Skip to content

Commit 5aa365f

Browse files
authored
Merge pull request #2857 from gayasalomon/docs-editor/release-notes-1740050256
Update release-notes.md
2 parents 308fa27 + e908965 commit 5aa365f

File tree

1 file changed

+12
-1
lines changed

1 file changed

+12
-1
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,17 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## February 2025
2323

24+
### Enhanced alert source accuracy
25+
26+
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
27+
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
28+
29+
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
30+
31+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
32+
33+
### Network requirement updates
34+
2435
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
2536

2637
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
@@ -128,7 +139,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
128139

129140
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
130141

131-
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
142+
For more information, see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132143

133144
### Connect Mural to Defender for Cloud Apps (Preview)
134145

0 commit comments

Comments
 (0)