You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-app-policies-create.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,7 @@ The following table lists the app governance templates supported to generate ale
53
53
54
54
|Template name|Description|
55
55
|---|---|
56
+
|**Unused app**|Find apps that have not authenticated recently. This policy checks the following conditions: <ul><li>Last used: More than 90 days (customizable)</li></ul>|
56
57
|**New app with high data usage**|Find newly registered apps that have uploaded or downloaded large amounts of data using Microsoft Graph and EWS APIs. This policy checks the following conditions: <ul><li>Registration age: Seven days or less (customizable)</li><li>Data usage: Greater than 1 GB in one day (customizable)</li></ul>|
57
58
|**Increase in users**|Find apps with a sizable increase in the number of users. This policy checks the following conditions: <ul><li>Time range: Last 90 days</li><li>Increase in consenting users: At least 50% (customizable)</li></ul>|
58
59
@@ -78,7 +79,7 @@ The following table lists the app governance templates supported to generate ale
78
79
79
80
Use a custom app policy when you need to do something not already done by one of the built-in templates.
80
81
81
-
- To create a new custom app policy, first select **Create new policy** on the **Policies** page. On the **Choose App policy template page**, select the **Custom** category, the **Custom policy** template, and then select **Next**.
82
+
1. To create a new custom app policy, first select **Create new policy** on the **Policies** page. On the **Choose App policy template page**, select the **Custom** category, the **Custom policy** template, and then select **Next**.
82
83
83
84
1. On the **Name and description** page, configure the following settings:
84
85
- Policy Name
@@ -125,6 +126,7 @@ Use a custom app policy when you need to do something not already done by one of
125
126
|**Sensitivity labels accessed**|Select one or more sensitivity labels from the list|Apps that accessed data with specific sensitivity labels in the last 30 days.||
126
127
|**Services accessed** (Graph only)|Exchange and/or OneDrive and/or SharePoint and/or Teams|Apps that have accessed OneDrive, SharePoint, or Exchange Online using Microsoft Graph and EWS APIs|Multiple selections allowed.|
127
128
|**Error rate** (Graph only)|Error rate is greater than X% in the last seven days|Apps whose Graph API error rates in the last seven days are greater than a specified percentage||
129
+
|**Last used**|Within last X days|Apps that have not authenticated within a specified period from the current date||
128
130
|**App origin**|External or Internal|Apps that originated within the tenant or registered in an external tenant||
129
131
130
132
All of the specified conditions must be met for this app policy to generate an alert.
@@ -176,9 +178,9 @@ Policies for OAuth apps trigger alerts only on policies that are authorized by u
176
178
177
179
3. You might want to set the policy based on the group memberships of the users who authorized the apps. For example, an admin can decide to set a policy that revokes uncommon apps if they ask for high permissions, only if the user who authorized the permissions is a member of the Administrators group.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-secure-apps-app-hygiene-features.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.reviewer: anandd512
10
10
# Secure apps with app hygiene features
11
11
12
12
> [!NOTE]
13
-
> Management of unused apps, unused credentials, and expiring credentials will only be available to app governance customers with Microsoft Entra Workload ID Premium. For more information, see [What are workload identities?](/azure/active-directory/workload-identities/workload-identities-overview)
13
+
> Management of unused credentials and expiring credentials is available to app governance customers with a Microsoft Entra Workload ID Premium license. For more information, see [What are workload identities?](/azure/active-directory/workload-identities/workload-identities-overview)
14
14
15
15
Have you ever wanted to see the apps that your organization owns but isn't using, but didn't know how to? Or clean up unused or expiring credentials more easily? Microsoft Entra ID includes recommendations to help you identify such apps, and the **App governance** page in Microsoft Defender provides an app hygiene feature suite that includes controls and insights on unused apps, unused credentials, and expiring credentials.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-trial-user-guide.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Start by using the following steps to get visibility and insights about your app
34
34
> You can also view app governance-related recommendations in [Secure Score](https://security.microsoft.com/securescore?viewid=overview&tid=b5304409-74ae-42bf-a3e3-d62da4845129) to help you holistically manage your posture.
35
35
>
36
36
37
-
1.**[View your apps](app-governance-visibility-insights-view-apps.md)**: Sort the data on the **App governance** tabs by apps with high data usage or number of consents given, or filter by high privileged apps, apps with unused permissions, or unverified publisher, and more.
37
+
1.**[View your apps](app-governance-visibility-insights-view-apps.md)**: Sort the data on the **App governance** tabs by apps with high data usage or number of consents given, or filter by high privileged apps, unused apps, apps with unused permissions, or unverified publisher, and more.
