Skip to content

Commit da33123

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-ma-1743007034
2 parents 7d1e71e + d0f78bb commit da33123

File tree

159 files changed

+1854
-1311
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+1854
-1311
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ permissions:
55

66
on:
77
schedule:
8-
- cron: "0 */12 * * *"
8+
- cron: "0 9 1 * *"
99

10-
workflow_dispatch:
10+
# workflow_dispatch:
1111

1212

1313
jobs:
@@ -21,6 +21,6 @@ jobs:
2121
"ExampleBranch1",
2222
"ExampleBranch2"
2323
]'
24-
ReportOnly: true
24+
ReportOnly: false
2525
secrets:
2626
AccessToken: ${{ secrets.GITHUB_TOKEN }}

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,11 @@
10041004
"source_path": "CloudAppSecurityDocs/file-filters.md",
10051005
"redirect_url": "/defender-cloud-apps/data-protection-policies",
10061006
"redirect_document_id": false
1007+
},
1008+
{
1009+
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
1010+
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
1011+
"redirect_document_id": true
10071012
}
10081013
]
10091014
}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,16 @@
124124
"source_path": "defender-endpoint/non-windows.md",
125125
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint",
126126
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "defender-endpoint/configure-endpoints-non-windows.md",
130+
"redirect_url": "/defender-endpoint/onboarding",
131+
"redirect_document_id": true
132+
},
133+
{
134+
"source_path": "defender-endpoint/configure-server-endpoints.md",
135+
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136+
"redirect_document_id": true
127137
}
128138
]
129139
}

ATPDocs/identity-inventory.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,13 +36,16 @@ There are several options you can choose from to customize the identities list v
3636

3737
- Apply filters.
3838

39-
- Search for an identity by name or full UPN, Sid and Object ID.
39+
- Search for an identity by name or full UPN, SID and Object ID.
4040

4141
- Export the list to a CSV file.
4242

4343
- Copy list link with the included filters configured.
4444

45-
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
45+
> [!NOTE]
46+
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
47+
48+
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
4649

4750
### Identity details
4851

@@ -120,7 +123,7 @@ You can use this information to help you prioritize devices for security posture
120123

121124
### Navigate to the Identity inventory page
122125

123-
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to Assets > Identities. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
126+
In the Defender XDR portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Assets** > **Identities**. Or, to navigate directly to the [identity inventory](/defender-for-identity/identity-inventory) page.
124127

125128
### Related Articles
126129

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Application inventory
3+
ms.date: 03/20/2025
4+
ms.topic: overview
5+
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
7+
---
8+
# Applications inventory (Preview)
9+
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and connected OAuth apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11+
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12+
13+
The Applications page includes the following tabs:
14+
15+
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16+
* OAuth apps: A comprehensive view of OAuth apps registered on Microsoft Entra ID, Google workspace and Salesforce. This tab highlights OAuth apps metadata, publisher info and app origin, permissions used, data accessed and other insights.
17+
18+
## Navigate to the Applications page
19+
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** > **Applications**. Or, go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21+
22+
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
23+
24+
:::image type="content" source="media/banner-message-on-app-governance-pages.png" alt-text="Screenshot of the App Governance page with a banner about the new unified application inventory experience for managing OAuth and SaaS apps" lightbox="media/banner-message-on-app-governance-pages.png":::
25+
26+
There are several options you can choose from to customize the SaaS apps and OAuth apps list view. In the top navigation panel you can:
27+
28+
* Add or remove columns.
29+
* Export the entire list in CSV format.
30+
* Select the number of items to show per page.
31+
* Apply filters
32+
33+
> [!NOTE]
34+
>When exporting the applications list to a CSV file, a maximum of 1000 SaaS or OAuth apps are displayed.
35+
36+
The following image depicts the SaaS apps list:
37+
:::image type="content" source="media/applications-tab-in-the-defender-portal.png" alt-text="Screenshot of the applications tab in the Defender portal" lightbox="media/applications-tab-in-the-defender-portal.png"
38+
39+
40+
## SaaS app details
41+
42+
At the top of Saas app tab, you can find actionable insights that allow you to quickly identify apps that need your attention and focus. The following details are displayed:
43+
44+
* **Untagged high risk apps** – Shows apps that aren't tagged and have a high-risk.
45+
* **Untagged high traffic apps** – Shows apps that aren't tagged and have a high usage traffic (greater than 1 GB of data traffic).
46+
* **Untagged GenAI apps** – Shows apps that aren't tagged and are Gen-AI based.
47+
48+
## Sort and filter the SaaS apps list
49+
50+
You can use the sort and filter functionality to get a more focused view. These controls also help you assess and manage the SaaS applications in your organization.
51+
52+
|Filter |Description |
53+
|---------|---------|
54+
|**App tags** | Select **Sanctioned**, **Unsanctioned**, or create custom tags to use in a customized filter. |
55+
|**App** | Filter for specific SaaS apps. |
56+
|**Categories** | Filter according to app categories. |
57+
|**Compliance risk factor** | Filter for specific standards, certifications, and compliance your app might comply with. For example: HIPAA, ISO 27001, SOC 2, and PCI-DSS. |
58+
| **Risk score** | Filter by a specific risk score, such as to view only risky apps. |
59+
|**Security risk factor** | Filter based on specific security measures, such as encryption at rest, multifactor authentication, and others.
60+
|
61+
62+
### OAuth Apps
63+
64+
The OAuth apps tab provides visibility into Microsoft 365, Google workspace and Salesforce. Admins can review applications and decide to disable the apps or apply policies to monitor their behavior in their environment.
65+
66+
* **New apps** – Shows apps added in the last 30 days (Available for Microsoft 365)
67+
68+
* **Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
69+
70+
* **Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
71+
72+
* **Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
73+
74+
For more information on how to create app policies, see:[Create app policies in app governance](app-governance-app-policies-create.md)
75+
76+
The following image depicts the OAuth apps list:
77+
78+
:::image type="content" source="media/oauth-tab-in-the-applications-page.png" alt-text="Screenshot of a list of OAuth apps in the applications page in the Defender portal" lightbox="media/oauth-tab-in-the-applications-page.png":::
79+
80+
## Sort and filter the OAuth apps list
81+
82+
You can apply the following filters to get a more focused view:
83+
84+
|Column name |Description |
85+
|---------|---------|
86+
| **App name** | The display name of the app as registered on Microsoft Entra ID. |
87+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom. |
88+
| **Graph API access**| Shows whether the app has at least one Graph API permission. |
89+
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions. |
90+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
91+
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
92+
| **Publisher**| Publisher of the app and their verification status. |
93+
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
94+
| **Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
95+
| **Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
96+
| **Data usage**| Total data downloaded or uploaded by the app in the last 30 days. |
97+
| **Privilege level** | The app's privilege level. |
98+
| **Certification**| Indicates if an app meets stringent security and compliance standards set by Microsoft 365 or if its publisher has publicly attested to its safety. |
99+
| **Sensitivity label accessed**| Sensitivity labels on content accessed by the app |
100+
| **Service accessed**| Microsoft 365 services accessed by the app
101+
|
102+
103+
104+
> [!TIP]
105+
> To see all columns, you might need to do one or more of the following steps:
106+
> * Horizontally scroll in your web browser.
107+
> * Narrow the width of appropriate columns.
108+
> * Zoom out in your web browser.
109+
110+
## Next steps
111+
112+
> [!div class="nextstepaction"]
113+
> [Best practices for protecting your organization](best-practices.md)
114+
115+
[!INCLUDE [Open support ticket](includes/support.md)]

