Skip to content

Commit d0cef31

Browse files
Merge pull request #3466 from DeCohen/WI363235-Add-ipv6-ipv4-limitations-information
Add important banner about IPv6 limitations
2 parents 6d72844 + 771c2f4 commit d0cef31

File tree

2 files changed

+10
-4
lines changed

2 files changed

+10
-4
lines changed

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ Session policies don't protect external business-to-business (B2B) collaboration
5454
## Session Controls with Non-Interactive Tokens
5555
Some applications utilize non-interactive access tokens to facilitate seamless redirection between apps within the same suite or realm. When one application is onboarded to Conditional Access App Control and the other is not, session controls may not be enforced as expected. For example, if the Teams client retrieves a non-interactive token for SharePoint Online (SPO), it can initiate an active session in SPO without prompting the user for reauthentication. As a result, the session control mechanism cannot intercept or enforce policies on these sessions. To ensure consistent enforcement, it's recommended to onboard all relevant applications, such as Teams, alongside SPO.
5656

57+
## IPv6 limitations
58+
Access and session policies support IPv4 only. If a request is made over IPv6, IP-based policy rules are not applied. This limitation applies when using both reverse proxy and Edge in-browser protection.
59+
5760
## Limitations for sessions that the reverse proxy serves
5861

5962
The following limitations apply only on sessions that the reverse proxy serves. Users of Microsoft Edge can benefit from in-browser protection instead of using the reverse proxy, so these limitations don't affect them.
@@ -98,6 +101,7 @@ The following table lists example results when you define the **Block upload of
98101

99102
The following limitations apply only on sessions that are served with Edge in-browser protection.
100103

104+
101105
### Deep link is lost when user switches to Edge by clicking 'Continue in Edge'
102106

103107
A user who starts a session in a browser other than Edge, is prompted to switch to Edge by clicking the ‘Continue in Edge’ button.

CloudAppSecurityDocs/troubleshooting-proxy-url.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ For example, Contoso protects its environment using conditional access app contr
2020
So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see the DNS entry or certificate because Contoso does.
2121

2222
> [!NOTE]
23-
> You may also see the following domains in the transparency logs:
23+
> You might also see the following domains in the transparency logs:
2424
>
2525
> - `*.admin-rs-mcas.ms`
2626
> - `*.rs-mcas.ms`
@@ -39,11 +39,12 @@ So even though Fabrikam doesn't actually use Defender for Cloud Apps, they see t
3939
> - `*.admin-mcas-gov-df.ms`
4040
> - `*.mcas-gov-df.ms`
4141
42+
4243
## Here's why you see `*.mcas.ms`, `*.mcas-gov.us`, or `*.mcas-gov.ms` in your URL
4344

4445
This kind of URL is expected and indicates that your organization applies extra security controls to protect business-critical data.
4546

46-
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs and cookies relating to cloud apps that you use.
47+
They do this by using Defender for Cloud Apps, a solution for protecting your organization's cloud environment, to replace all relevant URLs, and cookies relating to cloud apps that you use.
4748

4849
So when you try accessing a cloud app such as Salesforce, SharePoint Online, or AWS, you notice that its URL is suffixed with `.mcas.ms`, `.mcas-gov.us`, or `.mcas-gov.ms`. For example, when using the XYZ app, the URL you're used to seeing changes from `XYZ.com` to `XYZ.com.mcas.ms`.
4950

@@ -52,10 +53,11 @@ If the URL doesn't exactly match one of the replacement patterns, such as `<app_
5253
If you don't recognize the remaining portion of the URL, such as **myurl.com**.mcas.ms, as associated with any of your business apps, we recommend that you investigate the issue further and consider blocking the URL to avoid any potential security risks.
5354

5455
> [!NOTE]
55-
> Microsoft Edge users benefit from in-browser protection, and are not redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
56+
> Microsoft Edge users benefit from in-browser protection, and aren't redirected to a reverse proxy. Your URLs retain their original syntax in Microsoft Edge, even when access and sessions are protected by Defender for Cloud Apps. For more information, see [In-browser protection with Microsoft Edge for Business (Preview)](in-browser-protection.md).
5657
5758
## Related content
5859

60+
- [Known limitations in Conditional Access app control](caac-known-issues.md)
5961
- [Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](proxy-intro-aad.md)
6062
- [Troubleshooting access and session controls for admin users](troubleshooting-proxy.md)
61-
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)
63+
- [Troubleshooting access and session controls for end-users](troubleshooting-proxy-end-users.md)

0 commit comments

Comments
 (0)