Skip to content

Commit 6a80a0d

Browse files
authored
Merge pull request #3206 from LeorHurwitz/patch-14
Update protect-office-365.md
2 parents 6d28658 + e82b60d commit 6a80a0d

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

CloudAppSecurityDocs/protect-office-365.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,8 @@ Defender for Cloud Apps integrates directly with [Microsoft 365's audit logs](/m
9696
- Events from **Exchange**, **Power BI**, and **Teams** will only appear after activities from those services are detected in the portal.
9797

9898

99-
- [Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive
99+
- [Multi-geo deployments](/microsoft-365/enterprise/microsoft-365-multi-geo) are only supported for OneDrive.
100+
- Events from **Exchange** reflect the actor, which is either the application or the user, that performed the action.
100101

101102
### Microsoft Entra integration
102103

@@ -153,12 +154,12 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
153154
1. After Microsoft 365 is displayed as successfully connected, select **Done**.
154155
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
155156

156-
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157+
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
157158

158-
> [!NOTE]
159-
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
159+
> [!NOTE]
160+
> After connecting Microsoft 365, you will see data from a week back including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that weren't pulling APIs prior to connection, you see events from the moment you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that had been off by default.
160161
161-
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
162+
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
162163

163164
## Next steps
164165

0 commit comments

Comments
 (0)