Skip to content

Commit 6b8a029

Browse files
authored
Merge branch 'main' into sentinel-azure-sunset
2 parents f2bff3b + a1a881d commit 6b8a029

File tree

7 files changed

+62
-20
lines changed

7 files changed

+62
-20
lines changed
Lines changed: 51 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,35 +1,74 @@
11
---
22
title: DLP content inspection
33
description: This article describes the process Defender for Cloud Apps follows when performing DLP content inspection on data in your cloud.
4-
ms.date: 01/29/2023
4+
ms.date: 06/26/2025
55
ms.topic: how-to
66
---
77
# DLP content inspection in Microsoft Defender for Cloud Apps
88

99

10+
Data loss prevention (DLP) in Microsoft Defender for Cloud Apps uses content inspection to detect sensitive information in files. When content inspection is enabled, Defender for Cloud Apps analyzes files for text patterns defined by expressions. Text that meets these expressions is treated as a match and can be used to determine a policy violation.
1011

11-
If you enable content inspection, you can choose to use preset expressions or to search for other customized expressions.
12+
You can use preset or custom expressions and define a threshold for when a match constitutes a violation. For example, you can set a threshold of 10 to alert when a file contains at least 10 credit card numbers.
1213

13-
You can specify a regular expression to exclude a file from the results. This option is highly useful if you have an inner classification keyword standard that you want to exclude from the policy.
14+
Matched text is replaced with "X" characters, and the surrounding context (100 characters before and after the match) is masked. Numbers in the context are replaced with "#" and aren't stored. To expose the final four digits of a match, enable the **Unmask the last four characters of a match** setting in the file policy.
1415

15-
You can decide set the minimum number of content violations that you want to match before the file is considered a violation. For example, you can choose 10 if you want to be alerted on files with at least 10 credit card numbers found within its content.
16+
You can also define which file elements are inspected—content, metadata, or file name. By default, inspection applies to both content and metadata. This approach allows inspection of protected files, detection of sensitive data, enforcement of compliance, and application of governance controls, while reducing false positives and aligning enforcement with internal classification standards.
17+
18+
## Prerequisites
19+
20+
To inspect encrypted files, and enable scanning of labels a [Global Administrator](/entra/identity/enterprise-apps/configure-admin-consent-workflow) must first grant one‑time admin consent to Defender for Cloud Apps in Microsoft Entra ID.
21+
22+
To do this, in the Defender portal go to **Settings > Cloud Apps > Microsoft Information Protection > Inspect protected files**, and select **Grant permission**.
1623

17-
When content is matched against the selected expression, the violation text is replaced with "X" characters. By default, violations are masked and shown in their context displaying 100 characters before and after the violation. Numbers in the context of the expression are replaced with "#" characters and are never stored within Defender for Cloud Apps. When creating a file policy, if you've enabled an inspection method, then you can select the option to **Unmask the last four characters of a match** to unmask the last four characters of the violation itself. It's necessary to set which data types the regular expression searches: content, metadata and/or file name. By default it searches the content and the metadata.
1824

1925
## Content inspection for protected files
2026

21-
Defender for Cloud Apps allows admins to grant Defender for Cloud Apps permission to decrypt encrypted files and scan their content for violations. This consent is also required to enable scanning labels on encrypted files.
27+
Once consent is granted, Defender for Cloud Apps provisions the Microsoft Cloud App Security (Internal) app in your tenant. The app uses the Azure Rights Management Services > Content.SuperUser permission to decrypt and inspect protected files.
28+
29+
The following app IDs apply based on your Microsoft cloud environment:
30+
31+
**App IDs**
32+
33+
| Environment | App ID |
34+
|--------------|---------|
35+
| Public | 25a6a87d-1e19-4c71-9cb0-16e88ff608f1 |
36+
| Fairfax | bd5667e4-0484-4262-a9db-93faa0893899 |
37+
| GCCM | 23105e90-1dfc-497a-bb5d-8b18a44ba061 |
38+
39+
>[!NOTE]
40+
>App IDs are internal service principals used by Defender for Cloud Apps in Public, Fairfax, and GCC‑M environments to inspect and enforce DLP policies on protected files.
41+
>Don't remove or disable these App IDs. Doing so breaks inspection and prevent DLP policies from applying to protected files.
42+
>Always verify that the App ID for your environment is present and enabled.
43+
44+
## Configure Microsoft Information Protection settings
2245

