Skip to content

Commit 663a19b

Browse files
Merge pull request #5220 from MicrosoftDocs/main
[AutoPublish] main to live - 10/07 01:34 PDT | 10/07 14:04 IST
2 parents 590bbe4 + 414a74b commit 663a19b

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

defender-for-cloud-apps/troubleshooting-proxy-end-users.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,14 @@ This message only appears for Chrome users, as Microsoft Edge users benefit from
217217
218218
If you receive a message like this, contact Microsoft’s support to address it with the relevant browser vendor.
219219
220+
## Users encounter Entra ID Login after clicking mcas.ms links
221+
Attackers can craft URLs that appear to lead to trusted domains but actually redirect users to malicious sites. For users protected by the session/suffix-based solution, an attacker might attempt to bypass controls by appending the mcas.ms suffix to a malicious URL, exploiting the assumption that such URLs are safe.
222+
223+
To mitigate this, Microsoft Defender for Cloud Apps redirects any mcas.ms URL lacking valid session context to Entra ID for authentication, effectively blocking such exploits.
224+
225+
However, legitimate mcas.ms URLs without context can exist, for example, if a user clicks on an old browser bookmark. In such cases, the user will first be redirected to Entra ID. If their identity provider (IdP) is not Entra ID, they will need to manually remove the mcas.ms suffix to proceed.
226+
227+
220228
## More considerations for troubleshooting apps
221229
222230
When troubleshooting apps, there are some more things to consider:

0 commit comments

Comments
 (0)