CloudAppSecurityDocs/get-started.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,11 @@ After you connect an app, you can gain deeper visibility so you can investigate
6161

6262
**How to page**: [Protect sensitive information with DLP policies](policies-information-protection.md)
6363

64-
**Recommended task**: Enable file monitoring and create file policies
64+
**Recommended tasks**
65+
66+
- Enable file monitoring and create file policies
67+
68+
- To enable File monitoring of Microsoft 365 files, you are required to use a relevant Entra Admin ID, such as Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference).
6569

6670
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**.
6771
1. Under **Information Protection**, select **Files**.
@@ -70,8 +74,6 @@ After you connect an app, you can gain deeper visibility so you can investigate
7074
1. Select the required settings and then select **Save**.
7175
1. In [Step 3](#step-3-control-cloud-apps-with-policies), create [File policies](data-protection-policies.md) to meet your organizational requirements.
7276

73-
> [!TIP]
74-
> You can view files from your connected apps by browsing to **Cloud Apps** > **Files** in the Microsoft Defender Portal.
7577

7678
**Migration recommendation**
7779
We recommend using Defender for Cloud Apps sensitive information protection in parallel with your current Cloud Access Security Broker (CASB) solution. Start by [connecting the apps you want to protect](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md) to Microsoft Defender for Cloud Apps. Since API connectors use out-of-band connectivity, no conflict will occur. Then progressively migrate your [policies](control-cloud-apps-with-policies.md) from your current CASB solution to Defender for Cloud Apps.

CloudAppSecurityDocs/index.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ metadata:
1010
ms.service: defender-for-cloud-apps
1111
ms.topic: landing-page
1212
ms.collection: na
13-
author: batamig
14-
ms.author: bagol
1513
ms.date: 11/09/2021
1614

1715
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new

CloudAppSecurityDocs/manage-admins.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Microsoft Defender for Cloud Apps supports role-based access control. This artic
2020
>
2121
> - Microsoft 365 and Microsoft Entra roles aren't listed in the Defender for Cloud Apps **Manage admin access** page. To assign roles in Microsoft 365 or Microsoft Entra ID, go to the relevant RBAC settings for that service.
2222
> - Defender for Cloud Apps uses Microsoft Entra ID to determine the user's [directory level inactivity timeout setting](/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin). If a user is configured in Microsoft Entra ID to never sign out when inactive, the same setting will apply in Defender for Cloud Apps as well.
23+
> - Defender for Cloud Apps Information Protection enablement requires an Entra Admin ID, such as: Application Administrator or Cloud Application Administrator. For more details, see [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/permissions-reference) and [Protect your Microsoft 365 environment](/defender-cloud-apps/protect-office-365)
2324
2425
By default, the following Microsoft 365 and [Microsoft Entra ID](/azure/active-directory/roles/permissions-reference) admin roles have access to Defender for Cloud Apps:
2526

135 KB
Loading
14 KB
Loading

0 commit comments

Comments
 (0)