Skip to content

Commit f075c82

Browse files
committed
Merge branch 'WI401979-new-oauth-app-table-release-note' of https://github.com/DeCohen/defender-docs-pr into WI401979-new-oauth-app-table-release-note
2 parents 8da2126 + b9f0095 commit f075c82

28 files changed

+423
-46
lines changed

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1004,6 +1004,11 @@
10041004
"source_path": "CloudAppSecurityDocs/file-filters.md",
10051005
"redirect_url": "/defender-cloud-apps/data-protection-policies",
10061006
"redirect_document_id": false
1007+
},
1008+
{
1009+
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
1010+
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
1011+
"redirect_document_id": true
10071012
}
10081013
]
10091014
}
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Application inventory
3+
ms.date: 03/20/2025
4+
ms.topic: overview
5+
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
7+
---
8+
# Applications inventory (Preview)
9+
10+
Protecting your SaaS ecosystem requires taking inventory of all SaaS and OAuth connected apps that are in your environment. With the increasing number of applications, having a comprehensive inventory is crucial to ensure security and compliance. The Defender for Cloud apps Applications page provides a centralized view of all SaaS and connected OAuth apps in your organization, enabling efficient monitoring and management.
11+
At a glance you can see information such as app name, risk score, privilege level, publisher information, and other details for easy identification of SaaS and OAuth apps most at risk.
12+
13+
The Application page includes the following tabs:
14+
15+
* SaaS apps: A consolidated view of all SaaS applications in your network. This tab highlights key details, including app name, status (unprotected/protected app) and whether the app is marked as sanctioned or unsanctioned.
16+
* OAuth apps: Displays a list of OAuth apps such as Microsoft Entra ID, Google workspace and Salesforce.
17+
18+
## Navigate to the Applications page
19+
20+
In the Defender portal at <https://security.microsoft.com>, go to **Assets** \> **Applications**. Or, to go directly to the **Applications** page, by clicking on the banner links on the existing Cloud discovery and App governance pages.
21+
22+
:::image type="content" source="media/banner-on-cloud-discovery-pages.png" alt-text="Screenshot of the Cloud Discovery page with a banner about the new unified application inventory experience" lightbox="media/banner-on-cloud-discovery-pages.png":::
23+
24+
:::image type="content" source="media/banner-message-on-app-governance-pages.png" alt-text="Screenshot of the App Governance page with a banner about the new unified application inventory experience for managing OAuth and SaaS apps" lightbox="media/banner-message-on-app-governance-pages.png":::
25+
26+
There are several options you can choose from to customize the SaaS apps and OAuth apps list view. In the top navigation panel you can:
27+
28+
* Add or remove columns.
29+
* Export the entire list in CSV format.
30+
* Select the number of items to show per page.
31+
* Apply filters
32+
33+
> [!NOTE]
34+
>When exporting the applications list to a CSV file, a maximum of 1000 SaaS or OAuth apps are displayed.
35+
36+
The following image depicts the SaaS apps list:
37+
:::image type="content" source="media/applications-tab-in-the-defender-portal.png" alt-text="Screenshot of the applications tab in the Defender portal" lightbox="media/applications-tab-in-the-defender-portal.png"
38+
39+
40+
## SaaS app details
41+
42+
At the top of Saas app tab, you can find actionable insights that allow you to quickly identify apps that need your attention and focus. The following details are displayed:
43+
44+
* **Untagged high risk apps** – Shows apps that aren't tagged and have a high-risk.
45+
* **Untagged high traffic apps** – Shows apps that aren't tagged and have a high usage traffic (greater than 1 GB of data traffic).
46+
* **Untagged GenAI apps** – Shows apps that aren't tagged and are Gen-AI based.
47+
48+
## Sort and filter the SaaS apps list
49+
50+
You can use the sort and filter functionality to get a more focused view. These controls also help you assess and manage the SaaS applications in your organization.
51+
52+
|Filter |Description |
53+
|---------|---------|
54+
|**App tags** | Select **Sanctioned**, **Unsanctioned**, or create custom tags to use in a customized filter. |
55+
|**App** | Filter for specific SaaS apps. |
56+
|**Categories** | Filter according to app categories. |
57+
|**Compliance risk factor** | Filter for specific standards, certifications, and compliance your app might comply with. For example: HIPAA, ISO 27001, SOC 2, and PCI-DSS. |
58+
| **Risk score** | Filter by a specific risk score, such as to view only risky apps. |
59+
|**Security risk factor** | Filter based on specific security measures, such as encryption at rest, multifactor authentication, and others.
60+
|
61+
62+
### OAuth Apps
63+
64+
The OAuth apps tab provides visibility into Microsoft 365, Google workspace and Salesforce. Admins can review applications and decide to disable the apps or apply policies to monitor their behavior in their environment.
65+
66+
* **New apps** – Shows apps added in the last 30 days (Available for Microsoft 365)
67+
68+
* **Highly privileged apps** – Shows apps with powerful permissions that allow them to access data or change important settings. (Available for Microsoft 365 and Google)
69+
70+
* **Overprivileged apps** – Shows apps with unused permissions. (Available for Microsoft 365)
71+
72+
* **Apps from external unverified publishers** – Shows apps that originated from an external unverified publisher tenant. (Available for Microsoft 365)
73+
74+
For more information on how to create app policies, see:[Create app policies in app governance](app-governance-app-policies-create.md)
75+
76+
The following image depicts the OAuth apps list:
77+
78+
:::image type="content" source="media/oauth-tab-in-the-applications-page.png" alt-text="Screenshot of a list of OAuth apps in the applications page in the Defender portal" lightbox="media/oauth-tab-in-the-applications-page.png":::
79+
80+
## Sort and filter the OAuth apps list
81+
82+
You can apply the following filters to get a more focused view:
83+
84+
|Column name |Description |
85+
|---------|---------|
86+
| **App name** | The display name of the app as registered on Microsoft Entra ID. |
87+
| **App status** | Shows whether the app is enabled or disabled, and if disabled by whom. |
88+
| **Graph API access**| Shows whether the app has at least one Graph API permission. |
89+
| **Permission type**| Shows whether the app has application (app only), delegated, or mixed permissions. |
90+
| **App origin**| Shows whether the app originated within the tenant or was registered in an external tenant. |
91+
| **Consent type**| Shows whether the app consent has been given at the user or the admin level, and the number of users whose data is accessible to the app. |
92+
| **Publisher**| Publisher of the app and their verification status. |
93+
| **Last modified**| Date and time when registration information was last updated on Microsoft Entra ID |
94+
| **Added on**| Shows the date and time when the app was registered to Microsoft Entra ID and assigned a service principal. |
95+
| **Permission usage**| Shows whether the app has any unused Graph API permissions in the last 90 days. |
96+
| **Data usage**| Total data downloaded or uploaded by the app in the last 30 days. |
97+
| **Privilege level** | The app's privilege level. |
98+
| **Certification**| Indicates if an app meets stringent security and compliance standards set by Microsoft 365 or if its publisher has publicly attested to its safety. |
99+
| **Sensitivity label accessed**| Sensitivity labels on content accessed by the app |
100+
| **Service accessed**| Microsoft 365 services accessed by the app
101+
|
102+
103+
104+
> [!TIP]
105+
> To see all columns, you might need to do one or more of the following steps:
106+
> * Horizontally scroll in your web browser.
107+
> * Narrow the width of appropriate columns.
108+
> * Zoom out in your web browser.
109+
110+
## Next steps
111+
112+
> [!div class="nextstepaction"]
113+
> [Best practices for protecting your organization](best-practices.md)
114+
115+
[!INCLUDE [Open support ticket](includes/support.md)]
135 KB
Loading
14 KB
Loading
7.31 KB
Loading
112 KB
Loading

