Skip to content

Commit be8280f

Browse files
authored
Merge branch 'main' into diannegali-filterupdates
2 parents 210f1f8 + f1f45b3 commit be8280f

File tree

71 files changed

+738
-444
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+738
-444
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,11 @@
994994
"source_path": "CloudAppSecurityDocs/what-is-cloud-app-security.md",
995995
"redirect_url": "/defender-cloud-apps/what-is-defender-for-cloud-apps",
996996
"redirect_document_id": true
997+
},
998+
{
999+
"source_path": "CloudAppSecurityDocs/tutorial-ueba.md",
1000+
"redirect_url": "/defender-cloud-apps/",
1001+
"redirect_document_id": true
9971002
},
9981003
{
9991004
"source_path": "CloudAppSecurityDocs/file-filters.md",

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: In-browser protection with Microsoft Edge for Business | Microsoft Defender for Cloud Apps
33
description: Learn about using in-browser protection with Microsoft Defender for Cloud Apps session policies and Microsoft Edge for Business.
4-
ms.date: 10/31/2024
4+
ms.date: 01/26/2025
55
ms.topic: conceptual
66
#customerIntent: As a Defender for Cloud Apps admin, I want to learn about the user experience with in-browser protection.
77
---
@@ -105,6 +105,8 @@ Administrators who understand the power of Microsoft Edge browser protection can
105105

106106
4. When you're finished on the **Edge for Business protection** page, select **Save**.
107107

108+
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
109+
108110
## Related content
109111

110112
For more information, see [Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md).

CloudAppSecurityDocs/index.yml

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -94,16 +94,6 @@ landingContent:
9494
- text: Threat response governance actions
9595
url: governance-actions.md
9696

97-
- linkListType: how-to-guide
98-
links:
99-
- text: Use in-browser protection with Microsoft Edge
100-
url: in-browser-protection.md
101-
- text: Investigate behaviors by hunting
102-
url: behaviors.md
103-
- text: Investigate anomaly detection alerts
104-
url: investigate-anomaly-alerts.md
105-
- text: Investigate risky users
106-
url: tutorial-ueba.md
10797

10898
# Card (optional)
10999
- title: Information protection

CloudAppSecurityDocs/mde-integration.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,13 +65,12 @@ To enable Defender for Endpoint integration with Defender for Cloud Apps:
6565

6666
1. In the [Microsoft Defender portal](https://security.microsoft.com), from the navigation pane, select **Settings** > **Endpoints** > **General** > **Advanced features**.
6767
1. Toggle the **Microsoft Defender for Cloud Apps** to **On**.
68-
1. Select **Apply**.
68+
1. Select **Save preferences**.
6969

7070
>[!NOTE]
7171
> It takes up to two hours after you enable the integration for the data to show up in Defender for Cloud Apps.
7272
>
73-
74-
![Screenshot of the Defender for Endpoint settings.](media/mde-settings.png)
73+
![Screenshot of the Defender for Endpoint settings.](media\turn-on-advanced-features-for-microsoft-defender-for-cloud-apps.png)
7574

7675
To configure the severity for alerts sent to Microsoft Defender for Endpoint:
7776

429 KB
Loading
-100 KB
Binary file not shown.
174 KB
Loading

CloudAppSecurityDocs/protect-egnyte.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
7979
>[!NOTE]
8080
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
8181
>
82-
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
82+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more information, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
8383
8484
## Next steps
8585

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,6 @@ items:
310310
items:
311311
- name: Investigate anomaly detection alerts
312312
href: investigate-anomaly-alerts.md
313-
- name: Investigate risky users
314-
href: tutorial-ueba.md
315313
- name: Respond to threats
316314
items:
317315
- name: Governing connected apps

CloudAppSecurityDocs/tutorial-ueba.md

Lines changed: 0 additions & 131 deletions
This file was deleted.

0 commit comments

Comments
 (0)