Skip to content

Commit aebfedb

Browse files
authored
pencil edits
1 parent a6d4a68 commit aebfedb

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@ For instance, these scenarios are served by the reverse proxy:
3939
- Microsoft Edge users in InPrivate mode
4040
- Microsoft Edge users with older browser versions
4141
- B2B guest users
42-
- Session is scoped to conditional access policy defined in Entra ID portal
42+
- Session is scoped to conditional access policy defined in Microsoft Entra ID portal
4343

4444
## User experience with in-browser protection
4545

4646
To confirm that in-browser protection is active, users need to click on the “lock” icon in the browser's address bar and look for the “suitcase” symbol in the form that appears. The symbol indicates that the session is protected by Defender for Cloud Apps. For example:
4747

48-
![Edge-in-browser-indication](media/in-browser-protection/edge-in-browser-indication.png)
48+
![Screenshot of Edge in browser indication.](media/in-browser-protection/edge-in-browser-indication.png)
4949

5050
Also, the `.mcas.ms` suffix doesn't appear in the browser address bar with in-browser protection, as it does with standard Conditional Access app control, and developer tools are turned off with in-browser protection.
5151

0 commit comments

Comments
 (0)