You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-authentication-application.md
+40-33Lines changed: 40 additions & 33 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,37 +28,43 @@ This article explains how to create a Microsoft Entra application, get an access
28
28
1. To enable your app to access Defender for Cloud Apps and assign it **'Read all alerts'** permission, on your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **Microsoft Cloud App Security**, and then select **Microsoft Cloud App Security**.
29
29
30
30
> [!NOTE]
31
-
> *Microsoft Cloud App Security*does not appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
31
+
> *Microsoft Cloud App Security*doesn't appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
32
32
33
-

34
33
35
-
- Select **Application permissions** > **Investigation.Read**, and then select **Add permissions**.
34
+
:::image type="content" source="media/api-authentication-application/add-app-permissions.png" alt-text="Screenshot showing how to configure API permissions for your application." lightbox="media/api-authentication-application/add-app-permissions.png":::
36
35
37
-
:::image type="content" source="media/application-permissions.png" alt-text="Screenshot of adding app permission." lightbox="media/application-permissions.png":::
38
36
39
-
You need to select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
37
+
1. Select **Application permissions** > **Investigation.Read**, and then select **Add permissions**.
40
38
41
-
- To determine which permission you need, look at the **Permissions** section in the API you're interested to call.
39
+
:::image type="content" source="media/api-authentication-application/request-permissions.png" alt-text="Screenshot that shows which API permissions to request for your application." lightbox="media/api-authentication-application/request-permissions.png":::
40
+
41
+
1. You need to select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
42
+
43
+
1. To determine which permission you need, look at the **Permissions** section in the API you're interested to call.
42
44
43
45
1. Select **Grant admin consent**.
44
46
45
47
> [!NOTE]
46
48
> Every time you add a permission, you must select **Grant admin consent** for the new permission to take effect.
47
49
48
-

49
50
50
-
1. To add a secret to the application, select **Certificates & secrets**, select **New client secret**, add a description to the secret, and then select **Add**.
51
+
:::image type="content" source="media/api-authentication-application/grant-consent.png" alt-text="Screenshot that shows the option to grant admin consent." lightbox="media/api-authentication-application/grant-consent.png":::
52
+
53
+
54
+
1. To add a secret to the application, select **Certificates & secrets**, select **New client secret**. Add a description to the secret, and then select **Add**.
51
55
52
56
> [!NOTE]
53
57
> After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve this value after you leave.
54
58
55
-

59
+
:::image type="content" source="media/api-authentication-application/webapp-create-key2.png" alt-text="Screenshot that shows how to create an app key." lightbox="media/api-authentication-application/webapp-create-key2.png":::
60
+
56
61
57
62
1. Write down your application ID and your tenant ID. On your application page, go to **Overview** and copy the **Application (client) ID** and the **Directory (tenant) ID**.
58
63
59
-

64
+
:::image type="content" source="media/api-authentication-application/app-and-tenant-ids.png" alt-text="Screenshot that shows the created app ID." lightbox="media/api-authentication-application/app-and-tenant-ids.png":::
60
65
61
-
1.**For Microsoft Defender for Cloud Apps Partners only**. Set your app to be multitenanted (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multitenanted:
66
+
67
+
1.**For Microsoft Defender for Cloud Apps Partners only**. Set your app to be multitenant (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multitenant:
62
68
63
69
- Go to **Authentication**, and add `https://portal.azure.com` as the **Redirect URI**.
64
70
@@ -161,45 +167,46 @@ See [Microsoft Authentication Library (MSAL) for Python](https://github.com/Azur
161
167
1. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your app to access Defender for Cloud Apps.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/api-authentication-user.md
+27-21Lines changed: 27 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,8 @@ In general, you need to take the following steps to use the APIs:
25
25
This page explains how to create a Microsoft Entra application, get an access token to Microsoft Defender for Cloud Apps and validate the token.
26
26
27
27
>[!NOTE]
28
-
> When accessing Microsoft Defender for Cloud Apps API on behalf of a user, you will need the correct Application permission and user permission.
29
-
> If you are not familiar with user permissions on Microsoft Defender for Cloud Apps, see [Manage admin access](manage-admins.md).
28
+
> When accessing Microsoft Defender for Cloud Apps API on behalf of a user, you'll need the correct Application permission and user permission.
29
+
> If you aren't familiar with user permissions on Microsoft Defender for Cloud Apps, see [Manage admin access](manage-admins.md).
30
30
31
31
>[!TIP]
32
32
> If you have the permission to perform an action in the portal, you have the permission to perform the action in the API.
@@ -57,31 +57,37 @@ This page explains how to create a Microsoft Entra application, get an access to
57
57
58
58
1. Allow your Application to access Microsoft Defender for Cloud Apps and assign it 'Read alerts' permission:
59
59
60
-
- On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** > type *Microsoft Cloud App Security* and then select **Microsoft Cloud App Security**.
60
+
1. On your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** > type *Microsoft Cloud App Security* and then select **Microsoft Cloud App Security**.
61
61
62
-
-**Note**: *Microsoft Cloud App Security* doesn't appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
62
+
> [!NOTE]
63
+
> *Microsoft Cloud App Security* doesn't appear in the original list. Start writing its name in the text box to see it appear. Make sure to type this name, even though the product is now called Defender for Cloud Apps.
63
64
64
-

