You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
11
+
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
12
12
13
-
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments may be configured in a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown via[Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
13
+
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in[Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
14
14
15
15

16
16
@@ -26,23 +26,23 @@ One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Postur
26
26
27
27
## Turn on SaaS security recommendations
28
28
29
-
This procedure describes how to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
29
+
Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
30
30
31
31
1. In Microsoft Defender XDR, select **Settings** > **Cloud Apps** > **Connected apps** > **App Connectors**.
32
32
33
33
1. Use the filter to locate the application where you want to turn on security recommendations.
34
34
35
-
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following screenshot shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
35
+
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following example shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
36
36

37
37
38
38
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
39
39

40
40
41
41
> [!NOTE]
42
-
> In case you have multiple instances of the same app, you can send security recommendations for each instance separately.
42
+
> If you have multiple instances of the same app, you can send security recommendations for each instance separately.
43
43
Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
44
44
45
-
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and may take up to 24 hours to update.
45
+
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and might take up to 24 hours to update.
46
46
47
47
In Microsoft Secure Score, filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example:
48
48
@@ -52,11 +52,10 @@ Select a recommendation and then select the **Implementation** tab in the detail
52
52
53
53
For more information, see [Assess your security posture with Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-improvement-actions).
54
54
55
-
56
55
## How to manage your organization SaaS security posture
57
56
58
57
> [!IMPORTANT]
59
-
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations via[Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above
58
+
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in[Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
60
59
61
60
To effectively manage your organization’s SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
0 commit comments