2346
In order to give Defender for Cloud Apps the necessary permissions:
2447

25-
1. Go to **Settings** and then **Microsoft Information Protection**.
26-
2. Under **Inspect protected files**, select **Grant permission** to grant Defender for Cloud Apps permission in Microsoft Entra ID.
27-
3. Follow the prompt to allow the required permissions in Microsoft Entra ID.
28-
4. You can configure the settings per file policy to determine which policies will scan protected files.
48+
1. Go to **Settings** > **Microsoft Information Protection**.
49+
1. Under **Microsoft Information Protection settings**, configure one or both of the following options:
50+
51+
- **Automatically scan new files for Microsoft Information Protection sensitivity labels and content inspection warnings.** When enabled, the App connector scans new files for embedded sensitivity labels from Microsoft Information Protection.
52+
53+
- **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant.** When enabled, only sensitivity labels applied within your tenant are scanned. Labels applied by external tenants are disregarded.
54+
55+
1. After selecting your options, select **Save** to apply your changes.
56+
57+
## Configure file policies for protected files
58+
59+
1. In the Defender portal, go to **Settings > Cloud Apps > Policies > Policy management**.
60+
1. Follow the steps to [create a new file policy](data-protection-policies.md#create-a-new-file-policy).
61+
1. Select either **Apply to all files**, or **Apply to selected files** to specify which files to scan. This option is useful if you have an inner classification keyword standard that you want to exclude from the policy.
62+
1. Select **Inspection method** > **Data Classification Service** to enable content inspection for the policy.
63+
1. Check both boxes - **Inspect protected files** and **Unmask the last 4 characters of a match**.
64+
65+
:::image type="content" source="media/content-inspection/inspection-method-data-classification-service.png" alt-text="Screenshot that shows the Data classification service inspection method.":::
66+
2967

3068
## Next steps
3169

32-
> [!div class="nextstepaction"]
33-
> [Control cloud apps with policies](control-cloud-apps-with-policies.md)
70+
- [Tutorial: Discover and protect sensitive information in your organization](tutorial-dlp.md)
71+
- [Learn how to control cloud apps using policies](control-cloud-apps-with-policies.md)
72+
- [Integrate with Microsoft Purview for information protection](azip-integration.md)
3473

3574
[!INCLUDE [Open support ticket](includes/support.md)]
28.5 KB
Loading

CloudAppSecurityDocs/protect-box.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ In addition to monitoring for potential threats, you can apply and automate the
4747

4848
| Type | Action |
4949
| ---- | ---- |
50-
| Data governance | - Change shared link access level on folders<br />- Put folders in admin quarantine<br />- Put folders in user quarantine<br />- Remove a collaborator from folders<br />- Remove direct shared links on folders<br />- Remove external collaborators on folders<br />- Send DLP violation digest to file owners<br />- Send violation digest to last file editor<br />- Set expiration date to a folder shared link<br /> - Trash folder |
50+
| Data governance | - Change shared link access level on folders<br />- Put folders in admin quarantine<br />- Put folders in user quarantine<br />- Remove a collaborator from folders<br />- Remove direct shared links on folders<br/> - Send policy-match digest to file owners<br />- Send violation digest to last file editor<br />- Set expiration date to a folder shared link<br /> - Trash folder |
5151
| User governance | - Suspend user<br />- Notify user on alert (via Microsoft Entra ID)<br />- Require user to sign in again (via Microsoft Entra ID)<br />- Suspend user (via Microsoft Entra ID) |
5252

5353
For more information about remediating threats from apps, see [Governing connected apps](governance-actions.md).

defender-endpoint/mac-preferences.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/21/2025
18+
ms.date: 07/01/2025
1919
---
2020

