You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## August 2025
27
27
28
+
### Microsoft Entra ID risk level is now available in near real time in Microsoft Defender for Identity (Preview)
29
+
30
+
Entra ID risk level is now available on the Identity Inventory assets page, the identity details page, and in the IdentityInfo table in Advanced Hunting, and includes the Entra ID risk score. SOC analysts can use this data to correlate risky users with sensitive or highly privileged users, create custom detections based on current or historical user risk, and improve investigation context.
31
+
32
+
Previously, Defender for Identity tenants received Entra ID risk level in the IdentityInfo table through user and entity behavior analytics (UEBA). With this update, the Entra ID risk level is now updated in near real time through Microsoft Defender for Identity.
33
+
34
+
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
35
+
28
36
29
37
### New security assessment: Remove inactive service accounts (Preview)
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/attest-your-app.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: article
9
9
10
10
Microsoft Defender for Cloud Apps enables you to attest your app, so that you make sure that the compliance and security details we use to rate your app in our cloud app catalog are up to date.
11
11
12
-
Whether your app is already listed in the cloud app catalog, or it's new, submit a [self-attestation questionnaire](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4CRHM-U7CtKpJma_QJAnSlUMEpLQzBaQ1hWNDMxUEhRNFI3Q0FZUkdWRC4u). For details on the self-attestation process, contact casfeedback@microsoft.com.
12
+
Whether your app is already listed in the cloud app catalog, or it's new, submit a [self-attestation questionnaire](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4CRHM-U7CtKpJma_QJAnSlUMEpLQzBaQ1hWNDMxUEhRNFI3Q0FZUkdWRC4u). For details on the self-attestation process, contact mscac@microsoft.com.
13
13
14
14
Follow the service attributes described below to successfully complete the submission of the questionnaire:
15
15
@@ -21,7 +21,7 @@ Follow the service attributes described below to successfully complete the submi
21
21
| Headquarters | General | Country code | Close list - provided in questionnaire | The country/region of the provider's headquarters.|
22
22
| Data center| General | Country code array*| Close list - provided in questionnaire (Multi selection) | The country/region in which your data center resides (can be multiple locations) |
23
23
| Hosting company | General | String | Free text | The name of the company that provides server hosting for the app. |
24
-
| Founded | General | Integer | YYYY (no later than 2019) | The year in which the provider was founded. |
24
+
| Founded | General | Integer | YYYY (no later than 2025) | The year in which the provider was founded. |
25
25
| Holding | General | String | Private, Public | Displays whether the provider is a publicly or privately held company |
26
26
| App domain | General | URL array*| Free text | The list of specific domains that are used to interact with the service. For example, 'teams.microsoft.com' for Microsoft Teams and not the generic domain 'microsoft.com'. |
27
27
| Terms of service | General | URL | Free text | Does this app provide a set of regulations that users must agree to follow in order to use the app? |
@@ -31,7 +31,7 @@ Follow the service attributes described below to successfully complete the submi
31
31
| Data types | General | String | Close list - provided in questionnaire | Which data types can be uploaded by the user to the app?|
32
32
| Homepage | General | URL | Free text | The provider's home page URL. |
33
33
| Disaster recovery plan | General | Boolean | True, False | Does this app have a disaster recovery plan that includes a backup and restore strategy? |
34
-
| Latest breach | Security | Date |MMM-dd-YYYY | Most recent incident in which sensitive, protected, or confidential data owned by the app was viewed, stolen, or used by an individual unauthorized to do so. |
34
+
| Latest breach | Security | Date |MM-dd-YYYY | Most recent incident in which sensitive, protected, or confidential data owned by the app was viewed, stolen, or used by an individual unauthorized to do so. |
35
35
| Data-at-rest encryption method | Security | String | Close list - provided in questionnaire | The type of encryption of data-at-rest performed on the app. |
36
36
| Multifactor authentication | Security | Boolean | True, False | Does this app support multifactor authentication solutions? |
37
37
| IP address restriction | Security | Boolean | True, False | Does this app support restriction of specific IP addresses by the app? |
@@ -40,7 +40,7 @@ Follow the service attributes described below to successfully complete the submi
40
40
| Data audit trail | Security | Boolean | True, False | Does this app support availability of a data audit trail in the app? |
41
41
| User can upload data | Security | Boolean | True, False | Does this app support user uploaded data? |
42
42
| Data classification | Security | Boolean | True, False | Does this app enable the option for classification of the data uploaded to the app? |
43
-
| Remember password | Security | Boolean | True, False | Does this app enable the option for remembering and saving user passwords in the app? |
43
+
| Remember password | Security | Boolean | True, False, N/A| Does this app enable the option for remembering and saving user passwords in the app? |
44
44
| User-roles support | Security | Boolean | True, False | Does this app support distribution of users by roles and levels of permission? |
