You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/protect-salesforce.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,13 @@ Connecting Salesforce to Defender for Cloud Apps gives you improved insights int
26
26
- Ransomware
27
27
- Unmanaged bring your own device (BYOD)
28
28
29
+
30
+
### Prerequisites
31
+
32
+
- Install and authorize the Salesforce Connected App in the target Salesforce org before you start the connection process. Salesforce enforces usage restrictions on Connected Apps. For more information, see:[Prepare for Connected App Usage Restrictions Change](https://help.salesforce.com/s/articleView?id=005132365&type=1)
33
+
34
+
- Assign the **Approve Uninstalled Connected Apps** permission to the Salesforce service account used to connect Microsoft Defender for Cloud Apps. Salesforce requires this permission to connect third-party apps via OAuth.
35
+
29
36
## How Defender for Cloud Apps helps to protect your environment
30
37
31
38
-[Detect cloud threats, compromised accounts, and malicious insiders](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware)
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Using Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
29
29
30
-
Watch the following video to learn more about Defender Vulnerability Management.
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
36
32
@@ -74,7 +70,23 @@ Enable security administrators and IT administrators to collaborate and seamless
74
70
-**Alternate mitigations** - Gain insights on other mitigations, such as configuration changes that can reduce risk associated with software vulnerabilities.
75
71
-**Real-time remediation status** - Real-time monitoring of the status and progress of remediation activities across the organization.
76
72
77
-
## Navigation pane
73
+
## Vulnerability management experience in Microsoft Defender portal
|[**Exposure management > Vulnerability management > Overview**](tvm-dashboard-insights.md)|Get a high-level view of your organization's vulnerability information, including the endpoints exposure score, top recommendations, events, vulnerable software, remediation activities, and more. |
82
+
|[**Exposure management > Recommendations**](tvm-security-recommendation.md)|See all Microsoft security recommendations in a single, streamlined experience. The **Vulnerabilities** section lists security recommendations and related threat information, where you can dive into recommendations related to specific vulnerabilities. |
83
+
|[**Exposure management > Vulnerability management > Remediation**](tvm-remediation.md)|See remediation activities you've created and recommendation exceptions.|
84
+
|[**Exposure management > Vulnerability management > Inventories**](tvm-software-inventory.md)|Discover and assess all your organization's assets in a single view.|
85
+
|[**Exposure management > Vulnerability management > Vulnerabilities**](tvm-weaknesses.md)|See the list of common vulnerabilities and exposures (CVEs) in your organization.|
86
+
|[**Exposure management > Vulnerability management > Overview > Top impactful events**](threat-and-vuln-mgt-event-timeline.md)|View events that may impact your organization's risk. You can also access the event timeline from the **Recommendations > Score history** section.|
87
+
|[**Exposure management > Vulnerability management > Baseline assessments**](tvm-security-baselines.md)|Monitor security baseline compliance and identify changes in real-time.|
88
+
89
+
# [Existing customers](#tab/existing-customers)
78
90
79
91
|Area|Description|
80
92
|---|---|
@@ -86,6 +98,8 @@ Enable security administrators and IT administrators to collaborate and seamless
86
98
|[**Event timeline**](threat-and-vuln-mgt-event-timeline.md)|View events that may impact your organization's risk.|
87
99
|[**Baselines assessment**](tvm-security-baselines.md)|Monitor security baseline compliance and identify changes in real-time.|
88
100
101
+
---
102
+
89
103
## APIs
90
104
91
105
Run vulnerability management related API calls to automate vulnerability management workflows. To get started, see [Supported Microsoft Defender for Endpoint APIs](/defender-endpoint/api/exposed-apis-list).
-[Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
27
-
-[Microsoft Defender XDR](/defender-xdr)
28
-
-[Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
28
+
Security recommendations can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
29
29
30
30
Security recommendations in Defender Vulnerability Management can help reduce your overall vulnerability exposure and your exposure score. A robust update process is key when it comes to addressing these recommendations in your organization. If an update hasn't completed for some devices due to a pending restart, the effect of addressing the security recommendation isn't reflected in your exposure score.
31
31
@@ -41,15 +41,15 @@ The **Pending restart** tag helps you identify devices in this state so you can
41
41
42
42
The device restart status is visible in the following experiences in the Microsoft Defender portal.
43
43
44
-
### Security recommendations page
44
+
### Recommendations page
45
45
46
-
On the security recommendations pages, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
46
+
On the **Recommendations** page, filter by the **Pending restart** tag to only see security recommendations with devices pending a restart.
47
47
48
48
:::image type="content" alt-text="pending restart tag in the security recommendations page." source="/defender/media/defender-vulnerability-management/pending-restart.png" lightbox="/defender/media/defender-vulnerability-management/pending-restart.png":::
49
49
50
50
### Software page
51
51
52
-
On the software page filter by, the **Pending restart** tag to see missing KBs with devices that are pending a restart:
52
+
On the software page filter by the **Pending restart** tag to see missing KBs with devices that are pending a restart:
53
53
54
54
:::image type="content" alt-text="pending restart tag in the software page." source="/defender/media/defender-vulnerability-management/pending-restart-KB.png" lightbox="/defender/media/defender-vulnerability-management/pending-restart-KB.png":::
0 commit comments