65
+
:::image type="content" source="media/add-permission.png" alt-text="Screenshot that shows how to add permissions.":::

69
+
:::image type="content" source="media/application-permissions-public-client.png" alt-text="Screenshot showing how to add application permissions.":::
69
70
70
-
-**Important note**: Select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
71
71
72
-
- To determine which permission you need, view the **Permissions** section in the API you're interested to call.
72
+
> [!NOTE]
73
+
> Select the relevant permissions. **Investigation.Read** is only an example. For other permission scopes, see [Supported permission scopes](#supported-permission-scopes)
73
74
74
-
- Select **Grant admin consent**
75
+
1. To determine which permission you need, view the **Permissions** section in the API you're interested to call.
75
76
76
-
**Note**: Every time you add permission you must select **Grant admin consent** for the new permission to take effect.
77
+
1. Select **Grant admin consent**
77
78
78
-

79
+
> [!NOTE]
80
+
> Every time you add permission you must select **Grant admin consent** for the new permission to take effect.
79
81
80
-
1. Write down your application ID and your tenant ID:
82
+
:::image type="content" source="media/api-authentication-application/grant-consent.png" alt-text="Screenshot that shows the option to grant admin consent." lightbox="media/api-authentication-application/grant-consent.png":::
81
83
82
-
- On your application page, go to **Overview** and copy the following information:
83
84
84
-

85
+
1. Write down your application ID and your tenant ID.
86
+
87
+
1. On your application page, go to **Overview** and copy the following information:
88
+
89
+
:::image type="content" source="media/api-authentication-application/app-and-tenant-ids.png" alt-text="Screenshot that shows the created app ID." lightbox="media/api-authentication-application/app-and-tenant-ids.png":::
90
+
85
91
86
92
## Supported permission scopes
87
93
@@ -152,19 +158,19 @@ namespace MDA
152
158
153
159
Verify to make sure you got a correct token:
154
160
155
-
- Copy/paste into [JWT](https://jwt.ms) the token you got in the previous step in order to decode it
156
-
- Validate that you get a 'scp' claim with the desired app permissions
161
+
- Copy/paste into [JWT](https://jwt.ms) the token you got in the previous step in order to decode it.
162
+
- Validate that you get a 'scp' claim with the desired app permissions.
157
163
- In the screenshot below you can see a decoded token acquired from the app in the tutorial:
158
164
159
-

165
+
:::image type="content" source="media/api-authentication-application/webapp-decoded-token.png" alt-text="Screenshot that shows the decoded token.":::
160
166
161
167
## Use the token to access the Microsoft Defender for Cloud Apps API
162
168
163
169
- Choose the API you want to use. For more information, see [Defender for Cloud Apps API](api-introduction.md).
164
-
- Set the Authorization header in the HTTP request you send to "Bearer {token}" (Bearer is the Authorization scheme)
165
-
- The Expiration time of the token is 1 hour (you can send more than one request with the same token)
170
+
- Set the Authorization header in the HTTP request you send to "Bearer {token}" (Bearer is the Authorization scheme).
171
+
- The Expiration time of the token is 1 hour (you can send more than one request with the same token).
166
172
167
-
- Example of sending a request to get a list of alerts **using C#**
173
+
- Example of sending a request to get a list of alerts **using C#**:
Copy file name to clipboardExpand all lines: defender-office-365/submissions-admin.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -829,7 +829,7 @@ The analysis results of the reported item are shown in the details flyout that o
829
829
If an override or policy configuration was found, the result should be available in several minutes. If there wasn't a problem in email authentication or delivery wasn't affected by an override or policy, the detonation and feedback from graders could take up to a day.
830
830
831
831
> [!NOTE]
832
-
> AI-powered Submissions Response capability introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
832
+
> **Currently in Preview**, AI-powered Submissions Response capability introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
833
833
834
834
### Actions for admin submissions in Defender for Office 365
0 commit comments