38
38
39
39
Use these sorting and filtering options to gain deeper insights into your OAuth apps, including relevant app metadata and usage data.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-visibility-insights-compliance-posture.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,16 +14,14 @@ The **Overview** page shows the following details:
14
14
15
15
|Apps / incidents |Details shown | Use this data to... |
16
16
|---------|---------|---------|
17
-
|**OAuth-enabled apps that use the Microsoft Graph API**| - How many apps are in your tenant <br>- How many apps might be overprivileged <br>- How many apps are highly privileged | Determine the level of risk to your organization by overprivileged and highly privileged apps. |
18
-
|**For incidents**| - How many active incidents your tenant has <br>- How many are based on app governance detections (**Threat incidents**) <br>- How many are based on app policies you have in place (**Policy incidents**) <br>- The 10 latest incidents | Determine how quickly incidents are being generated and the relative number of detected and policy-based incidents. |
17
+
|**OAuth-enabled apps that use the Microsoft Graph API**| - How many apps are in your tenant <br>- How many apps are unused in the last 90 days <br> - How many apps might be overprivileged <br>- How many apps are highly privileged | Determine the level of risk to your organization by unused, overprivileged and highly privileged apps. |
18
+
|**For incidents**| - How many active incidents your tenant has <br>- How many are based on app governance detections (**Threat incidents**) <br>- How many are based on app policies you have in place (**Policy incidents**) <br>- The 10 latest incidents | Determine how quickly incidents are being generated and the relative number of detected and policy-based incidents. |
19
19
20
20
For example:
21
21
22
-
> [!div class="mx-imgBorder"]
23
-
> 
:::image type="content" source="media/incidents-summary1.png" alt-text="Screenshot showing relative number of detected and policy-based incidents.":::
23
+
24
+
:::image type="content" source="media/app-governance-visibility-insights-compliance-posture/top-alerts.png" alt-text="Screenshot showing top alerts.":::
27
25
28
26
## Data usage cards
29
27
@@ -35,17 +33,15 @@ Data usage cards show the following types of information:
35
33
36
34
For example:
37
35
38
-
> [!div class="mx-imgBorder"]
39
-
> 
36
+
:::image type="content" source="media/app-governance-visibility-insights-compliance-posture/data-usage-chart.png" alt-text="Screenshot showing total data accessed by apps.":::
40
37
41
38
## Apps that access data on Microsoft 365
42
39
43
40
For apps that access data on Microsoft 365, cards show the number of apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams using Microsoft Graph and EWS APIs in the last 30 days.
44
41
45
42
For example:
46
43
47
-
> [!div class="mx-imgBorder"]
48
-
> 
44
+
:::image type="content" source="media/app-governance-visibility-insights-compliance-posture/apps-accessed-m365-services-chart.png" alt-text="Screenshot showing apps that have accessed data on SharePoint, OneDrive, Exchange Online, or Teams in the last 30 days.":::
49
45
50
46
## Sensitivity labels accessed
51
47
@@ -54,8 +50,9 @@ For sensitivity labeling data, cards show the number apps that have accessed con
54
50
For example:
55
51
56
52
The number of apps that have accessed content with sensitivity labels.
57
-
> :::image type="content" source="media/sensitive-data-accessed-chart1.png" alt-text="Number of apps that have accessed content with sensitivity labels.":::
53
+
54
+
:::image type="content" source="media/sensitive-data-accessed-chart1.png" alt-text="Screenshot showing the number of apps that have accessed content with sensitivity labels.":::
58
55
59
56
## Next steps
60
57
61
-
[Get insights on and regulate access to sensitive content](app-governance-visibility-insights-sensitive-content.md)
58
+
[Get insights on and regulate access to sensitive content](app-governance-visibility-insights-sensitive-content.md)
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-visibility-insights-get-started.md
+17-14Lines changed: 17 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ The dashboard on the **Overview** tab contains a summary of your app ecosystem:
28
28
|**Apps that accessed data across Microsoft 365 services**| The count of apps that have accessed data with and without sensitivity labels on SharePoint, OneDrive, Exchange Online, and Teams in the last 30 days. <br><br>For example, in the screenshot above, 99 apps accessed OneDrive in the last 30 days, out of which 27 apps accessed data with sensitivity labels. |
29
29
|**Sensitivity labels accessed**| Count of apps that accessed labeled data across SharePoint, OneDrive, Exchange Online, and Teams in the last 30 days, sorted by the count. <br><br>For example, in the screenshot above, 90 apps accessed confidential data on SharePoint, OneDrive, Exchange Online, and Teams. |
30
30
|**Predefined policies**| Count of active and total predefined policies that identify risky apps, such as apps with excessive privileges, unusual characteristics, or suspicious activities. |
31
-
|**App categories** | The top apps sorted by these categories: <br><br>- **All categories**: Sorts across all available categories.<br> - **Highly privileged**: High privilege is an internally determined category based on platform machine learning and signals.<br> - **Overprivileged**: When app governance receives data that indicates that a permission granted to an application hasn't been used in the last 90 days, that application is overprivileged. App governance must be operating for at least 90 days to determine if any app is overprivileged. <br>- **Unverified publisher**: Applications that haven't received [publisher certification](/azure/active-directory/develop/publisher-verification-overview) are considered unverified.<br> - **App only permissions**: [Application permissions](/azure/active-directory/develop/v2-permissions-and-consent#permission-types) are used by apps that can run without a signed-in user present. Apps with permissions to access data across the tenant are potentially a higher risk.<br>- **New apps**: New apps that have been registered in the last seven days. |
