Skip to content

Commit a9c5e9e

Browse files
authored
Merge pull request #4455 from anandd512/docs-editor/release-notes-1730791406
Update release-notes.md
2 parents 23ecece + c645337 commit a9c5e9e

10 files changed

+132
-89
lines changed

CloudAppSecurityDocs/app-governance-app-policies-create.md

Lines changed: 46 additions & 45 deletions
Large diffs are not rendered by default.

CloudAppSecurityDocs/app-governance-app-policies-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Get started learning about app governance policies with Microsoft D
77

88
# Get started with app policies
99

10-
Policies for app governance are a way to implement proactive and reactive alerts and automatic remediation for your specific needs for app compliance in your organization. You can create policies in app governance to manage OAuth apps in Microsoft Entra ID, Google and Salesforce.
10+
Policies for app governance are a way to implement proactive and reactive alerts and automatic remediation for your specific needs for app compliance in your organization. You can create policies in app governance to manage OAuth apps in Microsoft 365, Google and Salesforce.
1111

1212
There are two types of policies in app governance:
1313

CloudAppSecurityDocs/app-governance-app-policies-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ description: Manage your app governance policies.
77

88
# Manage app policies
99

10-
Use app governance to manage OAuth policies for Microsoft Entra ID, Google Workspace, and Salesforce.
10+
Use app governance to manage OAuth policies for Microsoft 365, Google Workspace, and Salesforce.
1111

1212
You might need to manage your app policies as follows to keep up-to-date with your organization's apps, respond to new app-based attacks, and for ongoing changes to your app compliance needs:
1313

1414
- Create new policies targeted at new apps
1515
- Change the status of an existing policy (active, inactive, audit mode)
1616
- Change the conditions of an existing policy
17-
- Change the actions of an existing policy for autoremediation of alerts
17+
- Change the actions of an existing policy for auto-remediation of alerts
1818

1919
<a name='manage-oauth-app-policies-for-azure-ad'></a>
2020

CloudAppSecurityDocs/app-governance-visibility-insights-compliance-posture.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,41 +19,41 @@ The **Overview** page shows the following details:
1919
For example:
2020

2121
> [!div class="mx-imgBorder"]
22-
>![Relative number of detected and policy-based incidents.](incidents-summary1.png)
23-
>
22+
> ![Relative number of detected and policy-based incidents.](incidents-summary1.png)
23+
>
2424
> [!div class="mx-imgBorder"]
25-
>![top alerts.](media/app-governance-visibility-insights-compliance-posture/top-alerts.png)
25+
> ![top alerts.](media/app-governance-visibility-insights-compliance-posture/top-alerts.png)
2626
2727
## Data usage cards
2828

2929
Data usage cards show the following types of information:
3030

31-
- **Total data accessed by apps** in the tenant through Graph API over the current month and previous three calendar months. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Graph API)
31+
- **Total data accessed by apps** in the tenant through Microsoft Graph and EWS APIs over the current month and previous three calendar months. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Microsoft Graph and EWS APIs)
3232

33-
- **Data usage over the current month and previous three calendar months**, broken down by resource type. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Graph API)
33+
- **Data usage over the current month and previous three calendar months**, broken down by resource type. (Currently includes emails, files, and chat and channel messages read and written by apps that access Microsoft 365 using Microsoft Graph and EWS APIs)
3434

3535
For example:
3636

3737
> [!div class="mx-imgBorder"]
38-
>![Total data accessed by apps.](media/app-governance-visibility-insights-compliance-posture/data-usage-chart.png)
38+
> ![Total data accessed by apps.](media/app-governance-visibility-insights-compliance-posture/data-usage-chart.png)
3939
4040
## Apps that access data on Microsoft 365
4141

42-
For apps that access data on Microsoft 365, cards show the number of apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days
42+
For apps that access data on Microsoft 365, cards show the number of apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams using Microsoft Graph and EWS APIs in the last 30 days.
4343

4444
For example:
4545

4646
> [!div class="mx-imgBorder"]
47-
>![Apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days.](media/app-governance-visibility-insights-compliance-posture/apps-accessed-m365-services-chart.png)
47+
> ![Apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days.](media/app-governance-visibility-insights-compliance-posture/apps-accessed-m365-services-chart.png)
4848
4949
## Sensitivity labels accessed
5050

