Skip to content

Commit b8406e5

Browse files
authored
Merge branch 'main' into mde-fixes
2 parents 54f4eaa + 8020d5c commit b8406e5

30 files changed

+433
-49
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,11 @@
10041004
"source_path": "CloudAppSecurityDocs/file-filters.md",
10051005
"redirect_url": "/defender-cloud-apps/data-protection-policies",
10061006
"redirect_document_id": false
1007+
},
1008+
{
1009+
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
1010+
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
1011+
"redirect_document_id": true
10071012
}
10081013
]
10091014
}
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Application inventory
3+
ms.date: 03/20/2025
4+
ms.topic: overview
5+
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
7+
---
8+
# Applications inventory (Preview)
9+
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and OAuth connected apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Defender for Cloud apps Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11+
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12+
13+
The Application page includes the following tabs:
14+
15+
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16+
* OAuth apps: Displays a list of OAuth apps such as Microsoft Entra ID, Google workspace and Salesforce.
17+
18+
## Navigate to the Applications page
19+
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Applications**. Or, to go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21+
22+
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
23+
24+
:::image type="content" source="media/banner-message-on-app-governance-pages.png" alt-text="Screenshot of the App Governance page with a banner about the new unified application inventory experience for managing OAuth and SaaS apps" lightbox="media/banner-message-on-app-governance-pages.png":::
25+
26+
There are several options you can choose from to customize the SaaS apps and OAuth apps list view. In the top navigation panel you can:
27+
28+
* Add or remove columns.
29+
* Export the entire list in CSV format.
30+
* Select the number of items to show per page.
31+
* Apply filters
32+
33+
> [!NOTE]
34+
>When exporting the applications list to a CSV file, a maximum of 1000 SaaS or OAuth apps are displayed.
35+
36+
The following image depicts the SaaS apps list:
37+
:::image type="content" source="media/applications-tab-in-the-defender-portal.png" alt-text="Screenshot of the applications tab in the Defender portal" lightbox="media/applications-tab-in-the-defender-portal.png"
38+
39+
40+
## SaaS app details
41+
42+
At the top of Saas app tab, you can find actionable insights that allow you to quickly identify apps that need your attention and focus. The following details are displayed:
43+
44+
* **Untagged high risk apps** – Shows apps that aren't tagged and have a high-risk.
45+
* **Untagged high traffic apps** – Shows apps that aren't tagged and have a high usage traffic (greater than 1 GB of data traffic).
46+
* **Untagged GenAI apps** – Shows apps that aren't tagged and are Gen-AI based.
47+
48+
## Sort and filter the SaaS apps list
49+
50+
You can use the sort and filter functionality to get a more focused view. These controls also help you assess and manage the SaaS applications in your organization.
51+
52+
|Filter |Description |
53+
|---------|---------|
54+
|**App tags** | Select **Sanctioned**, **Unsanctioned**, or create custom tags to use in a customized filter. |
55+
|**App** | Filter for specific SaaS apps. |
56+
|**Categories** | Filter according to app categories. |
57+
|**Compliance risk factor** | Filter for specific standards, certifications, and compliance your app might comply with. For example: HIPAA, ISO 27001, SOC 2, and PCI-DSS. |
58+
| **Risk score** | Filter by a specific risk score, such as to view only risky apps. |
59+
|**Security risk factor** | Filter based on specific security measures, such as encryption at rest, multifactor authentication, and others.
60+
|
61+
62+
### OAuth Apps
63+
64+
The OAuth apps tab provides visibility into Microsoft 365, Google workspace and Salesforce. Admins can review applications and decide to disable the apps or apply policies to monitor their behavior in their environment.
65+
66+
* **New apps** – Shows apps added in the last 30 days (Available for Microsoft 365)
67+
68+
* **Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
69+
70+
* **Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
71+
72+
* **Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
73+
74+
For more information on how to create app policies, see:[Create app policies in app governance](app-governance-app-policies-create.md)
75+
76+
The following image depicts the OAuth apps list:
77+
78+
:::image type="content" source="media/oauth-tab-in-the-applications-page.png" alt-text="Screenshot of a list of OAuth apps in the applications page in the Defender portal" lightbox="media/oauth-tab-in-the-applications-page.png":::
79+
80+
## Sort and filter the OAuth apps list
81+
82+
You can apply the following filters to get a more focused view:
83+
84+
|Column name |Description |
85+
|---------|---------|
86+
| **App name** | The display name of the app as registered on Microsoft Entra ID. |
87+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom. |
88+
| **Graph API access**| Shows whether the app has at least one Graph API permission. |
89+
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions. |
90+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
91+
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
92+
| **Publisher**| Publisher of the app and their verification status. |
93+
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
94+
| **Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
95+
| **Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
96+
| **Data usage**| Total data downloaded or uploaded by the app in the last 30 days. |
97+
| **Privilege level** | The app's privilege level. |
98+
| **Certification**| Indicates if an app meets stringent security and compliance standards set by Microsoft 365 or if its publisher has publicly attested to its safety. |
99+
| **Sensitivity label accessed**| Sensitivity labels on content accessed by the app |
100+
| **Service accessed**| Microsoft 365 services accessed by the app
101+
|
102+
103+
104+
> [!TIP]
105+
> To see all columns, you might need to do one or more of the following steps:
106+
> * Horizontally scroll in your web browser.
107+
> * Narrow the width of appropriate columns.
108+
> * Zoom out in your web browser.
109+
110+
## Next steps
111+
112+
> [!div class="nextstepaction"]
113+
> [Best practices for protecting your organization](best-practices.md)
114+
115+
[!INCLUDE [Open support ticket](includes/support.md)]

