Skip to content

Commit 7ecb5c6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into WI484153-manage-app-policies-remove-audit-mode
2 parents 83cf7de + 809f7ff commit 7ecb5c6

File tree

5 files changed

+19
-15
lines changed

5 files changed

+19
-15
lines changed

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: how-to
55
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
2324

2425
For example:
2526

26-
![Screenshot of the app governance policies summary page in Microsoft Defender XDR.](media/app-governance-app-policies-get-started/azure-ad-policies.jpg)
27+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
2728

2829
> [!NOTE]
2930
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
3031
>
3132
3233
## What’s available on the app policies dashboard
3334

34-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35+
The **App governance** > **Policies** tab shows the number of active and disabled policies, and the following information for each policy:
3536

3637
- **Policy name**
3738
- **Status**
3839

3940
- **Active**: All policy evaluation and actions are active.
40-
- **Inactive**: All policy evaluation and actions are disabled.
41-
- **Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41+
- **Disabled**: All policy evaluation and actions are disabled.
4242

4343
- **Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
4444
- **Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
7474

7575
1. Select **Edit**.
7676

77-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
7878

7979
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
8080

81-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82+
83+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
8284

8385
1. Choose whether to modify the existing conditions of the policy.
8486

8587
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
8688
- Otherwise, select **Use existing conditions of the policy**.
8789

88-
When you're done, select **Next**.
90+
1. When you're done, select **Next**.
8991

9092
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
9193

92-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
9395

9496
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
9597

CloudAppSecurityDocs/app-governance-detect-remediate-get-started.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance threat detection and remediation | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: overview
55
description: Get started with app governance threat detection and remediation in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app threat detection and remediation
@@ -13,7 +14,8 @@ To view the latest incidents associated with these alerts, go to the **App gover
1314

1415
For example:
1516

16-
:::image type="content" source="media/app-governance/mapg-cc-overview-alerts.png" alt-text="Screenshot of the App governance > Overview tab with the Latest alerts section highlighted." lightbox="media/app-governance/mapg-cc-overview-alerts.png":::
17+
:::image type="content" source="media/app-governance/app-governance-overview.png" alt-text="Screenshot that shows the App Governance overview tab." lightbox="media/app-governance/app-governance-overview.png":::
18+
1719

1820
On the **Overview** tab, the **Latest alerts** section lists the most recent alerts. You can use these recent alerts to quickly see the current app alert activity for your tenant.
1921

329 KB
Loading
383 KB
Loading

defender-endpoint/onboard-client.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/16/2025
17+
ms.date: 09/07/2025
1818
---
1919

2020
# Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint
@@ -37,15 +37,15 @@ To onboard client devices running Windows or macOS, follow this general process:
3737

3838
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
3939

40-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
4141

42-
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
42+
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint." lightbox="media/mde-device-onboarding-ui.png":::
4343

4444
3. Under **Select operating system to start onboarding process**, select the operating system for the device.
4545

4646
4. Under **Connectivity type**, select either **Streamlined** or **Standard**. (See [prerequisites for streamlined connectivity](/defender-endpoint/configure-device-connectivity#prerequisites).)
4747

48-
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there is one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
48+
5. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there's one available). Follow the instructions to onboard your devices. The following table lists available deployment methods:
4949

5050
|Operating system | Deployment method |
5151
|---|---|

0 commit comments

Comments
 (0)