Skip to content

Commit 6733769

Browse files
authored
Update release-notes.md
1 parent 1d3b68d commit 6733769

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,13 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## November 2024
2323

24+
### Internal Session Controls application notice
25+
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
26+
Please ensure there is no CA policy restricting access to this application.
27+
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
28+
29+
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
30+
2431
### Defender for Cloud Apps support for Graph API (preview)
2532

2633
Defender for Cloud Apps customers can now query data about discovered apps via the Graph API. Use the Graph API to customize views and automate flows on the **Discovered apps** page, such as applying filters to view specific data. The API supports [GET](/graph/use-the-api) capabilities only.
@@ -63,13 +70,6 @@ For more information, see [OAuth app data usage insights on app governance](/def
6370

6471
## October 2024
6572

66-
### Internal Session Controls application notice
67-
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
68-
Please ensure there is no CA policy restricting access to this application.
69-
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
70-
71-
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
72-
7373
### New anomaly data in advanced hunting CloudAppEvents table
7474

7575
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.

0 commit comments

Comments
 (0)