Skip to content

Commit 97cc7f7

Browse files
committed
Fix prerequisites
1 parent ca9ffde commit 97cc7f7

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

CloudAppSecurityDocs/content-inspection.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,10 @@ You can also define which file elements are inspected—content, metadata, or fi
1717

1818
## Prerequisites
1919

20-
Before you can inspect encrypted files, you must grant one-time admin consent. This action can only be performed by a [Global Administrator](/entra/identity/enterprise-apps/configure-admin-consent-workflow)
20+
To inspect encrypted files, a [Global Administrator](/entra/identity/enterprise-apps/configure-admin-consent-workflow) must first grant one‑time admin consent to Defender for Cloud Apps in Microsoft Entra ID.
2121

22-
1. In the Defender portal, go to **Settings > Cloud Apps > Microsoft Information Protection > Inspect protected files**.
22+
To do this, in the Defender portal go to **Settings > Cloud Apps > Microsoft Information Protection > Inspect protected files**, and select **Grant permission**.
2323

24-
1. Select Grant permission and to grant Defender for Cloud Apps permission in Microsoft Entra ID.
2524

2625
## Content inspection for protected files
2726

@@ -40,7 +39,9 @@ The following app IDs apply based on your Microsoft cloud environment:
4039
| GCCM | 23105e90-1dfc-497a-bb5d-8b18a44ba061 |
4140

4241
>[!NOTE]
43-
>These app IDs represent the internal service principal used by Defender for Cloud Apps in each environment (Public, Fairfax, and GCCM) to enable inspection and enforcement of protected files. Disabling or removing this app breaks inspection and prevent DLP policies from applying to protected files. Always verify that the app ID for your environment is present and enabled to maintain inspection and enforcement capabilities.
42+
>App IDs are internal service principals used by Defender for Cloud Apps in Public, Fairfax, and GCC‑M environments to inspect and enforce DLP policies on protected files.
43+
>Don't remove or disable these App IDs. Doing so breaks inspection and prevent DLP policies from applying to protected files.
44+
>Always verify that the App ID for your environment is present and enabled.
4445
4546
## Configure Microsoft Information Protection settings
4647

@@ -59,7 +60,7 @@ In order to give Defender for Cloud Apps the necessary permissions:
5960

6061
1. In the Defender portal, go to **Settings > Cloud Apps > Policies > Policy management**.
6162
1. Follow the steps to [create a new file policy](data-protection-policies.md#create-a-new-file-policy).
62-
1. Select either **Apply to all files**, or **Apply to selected files** to specify which files will be scanned. This option is useful if you have an inner classification keyword standard that you want to exclude from the policy.
63+
1. Select either **Apply to all files**, or **Apply to selected files** to specify which files to scan. This option is useful if you have an inner classification keyword standard that you want to exclude from the policy.
6364
1. Select **Inspection method** > **Data Classification Service** to enable content inspection for the policy.
6465
1. Check both boxes - **Inspect protected files** and **Unmask the last 4 characters of a match**.
6566

0 commit comments

Comments
 (0)