51-
For sensitivity labeling data, cards show the number apps that have accessed content with sensitivity labels on SharePoint, OneDrive, Exchange Online or Teams in the last 30 days.
51+
For sensitivity labeling data, cards show the number apps that have accessed content with sensitivity labels on SharePoint, OneDrive, Exchange Online or Teams using Microsoft Graph and EWS APIs in the last 30 days.
5252

5353
For example:
5454

5555
> [!div class="mx-imgBorder"]
56-
>![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
56+
> ![number apps that have accessed content with sensitivity labels.](sensitive-data-accessed-chart1.png)
5757
5858
## Next steps
5959

CloudAppSecurityDocs/app-governance-visibility-insights-get-started.md

Lines changed: 37 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -38,32 +38,48 @@ One of the primary value points for app governance is the ability to quickly vie
3838
1. On the **App governance** page, select one of the apps tabs to display your apps.
3939

4040
The apps listed depend on the apps present in your tenant.
41-
41+
4242
1. Filter the apps listed using one or more of the following default filter options:
4343

44-
- **API access**
45-
- **Privilege level**
46-
- **Permission usage**
47-
- **Permission type**
48-
- **Publisher verified**
49-
44+
- **API access**
45+
46+
- **Privilege level**
47+
48+
- **Permission** (Preview)
49+
50+
- **Permission usage**
51+
52+
- **App origin**
53+
54+
- **Permission type**
55+
56+
- **Publisher verified**
57+
5058
Use one of the following nondefault filters to further customize the apps listed:
51-
52-
- **Last modified**
53-
- **Added on**
54-
- **Certification**
55-
- **Users**
56-
- **Services accessed**
57-
- **Data usage**
58-
- **Sensitivity labels accessed**
59-
60-
> [!TIP]
61-
> Save the query to save the currently selected filters for use again in the future.
62-
59+
60+
- **Last modified**
61+
62+
- **Added on**
63+
64+
- **Certification**
65+
66+
- **Users**
67+
68+
- **Services accessed**
69+
70+
- **Data usage**
71+
72+
- **Sensitivity labels accessed**
73+
74+
> [!TIP]
75+
> Save the query to save the currently selected filters for use again in the future.
76+
6377
1. Select the name of an app to view more details. For example:
6478

65-
:::image type="content" source="media/app-governance-visibility-insights-get-started/image2.png" alt-text="Screenshot of an app details pane showing an app summary.":::
66-
79+
![Screenshot of an app details pane showing an app summary.](media/app-governance-visibility-insights-get-started/app-governance-app-list-view.png)
80+
81+
82+
6783
The details pane lists the app usage over the past 30 days, the users who have consented to the app, and the permissions assigned to the app.
6884

6985
For example, an administrator might review the activity and permissions of an app that is generating alerts and make a decision to disable the app using the **Disable App** button towards the bottom of the app details pane.

CloudAppSecurityDocs/app-governance-visibility-insights-view-apps.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,21 +17,21 @@ For a summary of apps in your tenant, in Microsoft 365, go to **Cloud app > App
1717

1818
For example:
1919

20-
:::image type="content" source="media/app-governance-visibility-insights-view-apps/appg-cc-apps.png" alt-text="Screenshot of the Azure AD apps tab on the App governance page.":::
21-
20+
:::image type="content" source="media/app-governance-visibility-insights-view-apps/app-governance-app-list-view-new.png" alt-text="Screenshot of the Azure AD apps tab on the App governance page.":::
2221

2322
>[!NOTE]
2423
> Your sign-in account must have one of [these roles](app-governance-get-started.md#roles) to view any app governance data.
2524
>
2625
27-
On the **Azure AD apps** tab, the apps in your tenant are listed with the following details:
26+
On the **Microsoft 365** tab, the apps in your tenant are listed with the following details:
2827