45
45
| File sharing | Security | Boolean | True, False | Does this app include features that allow file sharing between users? |
46
46
| Supports SAML | Security | Boolean | True, False | Does this app support the SAML standard for exchanging authentication and authorization data? |
@@ -61,12 +61,12 @@ Follow the service attributes described below to successfully complete the submi
61
61
| ISO 27001 | Compliance | Boolean | True, False | Is this app ISO 27001 certified, a certificate given to companies upholding internationally recognized guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization? |
62
62
| ITAR | Compliance | Boolean | True, False, N/A | Does this app comply with ITAR, regulations controlling the export and import of defense-related articles and services found on the US Munitions List? |
63
63
| SOC 1 | Compliance | Boolean | True, False, N/A | Does this app comply with SOC 1, reporting on controls at a service organization which are relevant to user entities' internal control over financial reporting? |
64
-
| SOC 2 | Compliance | Boolean | True, False | Does this app comply with SOC 2, reporting on non-financial processing based on one or more of the Trust service criteria on security, privacy, availability, confidentiality, and processing integrity? |
65
-
| SOC 3 | Compliance | Boolean | True, False | Does this app comply with SOC 3, reporting based on the Trust service criteria, that may be distributed freely and only contain management's assertion that they have met the requirements of the chosen criteria? |
64
+
| SOC 2 | Compliance | Boolean |True, False, N/A| Does this app comply with SOC 2, reporting on non-financial processing based on one or more of the Trust service criteria on security, privacy, availability, confidentiality, and processing integrity? |
65
+
| SOC 3 | Compliance | Boolean | True, False, N/A| Does this app comply with SOC 3, reporting based on the Trust service criteria, that may be distributed freely and only contain management's assertion that they have met the requirements of the chosen criteria? |
66
66
| SOX | Compliance | Boolean | True, False, N/A | Does this app comply with SOX, US legislation aimed at protecting shareholders and the general public from accounting errors and frauds, as well as improving the accuracy of corporate disclosures? |
67
67
| SP 800-53 | Compliance | Boolean | True, False | Does this app comply with SP80053, recommended security controls for federal information systems and organizations? |
68
68
| SSAE 16 | Compliance | Boolean | True, False, N/A | Does this app comply with the SSAE 16 standard for auditing a service organization's internal compliance controls and reporting processes? |
69
-
| PCI DSS version | Compliance | String |1, 2, 3, 3.1, 3.2, N/A | The version of the PCI-DSS protocol supported by this app. |
69
+
| PCI DSS version | Compliance | String |4.0, 3.2.1, N/A | The version of the PCI-DSS protocol supported by this app. |
70
70
| ISO 27018 | Compliance | Boolean | True, False, N/A | Does this app comply with ISO 27018, which establishes commonly accepted controls and guidelines for processing and protecting Personally Identifiable Information (PII) in a public cloud computing environment? |
71
71
| GLBA | Compliance | Boolean | True, False, N/A | Does this app comply with the Gramm-Leach-Bliley Act (GLBA), which requires financial institutions to establish standards for protecting the security and confidentiality of customers' personal information? |
72
72
| FedRAMP level | Compliance | String | High, Moderate, Low, Li-SaaS | The level of the FedRAMP-compliant solution provided by this app. |
@@ -76,14 +76,14 @@ Follow the service attributes described below to successfully complete the submi
76
76
| COBIT | Compliance | Boolean | True, False | Does this app comply with COBIT, which sets best practices for the governance and control of information systems and technology, and aligns IT with business principles? |
77
77
| COPPA | Compliance | Boolean | True, False, N/A | Does this app comply with COPPA, which defines requirements on website and online services operators that provide content to children under 13 years of age? |
78
78
| FERPA | Compliance | Boolean | True, False, N/A | Does this app comply with FERPA, a federal law that protects the privacy of student education records? |
79
-
| GAPP | Compliance | Boolean | True, False, N/A | Does this app comply with GAPP, a collection of commonly followed rules that address privacy risks in an organization? |
79
+
| GAPP | Compliance | Boolean | True, False| Does this app comply with GAPP, a collection of commonly followed rules that address privacy risks in an organization? |
80
80
| HITRUST CSF | Compliance | Boolean | True, False, N/A | Does this app comply with HITRUST CSF, a set of controls that harmonizes the requirements of information security regulations and standards? |
81
-
| Jericho Forum Commandments | Compliance | Boolean | True, False | Does this app follow Jericho Forum Commandments, a set if principles to be observed when architecting systems for secure operation in de-perimeterized environments? |
82
-
| ISO 27002 | Compliance | Boolean | True, False, N/A | Does this app comply with ISO 27002, which establishes common guidelines for organizational information security standards and information security management practices? |
81
+
| Jericho Forum Commandments | Compliance | Boolean | True, False | Does this app follow Jericho Forum Commandments, a set of principles to be observed when architecting systems for secure operation in de-perimeterized environments? |
