Skip to content

Commit 9cb2aa7

Browse files
authored
Merge branch 'main' into US428946_WIZ
2 parents ab3ee9c + 809f7ff commit 9cb2aa7

File tree

700 files changed

+2185
-1931
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

700 files changed

+2185
-1931
lines changed

ATPDocs/remove-inactive-service-account.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ ms.topic: how-to
66
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
77
---
88

9-
# Security Assessment: Remove Inactive Service Accounts (Preview)
9+
# Security Assessment: Remove Stale Service Accounts (Preview)
1010

11-
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 90 days.
11+
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
1212

13-
## Why do inactive service accounts pose a risk?
13+
## Why do stale service accounts pose a risk?
1414

15-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
1616

1717
This exposure creates several risks:
1818

@@ -25,10 +25,9 @@ This exposure creates several risks:
2525

2626
To use this security assessment effectively, follow these steps:
2727

28-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29-
1. Review the list of exposed entities to discover which of your service account is inactive.
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
3029

31-
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
30+
1. Review the list of exposed entities to discover which of your service accounts are stale and have not performed any login activity in the last 90 days.
3231

3332
1. Take appropriate actions on those entities by removing the service account. For example:
3433

ATPDocs/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ Previously, Defender for Identity tenants received Entra ID risk level in the Id
4242

4343
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
4444

45-
### New security assessment: Remove inactive service accounts (Preview)
45+
### New security assessment: Remove stale service accounts (Preview)
4646

47-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 90 days, to help you mitigate security risks associated with unused accounts.
47+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been stale for the past 90 days, to help you mitigate security risks associated with unused accounts.
4848

49-
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
49+
For more information, see: Security Assessment: [Remove Stale Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
5050

5151
### New Graph based API for response actions (preview)
5252

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance policies | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: how-to
55
description: Get started learning about app governance policies with Microsoft Defender for Cloud Apps in Microsoft Defender XDR
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app policies
@@ -23,22 +24,21 @@ To see your list of current app policies, go to the **Microsoft Defender XDR > A
2324

2425
For example:
2526

26-
![Screenshot of the app governance policies summary page in Microsoft Defender XDR.](media/app-governance-app-policies-get-started/azure-ad-policies.jpg)
27+
:::image type="content" source="media/app-governance-app-policies-get-started/app-governance-app-policies.png" alt-text="Screenshot that shows the app governance app polcies." lightbox="media/app-governance-app-policies-get-started/app-governance-app-policies.png":::
2728

2829
> [!NOTE]
2930
> Built-in threat detection policies aren't listed on the **Policies** tab. For more information, see [Investigate threat detection alerts](app-governance-anomaly-detection-alerts.md).
3031
>
3132
3233
## What’s available on the app policies dashboard
3334

34-
The **App governance** > **Policies** tab shows the number of active, inactive, and audit mode policies, and the following information for each policy:
35+
The **App governance** > **Policies** tab shows the number of active and disabled policies, and the following information for each policy:
3536

3637
- **Policy name**
3738
- **Status**
3839

3940
- **Active**: All policy evaluation and actions are active.
40-
- **Inactive**: All policy evaluation and actions are disabled.
41-
- **Audit mode**: Policy evaluation is active (alerts will trigger) but policy actions are disabled.
41+
- **Disabled**: All policy evaluation and actions are disabled.
4242

4343
- **Severity**: Severity level set on any alerts triggered because of this policy being evaluated as true, which is part of the configuration of the policy.
4444
- **Active alerts**: Number of alerts generated by the policy that have an **In Progress** or **New** status.
@@ -74,22 +74,24 @@ You can also:
7474

7575
1. Select **Edit**.
7676

77-
While you can't change the name of the policy once created, but you can change the description and policy severity as needed. When you're done, select **Next**.
77+
While you can't change the name of the policy once created, you can change the description and policy severity as needed. When you're done, select **Next**.
7878

7979
1. Choose whether you want to continue with the existing policy settings or customize them. Select **No, I'll customize the policy** to make changes, and then select **Next**.
8080

81-
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
81+
1. Choose whether this policy applies to all apps, specific apps, or all apps except the apps you select.
82+
83+
1. Select **Choose apps** to select which apps to apply the policy to, and then select **Next**.
8284

8385
1. Choose whether to modify the existing conditions of the policy.
8486

8587
- If you choose to modify the conditions, select **Edit or modify existing conditions for the policy** and choose which policy conditions to apply.
8688
- Otherwise, select **Use existing conditions of the policy**.
8789

88-
When you're done, select **Next**.
90+
1. When you're done, select **Next**.
8991