2121
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -995,6 +995,8 @@ The following templates contain entries for all settings described in this docum
995995
<dict>
996996
<key>enforcementLevel</key>
997997
<string>real_time</string>
998+
<key>behaviorMonitoring</key>
999+
<string>enabled</string>
9981000
<key>scanAfterDefinitionUpdate</key>
9991001
<true/>
10001002
<key>scanArchives</key>

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: article
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/03/2025
17+
ms.date: 07/01/2025
1818
---
1919

2020
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -50,7 +50,7 @@ The following table gives information about the supported Microsoft Defender for
5050
|[Passive Mode](microsoft-defender-antivirus-compatibility.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
5151
|Sense detection sensor|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
5252
|[Endpoint & network device discovery](device-discovery.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <br/>(See note below) |![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
53-
|[Vulnerability management](/defender-vulnerability-management/defender-vulnerability-management)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <br/>(preview)|
53+
|[Vulnerability management](/defender-vulnerability-management/defender-vulnerability-management)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <br/>|
5454
|**Response** | | | ||
5555
|[Automated Investigation & Response (AIR)](automated-investigations.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
5656
|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
@@ -64,8 +64,8 @@ The following table gives information about the supported Microsoft Defender for
6464
> - For Windows Server 2012 R2 and Windows Server 2016, use the modern, unified solution. See [Onboard Windows Servers to the Defender for Endpoint service](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2).
6565
> - On Linux Server, network protection, web protection, and custom network indicators are currently in preview.
6666
> - On Linux, network protection, web protection, and custom network indicators are currently in preview.
67-
> - Endpoint & network device discovery is supported on Windows Server 2019 or later, and on Windows 10 and Windows 11.
68-
> - Microsoft Defender Vulnerability Management is not supported on Rocky and Alma currently.
67+
> - Endpoint & network device discovery is supported on Windows Server 2019 or later, and on Windows 10 and Windows 11.
6968
> - For Windows 7, Windows 8.1, and Windows Server 2008 R2, use [MMA](/defender-endpoint/onboard-downlevel#install-and-configure-microsoft-monitoring-agent-mma) for the EDR sensor and [System Center Endpoint Protection](/defender-endpoint/onboard-downlevel#configure-and-update-system-center-endpoint-protection-clients) (SCEP) for antivirus protection.
7069
70+
7171
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 05/19/2025
11+
ms.date: 7/1/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -47,6 +47,8 @@ For more information on what's new with other Microsoft Defender security produc
4747

4848
For more information, see [MC1096885](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC1096885).
4949

50+
- AI-powered Submissions Response introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
51+
5052
## May 2025
5153

5254
- In government cloud environments, :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** replaces the **Message actions** drop down list on the **Email** tab (view) of the details area of the **All email**, **Malware**, or **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):

unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@ The following table shows how the family names map to the threat actors that we
4646

4747
|Threat actor category|Type|Family name|
4848
|:---|:---|:---|
49-
|Nation-state|China<br>Iran<br>Lebanon<br>North Korea<br>Russia<br>South Korea<br>Türkiye<br>Vietnam|Typhoon<br>Sandstorm<br>Rain<br>Sleet<br>Blizzard<br>Hail<br>Dust<br>Cyclone|
5049
|Nation-state|China<br>Germany<br>India<br>Iran<br>North Korea<br>Lebanon<br>Pakistan<br>Palestinian Authority<br>Russia<br>Singapore<br>South Korea<br>Spain<br>Syria<br>Türkiye<br>Ukraine<br>United States<br>Vietnam|Typhoon<br>Gale<br>Monsoon<br>Sandstorm<br>Sleet<br>Rain<br>Whirlwind<br>Lightning<br>Blizzard<br>Squall<br>Hail<br>Derecho<br>Haze<br>Dust<br>Frost<br>Tornado<br>Cyclone|
5150
|Financially motivated|Financially motivated|Tempest|
5251
|Private sector offensive actors|PSOAs|Tsunami|

0 commit comments

Comments
 (0)