Skip to content

Commit 8020d5c

Browse files
authored
Merge pull request #3336 from DeCohen/WI402870-file-monitoring-access-doc-updates
added links to the articles and updated the notes message
2 parents 6464fb8 + f9df4ed commit 8020d5c

File tree

2 files changed

+6
-3
lines changed

2 files changed

+6
-3
lines changed

CloudAppSecurityDocs/get-started.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,11 @@ After you connect an app, you can gain deeper visibility so you can investigate
6161

6262
**How to page**: [Protect sensitive information with DLP policies](policies-information-protection.md)
6363

64-
**Recommended task**: Enable file monitoring and create file policies
64+
**Recommended tasks**
65+
66+
- Enable file monitoring and create file policies
67+
68+
- To enable File monitoring of Microsoft 365 files, you are required to use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
6569

6670
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**.
6771
1. Under **Information Protection**, select **Files**.
@@ -70,8 +74,6 @@ After you connect an app, you can gain deeper visibility so you can investigate
7074
1. Select the required settings and then select **Save**.
7175
1. In [Step 3](#step-3-control-cloud-apps-with-policies), create [File policies](data-protection-policies.md) to meet your organizational requirements.
7276

73-
> [!TIP]
74-
> You can view files from your connected apps by browsing to **Cloud Apps** > **Files** in the Microsoft Defender Portal.
7577

7678
**Migration recommendation**
7779
We recommend using Defender for Cloud Apps sensitive information protection in parallel with your current Cloud Access Security Broker (CASB) solution. Start by [connecting the apps you want to protect](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md) to Microsoft Defender for Cloud Apps. Since API connectors use out-of-band connectivity, no conflict will occur. Then progressively migrate your [policies](control-cloud-apps-with-policies.md) from your current CASB solution to Defender for Cloud Apps.

CloudAppSecurityDocs/manage-admins.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Microsoft Defender for Cloud Apps supports role-based access control. This artic
2020
>
2121
> - Microsoft 365 and Microsoft Entra roles aren't listed in the Defender for Cloud Apps **Manage admin access** page. To assign roles in Microsoft 365 or Microsoft Entra ID, go to the relevant RBAC settings for that service.
2222
> - Defender for Cloud Apps uses Microsoft Entra ID to determine the user's [directory level inactivity timeout setting](/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin). If a user is configured in Microsoft Entra ID to never sign out when inactive, the same setting will apply in Defender for Cloud Apps as well.
23+
> - Defender for Cloud Apps Information Protection enablement requires an Entra Admin ID, such as: Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference) and [Protect your Microsoft 365 environment](/defender-cloud-apps/protect-office-365)
2324
2425
By default, the following Microsoft 365 and [Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) admin roles have access to Defender for Cloud Apps:
2526

0 commit comments

Comments
 (0)