CloudAppSecurityDocs/get-started.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,11 @@ After you connect an app, you can gain deeper visibility so you can investigate
6161

6262
**How to page**: [Protect sensitive information with DLP policies](policies-information-protection.md)
6363

64-
**Recommended task**: Enable file monitoring and create file policies
64+
**Recommended tasks**
65+
66+
- Enable file monitoring and create file policies
67+
68+
- To enable File monitoring of Microsoft 365 files, you are required to use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
6569

6670
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**.
6771
1. Under **Information Protection**, select **Files**.
@@ -70,8 +74,6 @@ After you connect an app, you can gain deeper visibility so you can investigate
7074
1. Select the required settings and then select **Save**.
7175
1. In [Step 3](#step-3-control-cloud-apps-with-policies), create [File policies](data-protection-policies.md) to meet your organizational requirements.
7276

73-
> [!TIP]
74-
> You can view files from your connected apps by browsing to **Cloud Apps** > **Files** in the Microsoft Defender Portal.
7577

7678
**Migration recommendation**
7779
We recommend using Defender for Cloud Apps sensitive information protection in parallel with your current Cloud Access Security Broker (CASB) solution. Start by [connecting the apps you want to protect](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md) to Microsoft Defender for Cloud Apps. Since API connectors use out-of-band connectivity, no conflict will occur. Then progressively migrate your [policies](control-cloud-apps-with-policies.md) from your current CASB solution to Defender for Cloud Apps.

CloudAppSecurityDocs/manage-admins.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Microsoft Defender for Cloud Apps supports role-based access control. This artic
2020
>
2121
> - Microsoft 365 and Microsoft Entra roles aren't listed in the Defender for Cloud Apps **Manage admin access** page. To assign roles in Microsoft 365 or Microsoft Entra ID, go to the relevant RBAC settings for that service.
2222
> - Defender for Cloud Apps uses Microsoft Entra ID to determine the user's [directory level inactivity timeout setting](/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin). If a user is configured in Microsoft Entra ID to never sign out when inactive, the same setting will apply in Defender for Cloud Apps as well.
23+
> - Defender for Cloud Apps Information Protection enablement requires an Entra Admin ID, such as: Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference) and [Protect your Microsoft 365 environment](/defender-cloud-apps/protect-office-365)
2324
2425
By default, the following Microsoft 365 and [Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) admin roles have access to Defender for Cloud Apps:
2526

135 KB
Loading
14 KB
Loading
7.31 KB
Loading
112 KB
Loading

CloudAppSecurityDocs/release-notes.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,18 @@ For more information on what's new with other Microsoft Defender security produc
1919

2020
For news about earlier releases, see [Archive of past updates for Microsoft Defender for Cloud Apps](release-note-archive.md).
2121

22+
23+
## April 2025
24+
25+
### New Applications page in Defender XDR (Preview)
26+
27+
The new Applications page consolidates all SaaS and connected OAuth applications into a single, unified inventory. This centralized view streamlines application discovery, monitoring, and management, providing greater visibility and control across your environment.
28+
29+
The page surfaces key insights such as risk scores, usage patterns, publisher verification status, and privilege levels. These insights help you quickly identify and address high-risk or untagged applications.
30+
31+
For more information, see [Application inventory overview](applications-inventory.md)
32+
33+
2234
## March 2025
2335

2436
### Enhanced Identity Inventory (Preview)

CloudAppSecurityDocs/toc.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,6 @@ items:
118118
href: protect-zendesk.md
119119
- name: Zoom
120120
href: protect-zoom.md
121-
- name: Troubleshooting API connectors using error messages
122-
href: troubleshooting-api-connectors-using-error-messages.md
123121
- name: Cloud app discovery
124122
items:
125123
- name: Overview
@@ -157,6 +155,8 @@ items:
157155
href: log-collector-advanced-management.md
158156
- name: Use the custom log parser
159157
href: custom-log-parser.md
158+
- name: Troubleshooting API connector errors
159+
href: troubleshooting-api-connectors-errors.md
160160
- name: Integrate with Microsoft Defender for Endpoint
161161
items:
162162
- name: Overview
@@ -424,6 +424,12 @@ items:
424424
href: app-activity-threat-hunting.md
425425
- name: App governance FAQ
426426
href: app-governance-faq.yml
427+
- name: Investigate and respond
428+
items:
429+
- name: Assets
430+
items:
431+
- name: Applications inventory
432+
href: applications-inventory.md
427433
- name: Operations guide
428434
items:
429435
- name: Operations guide overview

0 commit comments

Comments
 (0)