You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-atlassian.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
8
8
9
9
10
10
11
-
Atlassian is an online collaborative and software development platform (including Confluence, Jira and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
11
+
Atlassian is an online collaborative and software development platform (including Confluence, Jira, and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
12
12
13
-
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities.
13
+
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities.
14
14
15
15
Main threats include:
16
16
@@ -68,7 +68,7 @@ For more information, see:
68
68
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Atlassian products using the App Connector APIs. This connection gives you visibility into and control over your organization's Atlassian use.
69
69
70
70
>[!NOTE]
71
-
>The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
71
+
>The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
72
72
73
73
### Prerequisites
74
74
@@ -116,19 +116,17 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
116
116
>[!NOTE]
117
117
>
118
118
> - The first connection can take up to four hours to get all users and their activities.
119
-
> - The activities that will display are the activities that were generated from the moment the connector is connected.
119
+
> - The activities displayed are the activities that were generated from the moment the connector is connected.
120
120
> - Activities from the "Atlassian Access" audit log are fetched by Defender for Cloud apps. Other activities aren't fetched currently. See [Product Audit Logs](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/).
121
121
> - After the connector’s **Status** is marked as **Connected**, the connector is live and works.
122
122
123
123
### Revoke and renew API keys
124
124
125
125
1. Microsoft recommends using short lived keys or tokens for connecting apps as a security best practice.
126
126
1. We recommend refreshing the Atlassian API key every 6 months as a best practice. To refresh the key, revoke the existing API key and generate a new key.
127
-
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration and select **Revoke**.
127
+
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration, and select **Revoke**.
128
128
1. Recreate an API key in the Atlassian admin portal with the steps described above.
129
-
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector:
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector.
132
130
133
131
1. Enter the new generated new **API key** and select **Connect Atlassian**.
134
132
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
@@ -148,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
148
146
149
147
## Rate limits and limitations
150
148
151
-
-**Rate limits** include 1000 requests per minute (per API key/connector instance).
149
+
-**Rate limits** include 1,000 requests per minute (per API key/connector instance).
152
150
153
151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
154
152
155
153
-**Limitations** include:
156
154
157
-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155
+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
158
156
159
157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-azure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
8
8
9
9
10
10
11
-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11
+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
12
12
13
13
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
14
14
@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
74
74
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
75
75
76
76
> [!NOTE]
77
-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77
+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
78
78
79
79
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
0 commit comments