Skip to content

Commit b3845dc

Browse files
authored
Merge branch 'main' into WI401979-new-oauth-app-table-release-note
2 parents f075c82 + 8020d5c commit b3845dc

File tree

3 files changed

+9
-3
lines changed

3 files changed

+9
-3
lines changed

CloudAppSecurityDocs/get-started.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,11 @@ After you connect an app, you can gain deeper visibility so you can investigate
6161

6262
**How to page**: [Protect sensitive information with DLP policies](policies-information-protection.md)
6363

64-
**Recommended task**: Enable file monitoring and create file policies
64+
**Recommended tasks**
65+
66+
- Enable file monitoring and create file policies
67+
68+
- To enable File monitoring of Microsoft 365 files, you are required to use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
6569

6670
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**.
6771
1. Under **Information Protection**, select **Files**.
@@ -70,8 +74,6 @@ After you connect an app, you can gain deeper visibility so you can investigate
7074
1. Select the required settings and then select **Save**.
7175
1. In [Step 3](#step-3-control-cloud-apps-with-policies), create [File policies](data-protection-policies.md) to meet your organizational requirements.
7276

73-
> [!TIP]
74-
> You can view files from your connected apps by browsing to **Cloud Apps** > **Files** in the Microsoft Defender Portal.
7577

7678
**Migration recommendation**
7779
We recommend using Defender for Cloud Apps sensitive information protection in parallel with your current Cloud Access Security Broker (CASB) solution. Start by [connecting the apps you want to protect](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md) to Microsoft Defender for Cloud Apps. Since API connectors use out-of-band connectivity, no conflict will occur. Then progressively migrate your [policies](control-cloud-apps-with-policies.md) from your current CASB solution to Defender for Cloud Apps.

CloudAppSecurityDocs/manage-admins.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Microsoft Defender for Cloud Apps supports role-based access control. This artic
2020
>
2121
> - Microsoft 365 and Microsoft Entra roles aren't listed in the Defender for Cloud Apps **Manage admin access** page. To assign roles in Microsoft 365 or Microsoft Entra ID, go to the relevant RBAC settings for that service.
2222
> - Defender for Cloud Apps uses Microsoft Entra ID to determine the user's [directory level inactivity timeout setting](/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin). If a user is configured in Microsoft Entra ID to never sign out when inactive, the same setting will apply in Defender for Cloud Apps as well.
23+
> - Defender for Cloud Apps Information Protection enablement requires an Entra Admin ID, such as: Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference) and [Protect your Microsoft 365 environment](/defender-cloud-apps/protect-office-365)
2324
2425
By default, the following Microsoft 365 and [Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) admin roles have access to Defender for Cloud Apps:
2526

CloudAppSecurityDocs/release-notes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,10 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22+
2223
## April 2025
2324

25+
2426
### OAuthAppInfo table added to Defender XDR advanced hunting (Preview)
2527

2628
The [OAuthAppInfo](/defender-xdr/advanced-hunting-oauthappinfo-table) table is now available in Defender XDR advanced hunting, enabling security teams to explore and analyze OAuth app-related metadata with enhanced visibility.
@@ -35,6 +37,7 @@ The page surfaces key insights such as risk scores, usage patterns, publisher ve
3537

3638
For more information, see [Application inventory overview](applications-inventory.md)
3739

40+
3841
## March 2025
3942

4043
### Enhanced Identity Inventory (Preview)

0 commit comments

Comments
 (0)