You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/network-requirements.md
+33-37Lines changed: 33 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,37 +34,39 @@ To see which data center you're connecting to, do the following steps:
34
34
35
35
## Portal access
36
36
37
-
To use Defender for Cloud Apps in the Microsoft Defender Portal, add **outbound port 443** for the following IP addresses and DNS names to your firewall's allowlist:
38
-
39
-
```ini
40
-
cdn.cloudappsecurity.com
41
-
cdn-discovery.cloudappsecurity.com
42
-
adaproddiscovery.azureedge.net
43
-
*.s-microsoft.com
44
-
*.msecnd.net
45
-
dev.virtualearth.net
46
-
flow.microsoft.com
47
-
static2.sharepointonline.com
48
-
*.blob.core.windows.net
49
-
discoveryresources-cdn-prod.cloudappsecurity.com
50
-
discoveryresources-cdn-gov.cloudappsecurity.com
51
-
52
-
```
53
-
54
-
Additionally, the following items should be allowed, depending on which data center you use:
> For portal access, instead of a wildcard (\*), you can choose to open only your specific tenant URL. For example, based on the screenshot above you can open: `contoso.us.portal.cloudappsecurity.com`. To determine your tenant URL, see the earlier section [View your data center](#view-your-data-center), and look for **API URL**.
37
+
To use Defender for Cloud Apps in the Microsoft Defender Portal:
38
+
39
+
1. Add **outbound port 443** for the following IP addresses and DNS names to your firewall's allowlist:
40
+
41
+
```ini
42
+
cdn.cloudappsecurity.com
43
+
cdn-discovery.cloudappsecurity.com
44
+
adaproddiscovery.azureedge.net
45
+
*.s-microsoft.com
46
+
*.msecnd.net
47
+
dev.virtualearth.net
48
+
flow.microsoft.com
49
+
static2.sharepointonline.com
50
+
*.blob.core.windows.net
51
+
discoveryresources-cdn-prod.cloudappsecurity.com
52
+
discoveryresources-cdn-gov.cloudappsecurity.com
53
+
54
+
```
55
+
56
+
1. Allow the following items based on your data center:
> For portal access, instead of a wildcard (\*), you can choose to open only your specific tenant URL. For example, based on the screenshot above you can open: `contoso.us.portal.cloudappsecurity.com`. To determine your tenant URL, see the earlier section [View your data center](#view-your-data-center), and look for **API URL**.
68
70
69
71
## Access and session controls
70
72
@@ -82,9 +84,6 @@ For more information, see [Protect apps with Microsoft Defender for Cloud Apps C
82
84
83
85
For commercial customers, to enable Defender for Cloud Apps reverse proxy, add **outbound port 443** for the following IP addresses and DNS names to your firewall's allowlist:
84
86
85
-
86
-
87
-
88
87
```ini
89
88
*.cas.ms
90
89
*.mcas.ms
@@ -109,9 +108,6 @@ Additionally, the following IP addresses, used by our reverse proxy regions, sho
109
108
110
109
For US Government GCC High customers, to enable Defender for Cloud Apps reverse proxy, add **outbound port 443** for the following DNS names to your firewall's allowlist:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+26-29Lines changed: 26 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: What's new | Microsoft Defender for Cloud Apps
3
3
description: This article is updated frequently to let you know what's new in the latest release of Microsoft Defender for Cloud Apps.
4
-
ms.date: 11/19/2024
4
+
ms.date: 02/20/2025
5
5
ms.topic: overview
6
6
---
7
7
@@ -21,18 +21,6 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
21
21
22
22
## February 2025
23
23
24
-
### Enhanced Visibility into OAuth Apps Connected to Microsoft 365 - General Availability
25
-
26
-
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
27
-
28
-
The new *Permissions* filter and export capabilities allows you to quickly identify apps with specific permissions to access Microsoft 365.
29
-
30
-
You can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights will enable you to get deeper visibility into apps accessing emails using legacy EWS API.
31
-
32
-
We are also expanding the coverage of privilege level feature for all popular Microsoft first-party API permissions. The enhanced coverage of privilege level classification will enable you to view and monitor apps with powerful permissions into legacy and other non-Graph APIs that have access to Microsoft 365.
33
-
34
-
For more information, see [detailed insights into OAuth apps](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
35
-
36
24
### Enhanced alert source accuracy
37
25
38
26
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
@@ -44,30 +32,39 @@ To learn more about the Graph API alert resource: [alert resource type - Microso
44
32
45
33
### Network requirement updates
46
34
47
-
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
48
-
49
-
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
50
-
51
-
- cdn.cloudappsecurity.com
52
-
- cdn-discovery.cloudappsecurity.com
35
+
Microsoft Defender for Cloud Apps has improved its security and performance. Network information in firewalls and additional third-party services must be updated to comply with the new standards. To ensure uninterrupted access to our services you must apply these changes by March 16, 2025.
53
36
54
-
- All required outbound access URLs can also be found in Defender for Cloud Apps network requirements page under 'Portal Access'.
37
+
To connect to third-party apps and enable Defender for Cloud Apps, use the following IP addresses:
55
38
56
-
- To use Defender for Cloud Apps in the Microsoft Defender portal, make sure you add outbound port 443 for all IP addresses and DNS names listed in our documentation to your firewall's allowlist.
To stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Cloud Apps services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
69
67
70
-
- To stay up to date on IP ranges that impact the experiences in Microsoft Defender for Cloud Apps in the areas of portal experience access, access and session controls, SIEM agent connection, app connectors, mail servers, and log collector, we recommend using the Azure service tag for Microsoft Defender for Cloud Apps services, and 'MicrosoftCloudAppSecurity.' The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](/azure/virtual-network/service-tags-overview).
71
68
72
69
## November 2024
73
70
@@ -86,7 +83,7 @@ Defender for Cloud Apps customers can now query data about discovered apps via t
86
83
For more information, see:
87
84
88
85
-[Work with discovered apps via Graph API](discovered-apps-api-graph.md)
89
-
-[Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta)
86
+
-[Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta&preserve-view=true)
90
87
91
88
### SaaS Security initiative in Exposure Management
0 commit comments