You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovered-apps.md
+17-11Lines changed: 17 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ This procedure describes how to get an initial, general picture of your cloud di
23
23
24
24
For example:
25
25
26
-
:::image type="content" source="media/cloud-discovery-dashboard.png" alt-text="Screenshot of the Cloud discovery dashboard":::
26
+
:::image type="content" source="media/cloud-discovery-dashboard.png" alt-text="Screenshot of the Cloud discovery dashboard" lightbox="media/cloud-discovery-dashboard.png":::
27
27
28
28
Supported apps include Windows and macOS apps, which are both listed under the **Defender - managed endpoints** stream.
29
29
@@ -57,7 +57,8 @@ For example, if you want to identify commonly used, risky cloud storage and coll
57
57
58
58
1. Set the **Security risk factor** for **Data at rest encryption** equals **Not supported**. Then set **Risk score** equals 6 or lower.
59
59
60
-

60
+
61
+
:::image type="content" source="media/discovered-app-filters.png" alt-text="Screenshot of discovered app filters." lightbox="media/discovered-app-filters.png":::
61
62
62
63
After the results are filtered, [unsanction and block](governance-discovery.md) them by using the bulk action checkbox to unsanction them all in one action. Once they're unsanctioned, use a blocking script to block them from being used in your environment.
63
64
@@ -83,11 +84,13 @@ For example, if a large amount of data is uploaded, discover what resource it's
83
84
84
85
1. In the Microsoft Defender portal, under **Cloud Apps**, select **Cloud discovery**. Then choose the **Discovered resources** tab.
85
86
86
-

87
+
:::image type="content" source="media/discovered-resources-menu.png" alt-text="Screenshot that shows the discovered resources menu." lightbox="media/discovered-resources-menu.png":::
87
88
88
89
1. In the **Discovered resources** page, drill down into each resource to see what kinds of transactions occurred, who accessed it, and then drill down to investigate the users even further.
89
90
90
-

91
+
92
+
:::image type="content" source="media/discovery-resources.png" alt-text="Screenshot that shows a list of discovered resources.":::
93
+
91
94
92
95
1. For custom apps, select the options menu at the end of the row and then select **Add new custom app**. This opens the **Add this app** dialog, where you can name and identify the app so it can be included in the cloud discovery dashboard.
93
96
@@ -104,7 +107,7 @@ The best way to get an overview of Shadow IT use across your organization is by
104
107
1. Optionally, change the report name, and then select **Generate**.
105
108
106
109
> [!NOTE]
107
-
> The executive summary report is revamped to a 6-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
110
+
> The executive summary report is revamped to a six-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
108
111
109
112
## Exclude entities
110
113
@@ -118,10 +121,12 @@ If you have system users, IP addresses, or devices that are noisy but uninterest
118
121
119
122
1. Add a user alias, IP address, or device name. We recommend adding information about why the exclusion was made.
120
123
121
-

124
+
:::image type="content" source="media/exclude-user.png" alt-text="Screenshot that shows the option to exclude users from the Cloud Discovery report." lightbox="media/exclude-user.png":::
125
+
122
126
123
127
>[!NOTE]
124
-
>All entity exclusions apply to newly received data only. Historical data of the excluded entities remains through the retention period (90 days).
128
+
> - All entity exclusions apply to newly received data only. Historical data of the excluded entities remains through the retention period (90 days).
129
+
> - Entity exclusion is only supported for the Global report stream. Entities from Microsoft Defender for Endpoint and the Cloud App Security proxy stream aren't supported for exclusion.
125
130
126
131
## Manage continuous reports
127
132
@@ -141,10 +146,11 @@ Custom continuous reports provide you with more granularity when monitoring your
141
146
142
147
1. Set the filters you want on the data. These filters can be **User groups**, **IP address tags**, or **IP address ranges**. For more information on working with IP address tags and IP address ranges, see [Organize the data according to your needs](ip-tags.md).
143
148
144
-

149
+
150
+
:::image type="content" source="media/create-custom-continuous-report.png" alt-text="Screenshot that shows how to create a continuous report.":::
145
151
146
152
> [!NOTE]
147
-
> All custom reports are limited to a maximum of 1 GB of uncompressed data. If there is more than 1 GB of data, the first 1 GB of data will be exported into the report.
153
+
> All custom reports are limited to a maximum of 1 GB of uncompressed data. If there's more than 1 GB of data, the first 1 GB of data will be exported into the report.
148
154
149
155
## Deleting cloud discovery data
150
156
@@ -166,10 +172,10 @@ We recommend deleting cloud discovery data in the following cases:
166
172
167
173
1. Select the **Delete** button.
168
174
169
-

175
+
:::image type="content" source="media/delete-data.png" alt-text="Screenshot of deleting cloud discovery data." lightbox="media/delete-data.png":::
170
176
171
177
> [!NOTE]
172
-
> The deletion process takes a few minutes and is not immediate.
178
+
> The deletion process takes a few minutes and isn't immediate.
0 commit comments