Skip to content

Commit fda3791

Browse files
authored
Update release-notes.md
1 parent b74e8bb commit fda3791

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,15 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## November 2024
2323

24+
### Defender for Cloud Apps support for Graph API (preview)
25+
26+
Defender for Cloud Apps customers can now query data about discovered apps via the Graph API. Use the Graph API to customize views and automate flows on the **Discovered apps** page, such as applying filters to view specific data. The API supports [GET](/graph/use-the-api) capabitilies only.
27+
28+
For more information, see:
29+
30+
- [Work with discovered apps via Graph API](discovered-apps-api-graph.md)
31+
- [Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta)
32+
2433
### Visibility into app origin (Preview)
2534

2635
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
@@ -46,12 +55,13 @@ Defender for Cloud Apps users who use app governance can now get granular insigh
4655
For more information, see [OAuth app data usage insights on app governance](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
4756

4857
## October 2024
58+
4959
### Internal Session Controls application notice
5060
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
5161
Please ensure there is no CA policy restricting access to this application.
5262
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
5363

54-
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](https://learn.microsoft.com/defender-cloud-apps/session-policy-aad#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
64+
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
5565

5666
### New anomaly data in advanced hunting CloudAppEvents table
5767

@@ -75,17 +85,6 @@ Using _OAuthAppId_ allows the queries that consider specific OAuth applications,
7585

7686
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
7787

78-
## November 2024
79-
80-
### Defender for Cloud Apps support for Graph API (preview)
81-
82-
Defender for Cloud Apps customers can now query data about discovered apps via the Graph API. Use the Graph API to customize views and automate flows on the **Discovered apps** page, such as applying filters to view specific data. The API supports [GET](/graph/use-the-api) capabitilies only.
83-
84-
For more information, see:
85-
86-
- [Work with discovered apps via Graph API](discovered-apps-api-graph.md)
87-
- [Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta)
88-
8988
### Enforce Edge in-browser when accessing business apps
9089

9190
Administrators who understand the power of Edge in-browser protection, can now require their users to use Edge when accessing corporate resources.

0 commit comments

Comments
 (0)