You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+27-3Lines changed: 27 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,30 @@ For more information on what's new with other Microsoft Defender security produc
20
20
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
21
21
22
22
23
+
## October 2024
24
+
25
+
### New anomaly data in advanced hunting CloudAppEvents table
26
+
27
+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal, can now utilize the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules.
28
+
The new columns are designed to assist you to better __identify uncommon activities__ that may appear suspicious, and allow you to create more accurate custom detections, as well as investigate any suspicious activities that arise.
29
+
30
+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
31
+
32
+
### New Conditional Access app control / inline data in advanced hunting CloudAppEvents table
33
+
34
+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules.
35
+
Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
36
+
37
+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
38
+
39
+
### New data in advanced hunting CloudAppEvents table - OAuthAppId
40
+
41
+
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new _OAuthAppId_ column for queries and detection rules.
42
+
43
+
Using _OAuthAppId_ allows the queries that consider specific OAuth applications, making queries and detection rules more accurate.
44
+
45
+
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
46
+
23
47
## September 2024
24
48
25
49
### Enforce Edge in-browser when accessing business apps
@@ -28,7 +52,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
28
52
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
29
53
30
54
For more information see:
31
-
[Enforce Edge in-browser protection when accessing business apps](https://learn.microsoft.com/defender-cloud-apps/in-browser-protection#enforce-edge-in-browser-when-accessing-business-apps)
55
+
[Enforce Edge in-browser protection when accessing business apps](/defender-cloud-apps/in-browser-protection)
32
56
33
57
### Connect Mural to Defender for Cloud Apps (Preview)
34
58
@@ -146,7 +170,7 @@ Microsoft Defender for Cloud Apps log collector now supports [Azure Kubernetes S
146
170
147
171
For more information, see [Configure automatic log upload using Docker on Azure Kubernetes Service (AKS)](discovery-kubernetes.md).
148
172
149
-
### New Conditional Access app control / inline data for the advanced hunting CloudAppEvents table
173
+
### New Conditional Access app control / inline data for the advanced hunting CloudAppEvents table (Preview)
150
174
151
175
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *AuditSource* and *SessionData* columns for queries and detection rules. Using this data allows for queries that consider specific audit sources, including access and session control, and queries by specific inline sessions.
152
176
@@ -224,7 +248,7 @@ Automatic log collection is supported using a Docker container on multiple opera
224
248
225
249
For more information, see [Configure automatic log upload using Podman](discovery-linux-podman.md).
226
250
227
-
### New anomaly data for the advanced hunting CloudAppEvents table
251
+
### New anomaly data for the advanced hunting CloudAppEvents table (Preview)
228
252
229
253
Defender for Cloud Apps users who use advanced hunting in the Microsoft Defender portal can now use the new *LastSeenForUser* and *UncommonForUser* columns for queries and detections rules. Using this data helps to rule out false positives and find anomalies.
0 commit comments