Skip to content

Commit 72a1401

Browse files
committed
Add lightboxes to aid readability, adjust spacing
1 parent 7db9494 commit 72a1401

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

CloudAppSecurityDocs/use-case-admin-quarantine.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ ms.topic: tutorial
77

88
# Tutorial: Protect files with admin quarantine
99

10-
11-
1210
[File policies](data-protection-policies.md) are a great tool for finding threats to your information protection policies. For instance, create file policies that find places where users stored sensitive information, credit card numbers, and third-party ICAP files in your cloud.
1311

1412
In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to detect unwanted files stored in your cloud that leave you vulnerable, and take immediate action to stop them in their tracks and lock down the files that pose a threat by using **Admin quarantine** to protect your files in the cloud, remediate problems, and prevent future leaks from occurring.
@@ -33,27 +31,27 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
3331

3432
1. Do one of the following actions to quarantine the file:
3533

36-
- Manually apply the **Admin quarantine** action:
34+
- Manually apply the **Admin quarantine** action:
3735

38-
![quarantine action.](media/quarantine-action.png)
36+
:::image type="content" alt-text="quarantine action." source="media/quarantine-action.png" lightbox="media/quarantine-action.png":::
3937

40-
- Set it as an automated quarantine action in the policy:
38+
- Set it as an automated quarantine action in the policy:
4139

42-
![quarantine automatically.](media/quarantine-automated.png)
40+
:::image type="content" alt-text="quarantine automatically." source="media/quarantine-automated.png" lightbox="media/quarantine-automated.png":::
4341

4442
1. When **Admin quarantine** is applied, the following things occur behind the scenes:
4543

4644
1. The original file is moved to the admin quarantine folder you set.
4745
1. The original file is deleted.
4846
1. A tombstone file is uploaded to the original file location.
4947

50-
![quarantine tombstone.](media/quarantine-tombstone.png)
48+
:::image type="content" alt-text="quarantine tombstone." source="media/quarantine-tombstone.png":::
5149

5250
1. The user can only access the tombstone file. In the file, they can read the custom guidelines provided by IT and the correlation ID to give IT to release the file.
5351

5452
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
5553

56-
![Quarantined files.](media/quarantine-alerts.png)
54+
:::image type="content" alt-text="Quarantined files." source="media/quarantine-alerts.png" lightbox="media/quarantine-alerts.png":::
5755

5856
1. After a file is quarantined, use the following process to remediate the threat situation:
5957

@@ -62,7 +60,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
6260
1. If you find the file is against corporate policy, run the organization's Incident Response (IR) process.
6361
1. If you find that the file is harmless, you can restore the file from quarantine. At that point the original file is released, meaning it's copied back to the original location, the tombstone is deleted, and the user can access the file.
6462

65-
![quarantine restore.](media/quarantine-restore.png)
63+
:::image type="content" alt-text="quarantine restore." source="media/quarantine-restore.png":::
6664

6765
1. Validate that the policy runs smoothly. Then, you can use the automatic governance actions in the policy to prevent further leaks and automatically apply an Admin quarantine when the policy is matched.
6866

@@ -77,26 +75,28 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
7775

7876
1. Set file policies that detect breaches. Examples of these types of policies include:
7977

80-
- A metadata only policy such as a sensitivity label in SharePoint Online
81-
- A native DLP policy such as a policy that searches for credit card numbers
82-
- An ICAP third-party policy such as a policy that looks for Vontu
78+
- A metadata only policy such as a sensitivity label in SharePoint Online
79+
- A native DLP policy such as a policy that searches for credit card numbers
80+
- An ICAP third-party policy such as a policy that looks for Vontu
8381

8482
1. Set a quarantine location:
85-
1. For Microsoft 365 SharePoint or OneDrive for Business, you can't put files in admin quarantine as part of a policy until you set it up:
86-
![quarantine warning.](media/quarantine-warning.png)
8783

88-
To set admin quarantine settings, in the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, choose **Admin quarantine**. Provide a site for the quarantine folder location and a user notification that your user will receive when their file is quarantined.
89-
![quarantine settings.](media/quarantine-settings.png)
84+
1. For Microsoft 365 SharePoint or OneDrive for Business, you can't put files in admin quarantine as part of a policy until you set it up:
85+
86+
:::image type="content" alt-text="quarantine warning." source="media/quarantine-warning.png":::
9087

91-
> [!NOTE]
92-
> Defender for Cloud Apps will create a quarantine folder on the selected site.
88+
To set admin quarantine settings, in the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, choose **Admin quarantine**. Provide a site for the quarantine folder location and a user notification that your user will receive when their file is quarantined.
9389

94-
1. For Box, the quarantine folder location and user message can't be customized. The folder location is the drive of the admin who connected Box to Defender for Cloud Apps and the user message is: This file was quarantined to your administrator's drive because it might violate your company's security and compliance policies. Contact your IT administrator for help.
90+
:::image type="content" alt-text="quarantine settings." source="media/quarantine-settings.png" lightbox="media/quarantine-settings.png":::
91+
92+
> [!NOTE]
93+
> Defender for Cloud Apps will create a quarantine folder on the selected site.
94+
95+
1. For Box, the quarantine folder location and user message can't be customized. The folder location is the drive of the admin who connected Box to Defender for Cloud Apps and the user message is: This file was quarantined to your administrator's drive because it might violate your company's security and compliance policies. Contact your IT administrator for help.
9596

9697
## Next steps
9798

9899
> [!div class="nextstepaction"]
99100
> [Best practices for protecting your organization](best-practices.md)
100101
101102
[!INCLUDE [Open support ticket](includes/support.md)]
102-

0 commit comments

Comments
 (0)