Skip to content

Commit c35d324

Browse files
committed
remove redundant and repetitive sentences
1 parent 97cc7f7 commit c35d324

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

CloudAppSecurityDocs/content-inspection.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,14 @@ You can also define which file elements are inspected—content, metadata, or fi
1717

1818
## Prerequisites
1919

20-
To inspect encrypted files, a [Global Administrator](/entra/identity/enterprise-apps/configure-admin-consent-workflow) must first grant one‑time admin consent to Defender for Cloud Apps in Microsoft Entra ID.
20+
To inspect encrypted files, and enable scanning of labels a [Global Administrator](/entra/identity/enterprise-apps/configure-admin-consent-workflow) must first grant one‑time admin consent to Defender for Cloud Apps in Microsoft Entra ID.
2121

2222
To do this, in the Defender portal go to **Settings > Cloud Apps > Microsoft Information Protection > Inspect protected files**, and select **Grant permission**.
2323

2424

2525
## Content inspection for protected files
2626

27-
Defender for Cloud Apps allows admins to grant permission to decrypt encrypted files and scan their content for violations. This consent is also required to enable scanning labels on encrypted files.
28-
29-
When you grant consent, Defender for Cloud Apps provisions the Microsoft Cloud App Security (Internal) app in your tenant. This app must remain enabled. The app uses the Azure Rights Management Services > Content.SuperUser permission to decrypt and inspect protected files.
27+
Once consent is granted, Defender for Cloud Apps provisions the Microsoft Cloud App Security (Internal) app in your tenant. The app uses the Azure Rights Management Services > Content.SuperUser permission to decrypt and inspect protected files.
3028

3129
The following app IDs apply based on your Microsoft cloud environment:
3230

0 commit comments

Comments
 (0)