Skip to content

Commit deab6b0

Browse files
authored
Merge pull request #2673 from MicrosoftDocs/main
Published main to live, Thursday 5:00 PM IST, 02/06
2 parents 0e048a0 + 53a55cf commit deab6b0

File tree

2 files changed

+11
-7
lines changed

2 files changed

+11
-7
lines changed

CloudAppSecurityDocs/governance-actions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,11 @@ The following governance actions can be taken for connected apps either on a spe
3434
- **Apply label** - Ability to add a Microsoft Purview Information Protection sensitivity label.
3535
- **Remove label** - Ability to remove a Microsoft Purview Information Protection sensitivity label.
3636
- **Change sharing**
37-
37+
3838
- **Remove public sharing** – Allow access only to named collaborators, for example: *Remove public access* for Google Workspace, and *Remove direct shared link* for Box and Dropbox.
3939

40-
- **Remove external users** – Allow access only to company users.
41-
40+
- **Remove external users** – Allow access only to company users. When a group, containing both internal and external members, is added as a collaborator, the action removes members at the group level instead of individually. 
41+
4242
- **Make private** – Only Site Admins can access the file, all shares are removed.
4343

4444
- **Remove a collaborator** – Remove a specific collaborator from the file.
@@ -60,7 +60,7 @@ The following governance actions can be taken for connected apps either on a spe
6060
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint, Cisco Webex)
6161

6262
![policy_create alerts.](media/policy_create-alerts.png)
63-
63+
6464
## Malware governance actions (Preview)
6565

6666
The following governance actions can be taken for connected apps either on a specific file, user or from a specific policy. For security reasons, this list is limited only to malware related actions that don't imply risk for the user or the tenant.
@@ -104,7 +104,7 @@ The following governance actions can be taken for connected apps either on a spe
104104

105105
- **Governance actions in apps** - Granular actions can be enforced per app, specific actions vary depending on app terminology.
106106

107-
- **Suspend user** – Suspend the user from the application.
107+
- **Suspend user** – Suspend the user from the application.
108108
> [!NOTE]
109109
> If your Microsoft Entra ID is set to automatically sync with the users in your Active Directory on-premises environment the settings in the on-premises environment will override the Microsoft Entra settings and this governance action will be reverted.
110110
@@ -113,7 +113,7 @@ The following governance actions can be taken for connected apps either on a spe
113113
- **Confirm user compromised** - Set the user's risk level to high. This causes the relevant policy actions defined in Microsoft Entra ID to be enforced. For more information How Microsoft Entra ID works with risk levels, see [How does Microsoft Entra ID use my risk feedback](/azure/active-directory/identity-protection/howto-identity-protection-risk-feedback#how-does-azure-ad-use-my-risk-feedback).
114114

115115
![Defender for Cloud Apps activity policy governance actions.](media/activity-policy-ref6.png)
116-
116+
117117
## Revoke an OAuth app and notify user
118118

119119
For Google Workspace and Salesforce, it's possible to revoke permission to an OAuth app or to notify the user that they should change the permission. When you revoke permission it removes all permissions that were granted to the application under "Enterprise Applications" in Microsoft Entra ID.

exposure-management/initiatives-list.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,11 @@ IoT devices are often connected to endpoints, to one another or to the internet,
4343

4444
## External Attack Surface Protection
4545

46-
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization. This initiative requires no license and is complementary.
46+
The External Attack Surface Initiative in Microsoft Security Exposure Management uses Defender EASM to continuously discover and map your digital attack surface, providing an external view of your online infrastructure. This helps security and IT teams identify unknown assets, prioritize risks, eliminate threats, and extend control beyond the firewall.
47+
48+
> [!NOTE]
49+
>
50+
> This initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only.
4751
4852
[Learn more here.](https://aka.ms/xspm/EasmLearnMore)
4953

0 commit comments

Comments
 (0)