You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/applications-inventory.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,17 +7,17 @@ description: The new Applications page located under Assets in Microsoft Defende
7
7
---
8
8
# Applications inventory (Preview)
9
9
10
-
Protecting your SaaS ecosystem requires taking inventory of all SaaS and OAuth connected apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Defender for Cloud apps Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
10
+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and connected OAuth apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11
11
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12
12
13
-
The Application page includes the following tabs:
13
+
The Applications page includes the following tabs:
14
14
15
15
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16
-
* OAuth apps: Displays a list of OAuth apps such as Microsoft Entra ID, Google workspace and Salesforce.
16
+
* OAuth apps: A comprehensive view of OAuth apps registered on Microsoft Entra ID, Google workspace and Salesforce. This tab highlights OAuth apps metadata, publisher info and app origin, permissions used, data accessed and other insights.
17
17
18
18
## Navigate to the Applications page
19
19
20
-
In the Defender portal at <https://security.microsoft.com>, go to **Assets**\>**Applications**. Or, to go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
20
+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** > **Applications**. Or, go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21
21
22
22
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-aws.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -161,8 +161,7 @@ You can connect AWS **Security auditing** to Defender for Cloud Apps connections
161
161
**For an existing connector**
162
162
163
163
1. In the list of connectors, on the row in which the AWS connector appears, select **Edit settings**.
164
-
165
-

164
+
166
165
167
166
1. On the **Instance name** and **Connect Amazon Web Services** pages, select **Next**. On the **Security auditing page**, paste the **Access key** and **Secret key** from the .csv file into the relevant fields, and select **Next**.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-gcp.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Protect your Google Cloud Platform environment | Microsoft Defender for Cloud Apps
3
3
description: Learn how about connecting your Google Cloud Platform app to Defender for Cloud Apps using the API connector.
4
-
ms.date: 12/05/2023
4
+
ms.date: 03/04/2025
5
5
ms.topic: how-to
6
6
---
7
7
# How Defender for Cloud Apps helps protect your Google Cloud Platform (GCP) environment
@@ -47,7 +47,8 @@ For more information about remediating threats from apps, see [Governing connect
47
47
48
48
## Protect GCP in real time
49
49
50
-
Review our best practices for [securing and collaborating with external users](best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls) and [blocking and protecting the download of sensitive data to unmanaged or risky devices](best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices).
50
+
Review our best practices for [securing and collaborating with external users](best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls) and [
51
+
blocking and protecting the download of sensitive data to unmanaged or risky devices](best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices).
51
52
52
53
## Connect Google Cloud Platform to Microsoft Defender for Cloud Apps
53
54
@@ -167,8 +168,6 @@ This procedure describes how to add the GCP connection details to connect Google
167
168
168
169
1. In the list of connectors, on the row in which the GCP connector appears, select **Edit settings**.
169
170
170
-

171
-
172
171
1. In the **Enter details** page, do the following, and then select **Submit**.
173
172
1. In the **Organization ID** box, enter the organization you made a note of earlier.
174
173
1. In the **Private key file** box, browse to the JSON file you downloaded earlier.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-zoom.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Connect Zoom | Microsoft Defender for Cloud Apps
3
3
description: This article provides information about how to connect your Zoom environment to Defender for Cloud Apps using the API connector for visibility and control over use.
4
-
ms.date: 06/18/2023
4
+
ms.date: 03/04/2025
5
5
ms.topic: how-to
6
6
---
7
7
@@ -20,7 +20,7 @@ To see security posture recommendations for Zoom in Microsoft Secure Score, crea
20
20
For example, recommendations for Zoom include:
21
21
22
22
-*Enable multi-factor authentication (MFA)*
23
-
-*Enable session timeout for web users*
23
+
- Enable session timeout for web users
24
24
-*Enforce end to end encryption in all Zoom meetings*
25
25
26
26
If a connector already exists and you don't see Zoom recommendations yet, refresh the connection by disconnecting the API connector, and then reconnecting it with the `“account:read:admin`, `chat_channel:read:admin` and `user:read:admin”` permissions.
