You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/azip-integration.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,7 +76,7 @@ All you have to do to integrate Microsoft Purview with Defender for Cloud Apps i
76
76
77
77
To enable Defender for Cloud Apps to scan files with content inspection enabled for sensitivity labels:
78
78
79
-
In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Then go to **Information Protection** -> **Microsoft Information Protection**.
79
+
In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Then go to **Information Protection** -> **Microsoft Information Protection**.
80
80
81
81
1. Under **Microsoft Information Protection settings**, select **Automatically scan new files for sensitivity labels from Microsoft Information Protection and content inspection warnings**.
82
82
@@ -91,7 +91,7 @@ After enabling Microsoft Purview, you'll be able to see files that have sensitiv
91
91
92
92
By default, Defender for Cloud Apps scans sensitivity labels that were defined in your organization and external ones defined by other organizations.
93
93
94
-
To ignore sensitivity labels set external to your organization, go to the Microsoft Defender Portal and select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, select **Microsoft Information Protection**. Then select **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**.
94
+
To ignore sensitivity labels set external to your organization, go to the Microsoft Defender Portal and select **Settings**. Then choose **Cloud Apps**. Under **Information Protection**, select **Microsoft Information Protection**. Then select **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**.
95
95
96
96

97
97
@@ -112,7 +112,7 @@ To ignore sensitivity labels set external to your organization, go to the Micros
112
112
113
113
4. You can also remove sensitivity labels by choosing the **Remove sensitivity label** option.
114
114
115
-
For more information about how Defender for Cloud Apps and Microsoft Purview work together, see [Automatically apply sensitivity labels from Microsoft Purview](use-case-information-protection.md).
115
+
For more information about how Defender for Cloud Apps and Microsoft Purview work together, see [Automatically apply sensitivity labels from Microsoft Purview](use-case-information-protection.md).
116
116
117
117
### Automatically label files
118
118
@@ -148,8 +148,8 @@ Follow these instructions to create the file policy:
148
148
149
149
1. Then, you can create file policies in Defender for Cloud Apps to control files that are shared inappropriately and find files that are labeled and were recently modified.
150
150
151
-
- You can create a policy that automatically applies a sensitivity label to specific files.
152
-
- You can also trigger alerts on activities related to file classification.
151
+
- You can create a policy that automatically applies a sensitivity label to specific files.
152
+
- You can also trigger alerts on activities related to file classification.
153
153
154
154
> [!NOTE]
155
155
> When sensitivity labels are disabled on a file, the disabled labels appear as disabled in Defender for Cloud Apps. Deleted labels are not displayed.
0 commit comments