You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/data-protection-policies.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,8 +11,6 @@ ms.topic: how-to
11
11
12
12
File Policies allow you to enforce a wide range of automated processes using the cloud provider's APIs. Policies can be set to provide continuous compliance scans, legal eDiscovery tasks, DLP for sensitive content shared publicly, and many more use cases. Defender for Cloud Apps can monitor any file type based on more than 20 metadata filters (for example, access level, file type).
13
13
14
-
For a list of file filters that can be applied see [File filters in Microsoft Defender for Cloud Apps](file-filters.md).
15
-
16
14
## Supported file types
17
15
18
16
The Defender for Cloud Apps engines perform content inspection by extracting text from all common file types (100+) including Office, Open Office, compressed files, various rich text formats, XML, HTML, and more.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-note-archive.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2263,7 +2263,7 @@ Released October 30, 2016
2263
2263
2264
2264
**New features:**
2265
2265
2266
-
- To simplify filtering in the [activity log](activity-filters.md) and [file log](file-filters.md), similar filters have been consolidated. Use the activity filters: Activity object, IP address, and User. Use the file filter Collaborators to find exactly what you need.
2266
+
- To simplify filtering in the [activity log](activity-filters.md) and [file log](data-protection-policies.md), similar filters have been consolidated. Use the activity filters: Activity object, IP address, and User. Use the file filter Collaborators to find exactly what you need.
2267
2267
- From the activity log drawer, under **Source**, you can click the link for **View raw data**. This action downloads the raw data used to generate the activity log for greater drill down into app events.
2268
2268
- Added support for extra login activities in Okta. [Private preview]
2269
2269
- Added support for extra login activities in Salesforce.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/use-case-admin-quarantine.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,6 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
18
18
> -[Understand how quarantine works](#understand-how-quarantine-works)
19
19
> -[Set up admin quarantine](#set-up-admin-quarantine)
20
20
21
-
> [!IMPORTANT]
22
-
> Starting **September 1, 2024**, we'll be deprecating the **Files** page from Microsoft Defender for Cloud Apps. At that point, create and modify Information Protection policies and find malware files from the **Cloud apps > Policies > Policy Management** page. For more information, see [File policies in Microsoft Defender for Cloud Apps](data-protection-policies.md).
23
21
24
22
## Understand how quarantine works
25
23
@@ -28,10 +26,10 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
28
26
> - For a list of apps that support admin quarantine, see the list of [governance actions](governance-actions.md).
29
27
> - Files labeled by Defender for Cloud Apps can't be quarantined.
30
28
> - Defender for Cloud Apps admin quarantine actions are limited to 100 actions per day.
31
-
> - Sharepoint sites that are renamed either directly or as part of domain rename cannot be used as a folder location for admin quarantine.
29
+
> - Sharepoint sites that are renamed either directly or as part of domain rename can't be used as a folder location for admin quarantine.
32
30
33
31
34
-
1. When a file matches a policy, the **Admin quarantine** option will be available for the file.
32
+
1. When a file matches a policy, the **Admin quarantine** option is available for the file.
35
33
36
34
1. Do one of the following actions to quarantine the file:
37
35
@@ -53,7 +51,7 @@ In this tutorial, you'll learn how to use Microsoft Defender for Cloud Apps to d
53
51
54
52
1. The user can only access the tombstone file. In the file, they can read the custom guidelines provided by IT and the correlation ID to give IT to release the file.
55
53
56
-
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This will bring you the report of matches, where you can see the matching and quarantined files:
54
+
1. When you receive the alert that a file has been quarantined, go to **Policies** -> **Policy Management**. Then select the **Information Protection** tab. In the row with your file policy, choose the three dots at the end of the line, and select **View all matches**. This brings you the report of matches, where you can see the matching and quarantined files:
0 commit comments