Skip to content

Commit 672408f

Browse files
authored
Revise app policy management instructions
1 parent 4746313 commit 672408f

File tree

1 file changed

+1
-15
lines changed

1 file changed

+1
-15
lines changed

CloudAppSecurityDocs/app-governance-app-policies-manage.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -12,26 +12,12 @@ Use app governance to manage OAuth policies for Microsoft 365, Google Workspace,
1212
You might need to manage your app policies as follows to keep up-to-date with your organization's apps, respond to new app-based attacks, and for ongoing changes to your app compliance needs:
1313

1414
- Create new policies targeted at new apps
15-
- Change the status of an existing policy (active, inactive, audit mode)
15+
- Change the status of an existing policy (active or disable)
1616
- Change the conditions of an existing policy
1717
- Change the actions of an existing policy for auto-remediation of alerts
1818

1919
<a name='manage-oauth-app-policies-for-azure-ad'></a>
2020

21-
## Manage OAuth app policies for Microsoft Entra ID
22-
23-
Here's an example of a process for managing an existing policy for Microsoft Entra apps:
24-
25-
1. Edit the settings of the policy.
26-
27-
1. Check for expected behavior, such as alerts generated.
28-
1. If the behavior isn't expected, go back to step 1.
29-
1. If the behavior is expected, edit the policy and change its status to active (if needed).
30-
31-
For example:
32-
33-
:::image type="content" source="media/app-governance/mapg-manage-policy-process.png" alt-text="Diagram of the manage app policy workflow." lightbox="media/app-governance/mapg-manage-policy-process.png" border="false":::
34-
3521
> [!NOTE]
3622
> Following the change in the **Activity type** filter, policies with the previous filter will have a "LEGACY" label attached to the filter and if the policies are edited or deleted the filter can't be restored.
3723

0 commit comments

Comments
 (0)