CloudAppSecurityDocs/release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,14 @@ The [OAuthAppInfo](/defender-xdr/advanced-hunting-oauthappinfo-table) table is n
2727

2828
This table provides details on Microsoft 365-connected OAuth applications that are registered with Microsoft Entra ID and accessible through the Defender for Cloud Apps app governance capability.
2929

30+
### New Applications page in Defender XDR (Preview)
31+
32+
The new Applications page consolidates all SaaS and connected OAuth applications into a single, unified inventory. This centralized view streamlines application discovery, monitoring, and management, providing greater visibility and control across your environment.
33+
34+
The page surfaces key insights such as risk scores, usage patterns, publisher verification status, and privilege levels. These insights help you quickly identify and address high-risk or untagged applications.
35+
36+
For more information, see [Application inventory overview](applications-inventory.md)
37+
3038
## March 2025
3139

3240
### Enhanced Identity Inventory (Preview)

CloudAppSecurityDocs/toc.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,6 @@ items:
118118
href: protect-zendesk.md
119119
- name: Zoom
120120
href: protect-zoom.md
121-
- name: Troubleshooting API connectors using error messages
122-
href: troubleshooting-api-connectors-using-error-messages.md
123121
- name: Cloud app discovery
124122
items:
125123
- name: Overview
@@ -157,6 +155,8 @@ items:
157155
href: log-collector-advanced-management.md
158156
- name: Use the custom log parser
159157
href: custom-log-parser.md
158+
- name: Troubleshooting API connector errors
159+
href: troubleshooting-api-connectors-errors.md
160160
- name: Integrate with Microsoft Defender for Endpoint
161161
items:
162162
- name: Overview
@@ -424,6 +424,12 @@ items:
424424
href: app-activity-threat-hunting.md
425425
- name: App governance FAQ
426426
href: app-governance-faq.yml
427+
- name: Investigate and respond
428+
items:
429+
- name: Assets
430+
items:
431+
- name: Applications inventory
432+
href: applications-inventory.md
427433
- name: Operations guide
428434
items:
429435
- name: Operations guide overview
Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,6 @@ ms.topic: conceptual
66
---
77
# Troubleshooting App Connector errors
88

9-
10-
119
This article provides a list of API App connector error messages and resolution recommendations for each error.
1210

1311
## Troubleshooting

0 commit comments

Comments
 (0)