31
+
|**App categories** | The top apps sorted by these categories: <br><br>- **All categories**: Sorts across all available categories.<br> - **Highly privileged**: High privilege is an internally determined category based on platform machine learning and signals.<br> - **Overprivileged**: When app governance receives data that indicates that a permission granted to an application hasn't been used in the last 90 days, that application is overprivileged. App governance must be operating for at least 90 days to determine if any app is overprivileged.<br> - **Unused**: Apps that have not signed in within the last 90 days <br>- **Unverified publisher**: Applications that haven't received [publisher certification](/azure/active-directory/develop/publisher-verification-overview) are considered unverified.<br> - **App only permissions**: [Application permissions](/azure/active-directory/develop/v2-permissions-and-consent#permission-types) are used by apps that can run without a signed-in user present. Apps with permissions to access data across the tenant are potentially a higher risk.<br>- **New apps**: New apps that have been registered in the last seven days. |
32
32
33
33
## View app insights
34
34
@@ -56,25 +56,28 @@ One of the primary value points for app governance is the ability to quickly vie
56
56
57
57
-**Publisher verified**
58
58
59
-
Use one of the following nondefault filters to further customize the apps listed:
60
-
61
-
-**Last modified**
59
+
-**Last used**
62
60
63
-
-**Added on**
61
+
-**Services accessed**
64
62
65
-
-**Certification**
63
+
-**Sensitivity labels accessed**
66
64
65
+
Use one of the following nondefault filters to further customize the apps listed:
66
+
67
+
-**Last modified**
68
+
69
+
-**Added on**
70
+
71
+
-**Certification**
72
+
67
73
-**Users**
68
-
69
-
-**Services accessed**
70
-
74
+
71
75
-**Data usage**
72
-
73
-
-**Sensitivity labels accessed**
76
+
77
+
> [!TIP]
78
+
> Save the query to save the currently selected filters for use again in the future.
79
+
74
80
75
-
> [!TIP]
76
-
> Save the query to save the currently selected filters for use again in the future.
77
-
78
81
1. Select the name of an app to view more details. For example:
79
82
80
83
:::image type="content" source="media/app-governance-visibility-insights-get-started/app-governance-app-list-view.png" alt-text="Screenshot of the app details pan showing an app summary." lightbox="media/app-governance-visibility-insights-get-started/app-governance-app-list-view.png":::
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/app-governance-visibility-insights-view-apps.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,6 +35,7 @@ On the **Microsoft 365** tab, the apps in your tenant are listed with the follow
35
35
|**App origin**| Shows whether the app originated within the tenant or was registered in an external tenant |
36
36
|**Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app |
37
37
|**Publisher**| Publisher of the app and their verification status |
38
+
|**Last used**| Shows the last time when the app signed in. Tracking of this data goes back to June, 2022. |
38
39
|**Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
39
40
|**Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal |
40
41
|**Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days |
@@ -72,13 +73,13 @@ In the details pane, select any of the following tabs to view more details:
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
76
-
76
+
If an app is *admin consented*, the **Total consented users** are all users in the tenant.
77
+
77
78
- Select the **Permissions** tab to see a summary and list of the Graph API and legacy permissions granted to the app, consent type, privilege level and whether they are in use. For example:
78
79
79
80
:::image type="content" source="media/app-governance-visibility-insights-view-apps/permissions.png" alt-text="Screenshot of the Permissions tab.":::
80
81
81
-
For more information, see the [Microsoft Graph permissions reference](/graph/permissions-reference).
82
+
For more information, see the [Microsoft Graph permissions reference](/graph/permissions-reference).
82
83
83
84
- Select the **Sensitivity labels** tab to see how frequently items with certain sensitivity labels were accessed by the app on Microsoft 365. For example:
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/applications-inventory.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,6 +68,8 @@ The OAuth apps tab provides visibility into Microsoft 365, Google workspace and
68
68
69
69
***Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
70
70
71
+
***Unused apps** - Shows apps that have not signed in within the last 90 days (Available for Microsoft 365)
72
+
71
73
***Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
72
74
73
75
***Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
@@ -91,6 +93,7 @@ You can apply the following filters to get a more focused view:
91
93
|**App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
92
94
|**Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
93
95
|**Publisher**| Publisher of the app and their verification status. |
96
+
|**Last used**| Date and time when the app last signed in. Tracking of this data goes back to June, 2022. |
94
97
|**Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
95
98
|**Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
96
99
|**Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
0 commit comments