiceNow with built-in policies and policy templates
5152

@@ -181,7 +182,7 @@ Revoke to the old refresh token. We don't recommend keeping old keys for securit
181182

182183
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
183184

184-
After connecting ServiceNow, you'll receive events for seven days prior to connection.
185+
After connecting ServiceNow, you'll receive events for 1 hour prior to connection.
185186

186187
### Legacy ServiceNow connection
187188

defender-xdr/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ Lists the new features and functionality in Microsoft Defender XDR.
2121

2222
For more information on what's new with other Microsoft Defender security products and Microsoft Sentinel, see:
2323

24+
- [What's new in Microsoft's unified security operations platform](/unified-secops-platform/whats-new)
2425
- [What's new in Microsoft Defender for Office 365](/defender-office-365/defender-for-office-365-whats-new)
2526
- [What's new in Microsoft Defender for Endpoint](/defender-endpoint/whats-new-in-microsoft-defender-endpoint)
2627
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
@@ -31,7 +32,6 @@ You can also get product updates and important notifications through the [messag
3132

3233
## December 2024
3334

34-
- If you're using Microsoft's unified security operations (SecOps) platform, with both Microsoft Sentinel and Microsoft Defender XDR, Microsoft Sentinel workbooks are now available to view directly in the Microsoft Defender portal. Continue tabbing out to the Azure portal only to edit your workbooks. For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](/azure/sentinel/monitor-your-data?tabs=azure-portal).
3535
- (Preview) The [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature in Microsoft Defender advanced hunting now allows linking of Microsoft Sentinel query results. In both the Microsoft Defender unified experience and in [Defender XDR advanced hunting](advanced-hunting-link-to-incident.md), you can now specify whether an entity is an impacted asset or related evidence.
3636
- (Preview) In [advanced hunting](advanced-hunting-defender-use-custom-rules.md#use-adx-operator-for-azure-data-explorer-queries-preview), Microsoft Defender portal users can now use the `adx()` operator to query tables stored in Azure Data Explorer. You no longer need to go to log analytics in Microsoft Sentinel to use this operator if you are already in Microsoft Defender.
3737
- New documentation library for Microsoft's unified security operations platform. Find centralized documentation about [Microsoft's unified SecOps platform in the Microsoft Defender portal](/unified-secops-platform/overview-unified-security). Microsoft's unified SecOps platform brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, Microsoft Security Exposure Management, and generative AI into the Defender portal. Learn about the features and functionality available with Microsoft's unified SecOps platform, then start to plan your deployment.

0 commit comments

Comments
 (0)