You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+11-12Lines changed: 11 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,15 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
21
21
22
22
## November 2024
23
23
24
+
### Defender for Cloud Apps support for Graph API (preview)
25
+
26
+
Defender for Cloud Apps customers can now query data about discovered apps via the Graph API. Use the Graph API to customize views and automate flows on the **Discovered apps** page, such as applying filters to view specific data. The API supports [GET](/graph/use-the-api) capabitilies only.
27
+
28
+
For more information, see:
29
+
30
+
-[Work with discovered apps via Graph API](discovered-apps-api-graph.md)
31
+
-[Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta)
32
+
24
33
### Visibility into app origin (Preview)
25
34
26
35
Defender for Cloud Apps users who use app governance will be able to gain visibility into the origin of OAuth apps connected to Microsoft 365. You can filter and monitor apps that have external origins, to proactively review such apps and improve the security posture of the organization.
@@ -46,12 +55,13 @@ Defender for Cloud Apps users who use app governance can now get granular insigh
46
55
For more information, see [OAuth app data usage insights on app governance](/defender-cloud-apps/app-governance-visibility-insights-view-apps#getting-detailed-information-on-an-app).
47
56
48
57
## October 2024
58
+
49
59
### Internal Session Controls application notice
50
60
The Enterprise application “Microsoft Defender for Cloud Apps – Session Controls” is used internally by the Conditional Access App Control service.
51
61
Please ensure there is no CA policy restricting access to this application.
52
62
For policies that restrict all or certain applications, please ensure this application is listed as an exception or confirm that the blocking policy is deliberate.
53
63
54
-
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](https://learn.microsoft.com/defender-cloud-apps/session-policy-aad#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
64
+
For more information, see [Sample: Create Microsoft Entra ID Conditional Access policies for use with Defender for Cloud Apps](session-policy-aad.md#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps).
55
65
56
66
### New anomaly data in advanced hunting CloudAppEvents table
57
67
@@ -75,17 +85,6 @@ Using _OAuthAppId_ allows the queries that consider specific OAuth applications,
75
85
76
86
For more information, see [Advanced Hunting "CloudAppEvents" Data schema](/microsoft-365/security/defender/advanced-hunting-cloudappevents-table).
77
87
78
-
## November 2024
79
-
80
-
### Defender for Cloud Apps support for Graph API (preview)
81
-
82
-
Defender for Cloud Apps customers can now query data about discovered apps via the Graph API. Use the Graph API to customize views and automate flows on the **Discovered apps** page, such as applying filters to view specific data. The API supports [GET](/graph/use-the-api) capabitilies only.
83
-
84
-
For more information, see:
85
-
86
-
-[Work with discovered apps via Graph API](discovered-apps-api-graph.md)
87
-
-[Microsoft Graph API reference for Microsoft Defender for Cloud Apps](/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta)
88
-
89
88
### Enforce Edge in-browser when accessing business apps
90
89
91
90
Administrators who understand the power of Edge in-browser protection, can now require their users to use Edge when accessing corporate resources.
0 commit comments