Skip to content

Commit 7037440

Browse files
authored
Merge branch 'main' into patch-2
2 parents ca9dce1 + 1d116c4 commit 7037440

File tree

5 files changed

+9
-65
lines changed

5 files changed

+9
-65
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

CloudAppSecurityDocs/connector-platform.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 04/28/2025
4+
ms.date: 05/05/2025
55
ms.topic: how-to
66
---
77

@@ -97,6 +97,7 @@ Defender for Cloud Apps supports the following ServiceNow versions:
9797
- Kingston
9898
- London
9999
- Utah
100+
- Yokohama
100101
:::column-end:::
101102
:::column:::
102103
- Madrid

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ items:
6262
- name: Overview
6363
displayName: connect apps
6464
href: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
65-
- name: Custom connectors with the open app connector platform
66-
href: ./connector-platform.md
6765
- name: Asana
6866
href: protect-asana.md
6967
- name: Atlassian

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ In Microsoft 365 organizations with mailboxes in Exchange Online or standalone E
3434

3535
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
3636

37-
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
37+
Entries for **Domains and email addresses** and **Spoofed senders** apply to messages from both internal and external senders. Special handling applies to internal spoofing scenarios. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

3939
The Tenant Allow/Block list is available in the Microsoft Defender portal at <https://security.microsoft.com> **Email & collaboration** \> **Policies & rules** \> **Threat Policies** \> **Rules** section \> **Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
4040

0 commit comments

Comments
 (0)