Skip to content

Commit c90aa64

Browse files
Merge pull request #4408 from drormikdash/docs-editor/governance-discovery-1726489711
adding a note to section "Sanctioning/unsanctioning an app" under image
2 parents eb0c822 + 07e2866 commit c90aa64

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

CloudAppSecurityDocs/governance-discovery.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ You can mark a specific risky app as unsanctioned by clicking the three dots at
1717

1818
:::image type="content" source="media/tag-as-unsanctioned.png" alt-text="Tag as unsanctioned." lightbox="media/tag-as-unsanctioned.png":::
1919

20+
> [!NOTE]
21+
> An app that is onboarded to inline proxy or connected via app connector, all such applications would be auto sanctioned state in Cloud Discovery.
2022
## Blocking apps with built-in streams
2123

2224
If your tenant uses Microsoft Defender for Endpoint, once you mark an app as unsanctioned, it's automatically blocked. Moreover, you can scope blocking to specific Defender for Endpoint device groups, monitor applications, and use the [warn and educate](mde-govern.md#educate-users-when-accessing-risky-apps) features. For more information, see [Govern discovered apps using Microsoft Defender for Endpoint](mde-govern.md).
@@ -31,18 +33,18 @@ Defender for Cloud Apps enables you to block access to unsanctioned apps by usin
3133

3234
:::image type="content" source="media/tag-as-unsanctioned.png" alt-text="Tag as unsanctioned." lightbox="media/tag-as-unsanctioned.png":::
3335

34-
2. In the title bar, select **Actions** and then select **Generate block script...**.
36+
1. In the title bar, select **Actions** and then select **Generate block script...**.
3537

3638
![Generate block script.](media/generate-block-script.png)
37-
38-
3. In **Generate block script**, select the appliance you want to generate the block script for.
39+
40+
1. In **Generate block script**, select the appliance you want to generate the block script for.
3941

4042
![Generate block script pop-up.](media/generate-block-script-pop-up.png)
41-
42-
4. Then select the **Generate script** button to create a block script for all your unsanctioned apps. By default, the file is named with the date on which it was exported and the appliance type you selected. *2017-02-19_CAS_Fortigate_block_script.txt* would be an example file name.
43+
44+
1. Then select the **Generate script** button to create a block script for all your unsanctioned apps. By default, the file is named with the date on which it was exported and the appliance type you selected. *2017-02-19_CAS_Fortigate_block_script.txt* would be an example file name.
4345

4446
![Generate block script button.](media/generate-block-script-button.png)
45-
47+
4648
5. Import the file created to your appliance.
4749

4850
## Blocking unsupported streams

0 commit comments

Comments
 (0)