9092
1. Choose whether to disable the app if it triggers the policy conditions and then select **Next**.
9193

92-
1. Set the policy status to **Audit** mode, **Active**, or **Inactive**, as needed, and then select **Next**.
94+
1. Set the policy status to **Active**, or **Disabled**, as needed, and then select **Next**.
9395

9496
1. Review your setting choices for the policy and if everything is the way you want it, select **Submit**.
9597

CloudAppSecurityDocs/app-governance-detect-remediate-get-started.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Get started with app governance threat detection and remediation | Microsoft Defender for Cloud Apps
3-
ms.date: 05/28/2023
3+
ms.date: 08/31/2025
44
ms.topic: overview
55
description: Get started with app governance threat detection and remediation in Microsoft Defender XDR with Microsoft Defender for Cloud Apps.
6+
ms.reviewer: shragar456
67
---
78

89
# Get started with app threat detection and remediation
@@ -13,7 +14,8 @@ To view the latest incidents associated with these alerts, go to the **App gover
1314

1415
For example:
1516

16-
:::image type="content" source="media/app-governance/mapg-cc-overview-alerts.png" alt-text="Screenshot of the App governance > Overview tab with the Latest alerts section highlighted." lightbox="media/app-governance/mapg-cc-overview-alerts.png":::
17+
:::image type="content" source="media/app-governance/app-governance-overview.png" alt-text="Screenshot that shows the App Governance overview tab." lightbox="media/app-governance/app-governance-overview.png":::
18+
1719

1820
On the **Overview** tab, the **Latest alerts** section lists the most recent alerts. You can use these recent alerts to quickly see the current app alert activity for your tenant.
1921

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99
# In-browser protection with Microsoft Edge for Business (Preview)
1010

11-
Defender for Cloud Apps users who use Microsoft Edge for Business and are subject to session policies are protected directly from within the browser. In-browser protection reduces the need for proxies, improving both security and productivity.
11+
Defender for Cloud Apps users who use Microsoft Edge for Business or Purview Data Loss Prevention policies for Cloud Apps in Edge and are subject to session policies are protected directly from within the browser. In-browser protection reduces the need for proxies, improving both security and productivity.
1212

1313
Protected users experience a smooth experience with their cloud apps, without latency or app compatibility issues, and with a higher level of security protection.
1414

@@ -27,14 +27,15 @@ To use in-browser protection, users must also have the following environmental r
2727
|**Operating systems**|Windows 10 or 11, macOS|
2828
|**Identity platform**|Microsoft Entra ID|
2929
|**Microsoft Edge for Business versions**|The last two stable versions. For example, if the newest Microsoft Edge is 126, in-browser protection works for v126 and v125. <br> For more information, see [Microsoft Edge releases](/deployedge/microsoft-edge-release-schedule#microsoft-edge-releases).|
30-
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Edge in-browser protection|
30+
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Microsoft Edge in-browser protection|
31+
|**Supported Purview DLP policies**|Please see: [Activities you can monitor and take action on in the browser](/purview/dlp-browser-dlp-learn#activities-you-can-monitor-and-take-action-on) <br>Purview policies are always served by in-browser protection.|
3132

3233
All other scenarios are served automatically with the standard reverse proxy technology, including user sessions from browsers that don't support in-browser protection, or for policies not supported by in-browser protection.
3334

3435
For instance, these scenarios are served by the reverse proxy:
3536

3637
- Google Chrome users.
37-
- Microsoft Edge users who are scoped to a protect file download policy.
38+
- Microsoft Edge users who are scoped to a protect file download session policy.
3839
- Microsoft Edge users on Android devices.
3940
- Users in apps that use the OKTA authentication method.
4041
- Microsoft Edge users in InPrivate mode.
@@ -52,20 +53,20 @@ Also, the `.mcas.ms` suffix doesn't appear in the browser address bar with in-br
5253

5354
### Work profile enforcement for in-browser protection
5455

55-
To access a work resource in *contoso.com* with in-browser protection, users must sign in with their `[email protected]` profile. If users try to access the work resource from outside the work profile, they're prompted to switch to the work profile or create one if it doesn't exist. Users can also choose to continue with their current profile, in which case they're served by the [reverse proxy architecture](proxy-intro-aad.md).
56+
To access a work resource in *contoso.com* with in-browser protection, you must sign in with your `[email protected]` profile. If you try to access the work resource from outside the work profile, you will be prompted to switch to the work profile or create one if it doesn't exist. If access from the Microsoft Edge work profile isn't enforced, you can also choose to continue with your current profile, in which case you're served by the [reverse proxy architecture](proxy-intro-aad.md).
5657

