Skip to content

Commit fdeac9c

Browse files
committed
add screenshot,update how to steps
1 parent d4eac53 commit fdeac9c

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

CloudAppSecurityDocs/content-inspection.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ If you want to partially reveal detected values, you can enable the **Unmask the
1414

1515
You must specify which file elements are included in the inspection: content, metadata, or file name. By default, content and metadata are inspected.
1616

17+
This enables inspection of protected content, helping you detect sensitive data, enforce compliance, and apply governance actions on encrypted files. It helps reduce false positives and align policy enforcement with internal classification standards.
18+
1719

1820
## Prerequisites
1921

@@ -25,7 +27,6 @@ Before you can inspect encrypted files, you must grant one-time admin consent.
2527

2628
## Content inspection for protected files
2729

28-
2930
Defender for Cloud Apps allows admins to grant permission to decrypt encrypted files and scan their content for violations. This consent is also required to enable scanning labels on encrypted files.
3031

3132
When you grant consent, Defender for Cloud Apps provisions the Microsoft Cloud App Security (Internal) app in your tenant. This app must remain enabled. The app uses the Azure Rights Management Services > Content.SuperUser permission to decrypt and inspect protected files.
@@ -48,20 +49,21 @@ In order to give Defender for Cloud Apps the necessary permissions:
4849
1. Go to **Settings** > **Microsoft Information Protection**.
4950
1. Under **Microsoft Information Protection settings**, configure one or both of the following options:
5051

51-
- **Automatically scan new files for Microsoft Information Protection sensitivity labels and content inspection warnings**
52-
When enabled, the App connector scans new files for embedded sensitivity labels from Microsoft Information Protection.
52+
- **Automatically scan new files for Microsoft Information Protection sensitivity labels and content inspection warnings.** When enabled, the App connector scans new files for embedded sensitivity labels from Microsoft Information Protection.
5353

54-
- **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**
55-
When enabled, only sensitivity labels applied within your tenant are scanned. Labels applied by external tenants are disregarded.
54+
- **Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant.** When enabled, only sensitivity labels applied within your tenant are scanned. Labels applied by external tenants are disregarded.
5655

5756
1. After selecting your options, select **Save** to apply your changes.
5857

5958
## Configure file policies for protected files
6059

61-
1. In the Defender portal, go to **Policies > Policy management**.
62-
1. Create or edit a file policy.
63-
1. You can configure the settings per file policy to determine which policies will scan protected files.
64-
1. Specify a regular expression to exclude a file from the results. This option is highly useful if you have an inner classification keyword standard that you want to exclude from the policy.
60+
1. In the Defender portal, go to **Settings > Cloud Apps > Policies > Policy management**.
61+
1. Follow the steps to [create a new file policy](data-protection-policies.md#create-a-new-file-policy).
62+
1. Select either **Apply to all files**, or **Apply to selected files** to specify which files will be scanned. This option is useful if you have an inner classification keyword standard that you want to exclude from the policy.
63+
1. Select **Inspection method** > **Data Classification Service** to enable content inspection for the policy.
64+
1. Check both boxes - **Inspect protected files** and **Unmask the last 4 characters of a match**.
65+
66+
:::image type="content" source="media/content-inspection/inspection-method-data-classification-service.png" alt-text="Screenshot that shows the Data classification service inspection method.":::
6567

6668

6769
## Next steps
28.5 KB
Loading

0 commit comments

Comments
 (0)