@@ -39,6 +39,11 @@ Before connecting Zoom to Defender for Cloud Apps, make sure that you have the f
39
39
40
40
The admin account is used only for initial consent while connecting Zoom to Defender for Cloud Apps. Defender for Cloud Apps uses an OAuth app for daily transactions.
41
41
42
+
>[!NOTE]
43
+
> The authentication mechanism utilized in the Zoom connector doesn't support two separate connectors utilizing the same user credentials.<br>
44
+
>
45
+
> When a new instance with an existing authentication token is used, this revokes the old connector token and will cause a "Bad credentials" error.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,6 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
22
22
23
23
## April 2025
24
24
25
-
26
25
### OAuthAppInfo table added to Defender XDR advanced hunting (Preview)
27
26
28
27
The [OAuthAppInfo](/defender-xdr/advanced-hunting-oauthappinfo-table) table is now available in Defender XDR advanced hunting, enabling security teams to explore and analyze OAuth app-related metadata with enhanced visibility.
Copy file name to clipboardExpand all lines: defender-xdr/alerts-incidents-correlation.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Alert correlation and incident merging in the Microsoft Defender portal
3
-
description: Learn how alerts are correlated, and how and why incidents may be merged, in the Microsoft Defender portal.
3
+
description: Learn how alerts are correlated, and how and why incidents might be merged, in the Microsoft Defender portal.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 02/02/2025
21
+
ms.date: 03/17/2025
22
22
appliesto:
23
23
- Microsoft Defender XDR
24
24
- Microsoft Sentinel in the Microsoft Defender portal
@@ -37,6 +37,10 @@ When alerts are generated by the various detection mechanisms in the Microsoft D
37
37
38
38
The criteria used by the Defender portal to correlate alerts together in a single incident are part of its proprietary, internal correlation logic. This logic is also responsible for giving an appropriate name to the new incident.
39
39
40
+
### Alert correlation by workspace
41
+
42
+
The Defender portal allows you to connect to one primary workspace and multiple secondary workspaces for Microsoft Sentinel. A primary workspace's alerts are correlated with Microsoft Defender XDR data. So, incidents include alerts from Microsoft Sentinel's primary workspace and Defender XDR in a unified queue. All other onboarded workspaces are considered secondary workspaces. For secondary workspaces, incidents are created based on the workspace’s data and won't include Defender XDR data. The Defender portal keeps incident creation and alert correlation separate between the Microsoft Sentinel workspaces. For more information, see [Multiple Microsoft Sentinel workspaces in the Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2310579).
43
+
40
44
### Manual correlation of alerts
41
45
42
46
While Microsoft Defender already uses advanced correlation mechanisms, you might want to decide differently whether a given alert belongs with a particular incident or not. In such a case, you can unlink an alert from one incident and link it to another. Every alert must belong to an incident, so you can either link the alert to another existing incident, or to a new incident that you create on the spot.
Copy file name to clipboardExpand all lines: defender-xdr/prerequisites.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
16
16
search.appverid:
17
17
- MOE150
18
18
- MET150
19
-
ms.date: 02/04/2025
19
+
ms.date: 04/03/2025
20
20
appliesto:
21
21
- Microsoft Defender XDR
22
22
---
@@ -52,7 +52,8 @@ Any of these licenses give you access to Microsoft Defender XDR features via the
52
52
For more information, [view the Microsoft 365 Enterprise service plans](https://www.microsoft.com/licensing/product-licensing/microsoft-365-enterprise).
53
53
54
54
> [!NOTE]
55
-
> Automatic attack disruption requires Microsoft Defender for Endpoint Plan 2. For more information, see [Configure automatic attack disruption capabilities](configure-attack-disruption.md).
55
+
> - Automatic attack disruption requires Microsoft Defender for Endpoint Plan 2. For more information, see [Configure automatic attack disruption capabilities](configure-attack-disruption.md).
56
+
> - Threat analytics also requires Defender for Endpoint Plan 2. For more information, see [Threat analytics in Microsoft Defender XDR](threat-analytics.md).
56
57
57
58
> Don't have license yet? [Try or buy a Microsoft 365 subscription](/microsoft-365/commerce/try-or-buy-microsoft-365)
0 commit comments