You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/content-inspection.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,8 @@ If you want to partially reveal detected values, you can enable the **Unmask the
14
14
15
15
You must specify which file elements are included in the inspection: content, metadata, or file name. By default, content and metadata are inspected.
16
16
17
+
This enables inspection of protected content, helping you detect sensitive data, enforce compliance, and apply governance actions on encrypted files. It helps reduce false positives and align policy enforcement with internal classification standards.
18
+
17
19
18
20
## Prerequisites
19
21
@@ -25,7 +27,6 @@ Before you can inspect encrypted files, you must grant one-time admin consent.
25
27
26
28
## Content inspection for protected files
27
29
28
-
29
30
Defender for Cloud Apps allows admins to grant permission to decrypt encrypted files and scan their content for violations. This consent is also required to enable scanning labels on encrypted files.
30
31
31
32
When you grant consent, Defender for Cloud Apps provisions the Microsoft Cloud App Security (Internal) app in your tenant. This app must remain enabled. The app uses the Azure Rights Management Services > Content.SuperUser permission to decrypt and inspect protected files.
@@ -48,20 +49,21 @@ In order to give Defender for Cloud Apps the necessary permissions:
48
49
1. Go to **Settings** > **Microsoft Information Protection**.
49
50
1. Under **Microsoft Information Protection settings**, configure one or both of the following options:
50
51
51
-
-**Automatically scan new files for Microsoft Information Protection sensitivity labels and content inspection warnings**
52
-
When enabled, the App connector scans new files for embedded sensitivity labels from Microsoft Information Protection.
52
+
-**Automatically scan new files for Microsoft Information Protection sensitivity labels and content inspection warnings.** When enabled, the App connector scans new files for embedded sensitivity labels from Microsoft Information Protection.
53
53
54
-
-**Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant**
55
-
When enabled, only sensitivity labels applied within your tenant are scanned. Labels applied by external tenants are disregarded.
54
+
-**Only scan files for Microsoft Information Protection sensitivity labels and content inspection warnings from this tenant.** When enabled, only sensitivity labels applied within your tenant are scanned. Labels applied by external tenants are disregarded.
56
55
57
56
1. After selecting your options, select **Save** to apply your changes.
58
57
59
58
## Configure file policies for protected files
60
59
61
-
1. In the Defender portal, go to **Policies > Policy management**.
62
-
1. Create or edit a file policy.
63
-
1. You can configure the settings per file policy to determine which policies will scan protected files.
64
-
1. Specify a regular expression to exclude a file from the results. This option is highly useful if you have an inner classification keyword standard that you want to exclude from the policy.
60
+
1. In the Defender portal, go to **Settings > Cloud Apps > Policies > Policy management**.
61
+
1. Follow the steps to [create a new file policy](data-protection-policies.md#create-a-new-file-policy).
62
+
1. Select either **Apply to all files**, or **Apply to selected files** to specify which files will be scanned. This option is useful if you have an inner classification keyword standard that you want to exclude from the policy.
63
+
1. Select **Inspection method** > **Data Classification Service** to enable content inspection for the policy.
64
+
1. Check both boxes - **Inspect protected files** and **Unmask the last 4 characters of a match**.
65
+
66
+
:::image type="content" source="media/content-inspection/inspection-method-data-classification-service.png" alt-text="Screenshot that shows the Data classification service inspection method.":::
0 commit comments