Skip to content

Commit 829c491

Browse files
authored
Merge branch 'main' into 440863-file-policy-decryption-mda
2 parents fdeac9c + 6a2acab commit 829c491

File tree

82 files changed

+628
-140
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+628
-140
lines changed
-19 KB
Loading

ATPDocs/okta-integration.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -100,9 +100,8 @@ After assigning both roles, you can remove the Super Admin role. This ensures th
100100
1. Select **Create new role**.
101101
1. Set the role name to **Microsoft Defender for Identity**.
102102
1. Select the permissions you want to assign to this role. Include the following permissions:
103-
- **Suspend users**
104-
- **Unsuspend users**
105-
- **Clear users’ session**
103+
- **Edit user's lifecycle states**
104+
- **Edit user's authenticator operations**
106105
- **View roles, resources, and admin assignments**
107106
1. Select **Save role**.
108107

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 66 additions & 29 deletions
Large diffs are not rendered by default.

CloudAppSecurityDocs/cloud-discovery-anonymizer.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,12 @@ Key points:
1717
- Resolving usernames is done ad-hoc, per-username by deciphering a given encrypted username.
1818
- Anonymization capabilities aren't supported when using the "Defender for Cloud Apps Proxy" stream.
1919

20+
## Prerequisites
21+
22+
To resolve (deanonymize) usernames in Cloud Discovery data:
23+
24+
- You must have the [Cloud Discovery global admin](manage-admins.md#built-in-admin-roles-in-defender-for-cloud-apps) role with anonymization permissions enabled during role assignment.
25+
2026
## How data anonymization works
2127

2228
1. There are three ways to apply data anonymization:

CloudAppSecurityDocs/governance-actions.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,9 @@ The following governance actions can be taken for connected apps either on a spe
5959

6060
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint, Cisco Webex)
6161

62-
![policy_create alerts.](media/policy_create-alerts.png)
62+
:::image type="content" source="media/governance-actions/governance-actions-box.png" alt-text="Screenshot that shows the available file governance actions for Box and Dropbox." lightbox="media/governance-actions/governance-actions-box.png":::
63+
64+
6365

6466
## Malware governance actions (Preview)
6567

@@ -81,7 +83,7 @@ The following governance actions can be taken for connected apps either on a spe
8183

8284
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
8385

84-
:::image type="content" source="media/governance-actions/image1.png" alt-text="Malware governance actions.":::
86+
:::image type="content" source="media/governance-actions/governance-actions-dropbox-google-workspace.png" alt-text="Screenshot that shows malware governance actions." lightbox="media/governance-actions/governance-actions-dropbox-google-workspace.png":::
8587

8688
> [!NOTE]
8789
> In SharePoint and OneDrive, Defender for Cloud Apps supports user quarantine only for files in Shared Documents libraries (SharePoint Online) and files in the Documents library (OneDrive for Business).
245 KB
Loading
File renamed without changes.
-41.7 KB
Binary file not shown.

CloudAppSecurityDocs/release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,14 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2727
> Learn more: [Network requirements](https://aka.ms/MDANetworkDocs).
2828
2929

30+
31+
## June 2025
32+
33+
### New Dynamic Threat Detection model
34+
35+
Microsoft Defender for Cloud Apps new dynamic threat detection model continuously adapts to the ever-changing SaaS apps threat landscape. This approach ensures your organization remains protected with up-to-date detection logic without the need for manual policy updates or reconfiguration. Several legacy anomaly detection policies have already been seamlessly transitioned to this adaptive model, delivering smarter and more responsive security coverage.
36+
For more information, see [Create Defender for Cloud Apps anomaly detection policies](anomaly-detection-policy.md).
37+
3038
## May 2025
3139

3240

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1046,6 +1046,8 @@
10461046
href: respond-machine-alerts.md#restrict-app-execution
10471047
- name: Isolate devices from the network
10481048
href: respond-machine-alerts.md#isolate-devices-from-the-network
1049+
- name: Isolation exclusions
1050+
href: isolation-exclusions.md
10491051
- name: Contain devices from the network
10501052
href: respond-machine-alerts.md#contain-devices-from-the-network
10511053
- name: Contain user from the network

0 commit comments

Comments
 (0)