Skip to content

Commit 7323de1

Browse files
Merge branch 'main' into patch-19
2 parents 619c031 + 5123835 commit 7323de1

File tree

3 files changed

+11
-7
lines changed

3 files changed

+11
-7
lines changed

CloudAppSecurityDocs/applications-inventory.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,17 @@ description: The new Applications page located under Assets in Microsoft Defende
77
---
88
# Applications inventory (Preview)
99

10-
Protecting your SaaS ecosystem requires taking inventory of all SaaS and OAuth connected apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Defender for Cloud apps Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and connected OAuth apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
1111
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
1212

13-
The Application page includes the following tabs:
13+
The Applications page includes the following tabs:
1414

1515
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16-
* OAuth apps: Displays a list of OAuth apps such as Microsoft Entra ID, Google workspace and Salesforce.
16+
* OAuth apps: A comprehensive view of OAuth apps registered on Microsoft Entra ID, Google workspace and Salesforce. This tab highlights OAuth apps metadata, publisher info and app origin, permissions used, data accessed and other insights.
1717

1818
## Navigate to the Applications page
1919

20-
In the Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Applications**. Or, to go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** > **Applications**. Or, go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
2121

2222
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
2323

CloudAppSecurityDocs/protect-zoom.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Connect Zoom | Microsoft Defender for Cloud Apps
33
description: This article provides information about how to connect your Zoom environment to Defender for Cloud Apps using the API connector for visibility and control over use.
4-
ms.date: 06/18/2023
4+
ms.date: 03/04/2025
55
ms.topic: how-to
66
---
77

@@ -20,7 +20,7 @@ To see security posture recommendations for Zoom in Microsoft Secure Score, crea
2020
For example, recommendations for Zoom include:
2121

2222
- *Enable multi-factor authentication (MFA)*
23-
- *Enable session timeout for web users*
23+
- Enable session timeout for web users
2424
- *Enforce end to end encryption in all Zoom meetings*
2525

2626
If a connector already exists and you don't see Zoom recommendations yet, refresh the connection by disconnecting the API connector, and then reconnecting it with the `“account:read:admin`, `chat_channel:read:admin` and `user:read:admin”` permissions.
@@ -39,6 +39,11 @@ Before connecting Zoom to Defender for Cloud Apps, make sure that you have the f
3939

4040
The admin account is used only for initial consent while connecting Zoom to Defender for Cloud Apps. Defender for Cloud Apps uses an OAuth app for daily transactions.
4141

42+
>[!NOTE]
43+
> The authentication mechanism utilized in the Zoom connector doesn't support two separate connectors utilizing the same user credentials.<br>
44+
>
45+
> When a new instance with an existing authentication token is used, this revokes the old connector token and will cause a "Bad credentials" error.
46+
4247
## How to connect Zoom to Defender for Cloud Apps
4348

4449
1. Sign into Zoom as an account owner or admin.

CloudAppSecurityDocs/release-notes.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,6 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2222

2323
## April 2025
2424

25-
2625
### OAuthAppInfo table added to Defender XDR advanced hunting (Preview)
2726

2827
The [OAuthAppInfo](/defender-xdr/advanced-hunting-oauthappinfo-table) table is now available in Defender XDR advanced hunting, enabling security teams to explore and analyze OAuth app-related metadata with enhanced visibility.

0 commit comments

Comments
 (0)