57-
If the user decides to create a new work profile, they're prompted with the **Allow my organization to manage my device** option. In such cases, users don't need to select this option to create the work profile or benefit from in-browser protection.
58+
If you decide to create a new work profile, you'll see a prompt with the **Allow my organization to manage my device** option. In such cases, you don't need to select this option to create the work profile or benefit from in-browser protection.
5859

5960
For more information, see [Microsoft Edge for Business](/deployedge/microsoft-edge-for-business) and [How to add new profiles to Microsoft Edge](https://www.microsoft.com/edge/learning-center/how-to-add-new-profiles).
6061

6162
## Configure in-browser protection settings
6263

63-
In-browser protection with Microsoft Edge for Business is turned on by default. Admins can turn the integration off and on, and can configure a prompt for non-Microsoft Edge users to switch to Microsoft Edge for enhanced performance and security.
64+
In-browser protection with Microsoft Edge for Business is turned on by default, with **Do not enforce** selected. You can turn the integration off and on, change settings to enforce use of Microsoft Edge for Business, and configure a prompt for non-Microsoft Edge users to switch to Microsoft Edge for enhanced performance and security.
6465

6566
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **System** \> **Settings** \> **Cloud apps** \> **Conditional Access App Control** section \> **Edge for Business protection**. Or, to go directly to the **Edge for Business protection** page, use <https://security.microsoft.com/cloudapps/settings?tabid=edgeIntegration>.
6667

6768
2. On the **Edge for Business protection** page, configure the following settings as needed:
68-
- **Turn on Edge for Business browser protection**: The default value is **On**, but you can toggle the setting to **Off**.
69+
- **Turn on Edge for Business browser protection**: The default value for this is **On**, but you can toggle the setting to **Off**.
6970
- **Notify users in non-Edge browsers to use Microsoft Edge for Business for better performance and security**: If you select the check box, select one of the following values that appear:
7071
- **Use default message** (default)
7172
- **Customize message**: Enter the custom text in the box that appears.
@@ -74,17 +75,16 @@ In-browser protection with Microsoft Edge for Business is turned on by default.
7475

7576
When you're finished on the **Edge for Business protection** page, select **Save**.
7677

77-
## Working with Microsoft Purview and Endpoint data loss prevention
78+
## Working with Microsoft Purview Endpoint data loss prevention
79+
Endpoint DLP policies are prioritized and applied if the same context and action are configured for the Endpoint policy and either a Defender for Cloud Apps session policy or a [Purview DLP policy for cloud apps](/purview/dlp-browser-dlp-learn#activities-you-can-monitor-and-take-action-on).
7880

79-
If the same exact context and action are configured for both Defender for Cloud Apps policies and a Microsoft Purview Endpoint data loss prevention policy (DLP), the Endpoint DLP policy is applied.
81+
For example, you have an Endpoint DLP policy that blocks a file upload to Salesforce, and you also have a Defender for Cloud Apps session policy that monitors file uploads to Salesforce. In this scenario, the Endpoint DLP policy is applied.
8082

81-
For example, you have an Endpoint DLP policy that blocks a file upload to Salesforce, and you also have a Defender for Cloud Apps policy that monitors file uploads to Salesforce. In this scenario, the Endpoint DLP policy is applied.
82-
83-
For more information, see [Learn about data loss prevention](/purview/dlp-learn-about-dlp).
83+
For more information, see [Learn about Endpoint data loss prevention](/purview/endpoint-dlp-learn-about).
8484

8585
## Enforce Microsoft Edge browser protection when accessing business apps
8686

87-
Administrators who understand the power of Microsoft Edge browser protection can require users to use Microsoft Edge when accessing corporate resources. A primary reason is security, since the barrier to circumventing session controls using Microsoft Edge is much higher than with reverse proxy technology.
87+
Administrators who understand the power of Microsoft Edge browser protection can require users to use Microsoft Edge when accessing corporate resources. A primary reason is security, since the barrier to circumventing session controls using Microsoft Edge is much higher than with reverse proxy technology. For Purview DLP policies, these settings are required to be on and enforcing access only from Microsoft Edge for business application when using policies that [help prevent users from sharing sensitive info with Cloud Apps in Edge for Business](/purview/dlp-create-policy-prevent-cloud-sharing-from-edge-biz).
8888

8989
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **System** \> **Settings** \> **Cloud apps** \> **Conditional Access App Control** section \> **Edge for Business protection**. Or, to go directly to the **Edge for Business protection** page, use <https://security.microsoft.com/cloudapps/settings?tabid=edgeIntegration>.
9090

329 KB
Loading
383 KB
Loading
363 KB
Loading

0 commit comments

Comments
 (0)