Skip to content

Commit c471aab

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into WI493429-standardizing-mde-operating-systems
2 parents a8d8171 + 7c683d2 commit c471aab

File tree

2 files changed

+11
-13
lines changed

2 files changed

+11
-13
lines changed

defender-for-cloud-apps/protect-smartsheet.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your Smartsheet | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your Smartsheet app to Defender for Cloud Apps using the API connector.
4-
ms.date: 12/06/2023
4+
ms.date: 10/05/2025
55
ms.topic: how-to
66
ms.reviewer: AmitMishaeli
77
---
@@ -64,16 +64,16 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
6464

6565
### Prerequisites
6666

67+
- You must have a Smartsheet license that is part of an Enterprise plan with the Platinum package.
6768
- The Smartsheet user used to log in to Smartsheet must be a System Admin.
6869
- Event Reporting must be enabled by Smartsheet, either through standalone purchase or via an Enterprise plan with the Advance Platinum package.
70+
- Smartsheet accounts must be in the **smartsheet.com** domain. These domains are not currently supported:
71+
- smartsheet.au
72+
- smartsheet.eu
73+
- smartsheetgov.com
6974

7075
### Configure Smartsheet
7176

72-
>[!NOTE]
73-
>The Smartsheet license must be an Enterprise plan with the Platinum package.
74-
>
75-
>Smartsheet accounts hosted in the EU region (the .eu domain suffix) aren't currently supported.
76-
7777
1. Register to add Developer Tools to your existing Smartsheet account:
7878
1. Go to the [Developer Sandbox Account Registration](https://developers.smartsheet.com/register/) page.
7979

@@ -101,12 +101,6 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
101101
- **App URL**: `https://portal.cloudappsecurity.com`
102102
- **App contact/support**: `https://learn.microsoft.com/cloud-app-security/support-and-ts`
103103
- **App redirect URL**: `https://portal.cloudappsecurity.com/api/oauth/saga`
104-
105-
> [!NOTE]
106-
>
107-
> - For US Government GCC customers, enter the following value: `https://portal.cloudappsecuritygov.com/api/oauth/saga`
108-
> - For US Government GCC High customers, enter the following value: `https://portal.cloudappsecurity.us/api/oauth/saga`
109-
110104
- **Publish App?**: Select.
111105
- **Logo**: Leave blank.
112106

defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,11 @@ This article provides information about new features and important product updat
2323
2424
## October 2025
2525

26-
- (Preview) You can now use CVE exceptions to exclude specific Common Vulnerabilities and Exposures (CVEs) from analysis in your environment. CVE exceptions allow you to control what type of data is relevant to your organization and to selectively exclude certain data from your remediation efforts. For more information, see [Exceptions in Microsoft Defender Vulnerability Management](tvm-exception-overview.md) and [Create, view, and manage exceptions](tvm-exception.md).
26+
- (Preview) You can now use **CVE exceptions** to exclude specific Common Vulnerabilities and Exposures (CVEs) from analysis in your environment. CVE exceptions allow you to control what type of data is relevant to your organization and to selectively exclude certain data from your remediation efforts. For more information, see [Exceptions in Microsoft Defender Vulnerability Management](tvm-exception-overview.md) and [Create, view, and manage exceptions](tvm-exception.md).
27+
- (Preview) **Microsoft Secure Score now includes new recommendations** to help organizations proactively prevent common endpoint attack techniques.
28+
- **Block web shell creation on servers** – reduces the risk of web-based persistence and remote code execution attacks.
29+
- **Block use of copied or impersonated system tools** – helps prevent attacker misuse of legitimate administrative utilities for lateral movement or privilege escalation.
30+
- **Block rebooting a machine in Safe Mode** – helps defend against attackers who attempt to disable endpoint protection or persist through reboots.
2731

2832
## November 2024
2933

0 commit comments

Comments
 (0)