82
+
| ISO 27002 | Compliance | Boolean | True, False| Does this app comply with ISO 27002, which establishes common guidelines for organizational information security standards and information security management practices? |
83
83
| FFIEC | Compliance | Boolean | True, False, N/A | Does this app comply with the Federal Financial Institutions Examination Council's guidance on the risk management controls necessary to authenticate services in an Internet banking environment? |
84
-
| Data ownership | Legal | Boolean | True, False | Does this app fully preserve the user's ownership of uploaded data? |
85
-
| DMCA | Legal | Boolean | True, False | Does this app comply with the Digital Millennium Copyright Act (DMCA), which criminalizes any attempt to unlawfully access copyrighted material? |
86
-
| Data retention policy | Legal |Boolean|True, False | What is the app's policy for user data retention after account termination? |
84
+
| Data ownership | Legal | Boolean | True, False, N/A| Does this app fully preserve the user's ownership of uploaded data? |
85
+
| DMCA | Legal | Boolean | True, False, N/A| Does this app comply with the Digital Millennium Copyright Act (DMCA), which criminalizes any attempt to unlawfully access copyrighted material? |
86
+
| Data retention policy | Legal |String|Deleted immediately, Within 2 weeks, Within 1 month, Within 3 months, Within more than 3 months, Retained| What is the app's policy for user data retention after account termination? |
87
87
| GDPR readiness statement | Legal | URL | Free text | A link to your website, when relevant, relating how this provider plans to handle GDPR compliance. |
88
88
| GDPR - Right to erasure | Legal | Boolean | True, False, N/A | Does this app stop processing and delete an individual's personal data upon request? |
89
89
| GDPR - Report data breaches | Legal | Boolean | True, False, N/A | Does this app report data breaches to supervisory authorities and individuals affected by the breach, within 72 hours of breach detection? |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovered-apps.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,6 +111,7 @@ The best way to get an overview of Shadow IT use across your organization is by
111
111
112
112
> [!NOTE]
113
113
> The executive summary report is revamped to a six-pager report with a goal to provide a clear, concise & actionable overview while preserving the depth and integrity of the original analysis.
114
+
> Starting September 1, 2025, the Cloud Discovery Alerts data point will no longer be included in the Executive Summary Report.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-office-365.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,7 +162,8 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
162
162
SaaS Security Posture Management (SSPM) data is shown in the Microsoft Defender Portal on the **Secure Score** page. For more information, see [Security posture management for SaaS apps](/defender-cloud-apps/security-saas).
163
163
164
164
> [!NOTE]
165
-
> After connecting Microsoft 365, you see data from the past week, including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that aren't pulling APIs before connection, you see events starting from when you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that are off by default.
165
+
> - After connecting Microsoft 365, you see data from the past week, including any third-party applications connected to Microsoft 365 that are pulling APIs. For third-party apps that aren't pulling APIs before connection, you see events starting from when you connect Microsoft 365 because Defender for Cloud Apps turns on any APIs that are off by default.
166
+
> - Files and folders that are publicly shared (shared with ‘anyone’) in SharePoint or OneDrive may incorrectly show up as private.
166
167
167
168
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
@@ -49,7 +44,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
49
44
50
45
1. The user can only access the tombstone file. In the file, they can read the custom guidelines provided by IT and the correlation ID to give IT to release the file.
51
46
52
-
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
47
+
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
@@ -58,7 +53,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
58
53
1. Inspect the file in the quarantined folder on SharePoint online.
59
54
1. You can also look at the audit logs to deep dive into the file properties.
60
55
1. If you find the file is against corporate policy, run the organization's Incident Response (IR) process.
61
-
1. If you find that the file is harmless, you can restore the file from quarantine. At that point the original file is released, meaning it's copied back to the original location, the tombstone is deleted, and the user can access the file.
56
+
1. If you find that the file is harmless, you can restore the file from quarantine. At that point the original file is released, and copied back to the original location. The tombstone is deleted, and the user can access the file.
> Defender for Cloud Apps will create a quarantine folder on the selected site.
88
+
> Defender for Cloud Apps creates a quarantine folder on the selected site.
94
89
95
90
1. For Box, the quarantine folder location and user message can't be customized. The folder location is the drive of the admin who connected Box to Defender for Cloud Apps and the user message is: This file was quarantined to your administrator's drive because it might violate your company's security and compliance policies. Contact your IT administrator for help.
0 commit comments