2928
|Column name |Description |
3029
|---------|---------|
31-
|**App name** | The display name of the app as registered on Microsoft Entra ID |
32-
|**App status** | Shows whether the app is enabled or disabled, and if disabled by whom |
30+
| **App name** | The display name of the app as registered on Microsoft Entra ID |
31+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom |
3332
| **Graph API access**| Shows whether the app has at least one Graph API permission |
3433
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions |
34+
| **App origin** (Preview)| Shows whether the app originated within the tenant or was registered in an external tenant |
3535
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app |
3636
| **Publisher**| Publisher of the app and their verification status |
3737
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
@@ -55,13 +55,13 @@ You can also select **Search** to search for an app by name.
5555

5656
Select a specific app in the grid to view more details on an apps details pane on the right. For example:
5757

58-
:::image type="content" source="media/app-governance-visibility-insights-view-apps/image2.png" alt-text="Screenshot of an app details pane on the Azure AD tab.":::
58+
:::image type="content" source="media/app-governance-visibility-insights-view-apps/app-governance-app-list-view.png" alt-text="Screenshot of an app details pane on the Azure AD tab.":::
5959

60-
The **Summary** tab also shows more data about the app, such as the date first consented and the App ID. To see the properties of the app as registered in Microsoft Entra ID, select **View app in Azure AD**.
60+
The **Summary** tab also shows more data about the app, such as the date first consented and the App ID. To see the properties of the app as registered in Microsoft Entra ID, select **View in Microsoft Entra ID**.
6161

6262
In the details pane, select any of the following tabs to view more details:
6363

64-
- Select the **Data usage** tab to view a graph of data usage over time, for Exchange, SharePoint, OneDrive, and Teams resources. For example:
64+
- Select the **Data usage** tab to view a graph of data usage over time, for Exchange, SharePoint, OneDrive, and Teams resources via Microsoft Graph and EWS APIs. For example:
6565

6666
:::image type="content" source="media/app-governance-visibility-insights-view-apps/data-usage.png" alt-text="Screenshot of the Data usage tab.":::
6767

@@ -73,7 +73,7 @@ In the details pane, select any of the following tabs to view more details:
7373

7474
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
7575

76-
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, and whether they are in use. For example:
76+
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, privilege level and whether they are in use. For example:
7777

7878
:::image type="content" source="media/app-governance-visibility-insights-view-apps/permissions.png" alt-text="Screenshot of the Permissions tab.":::
7979

263 KB
Loading
244 KB
Loading
244 KB
Loading

CloudAppSecurityDocs/release-notes.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,32 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22+
## November 2024
23+
24+
### Visibility into app origin (Preview)
25+
26+
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
27+
28+
For more information, see [detailed insights into OAuth apps](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
29+
30+
### Permissions filter and export capabilities (Preview)
31+
32+
Defender for Cloud Apps users who use app governance can utilize the new *Permissions* filter and export capabilities to quickly identify apps with specific permissions to access Microsoft 365.
33+
34+
For more information, see [filters on app governance](/defender-cloud-apps/app-governance-visibility-insights-get-started#view-app-insights).
35+
36+
### Visibility into privilege level for popular Microsoft first-party APIs (Preview)
37+
38+
Defender for Cloud Apps users who use app governance can now gain visibility into privilege level for all popular Microsoft first-party API permissions. The enhanced coverage of privilege level classification will enable you to view and monitor apps with powerful permissions into legacy and other non-Graph APIs that have access to Microsoft 365.
39+
40+
For more information, see [OAuth app permission related details on app governance](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
41+
42+
### Granular data usage insights into EWS API access (Preview)
43+
44+
Defender for Cloud Apps users who use app governance can now get granular insights into data accessed by apps using legacy EWS API alongside Microsoft Graph. The enhanced coverage of data usage insights will enable you to get deeper visibility into apps accessing emails using legacy EWS API.
45+
46+
For more information, see [OAuth app data usage insights on app governance](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
47+
2248
## October 2024
2349
### Internal Session Controls application notice
2450
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
@@ -57,7 +83,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
5783
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
5884

5985
For more information see:
60-
[Enforce Edge in-browser protection when accessing business apps](https://learn.microsoft.com/defender-cloud-apps/in-browser-protection#enforce-edge-in-browser-when-accessing-business-apps)
86+
[Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-edge-in-browser-when-accessing-business-apps)
6187

6288
### Connect Mural to Defender for Cloud Apps (Preview)
6389

0 commit comments

Comments
 (0)