Skip to content

Commit fedd997

Browse files
authored
Update app-governance-investigate-predefined-policies.md
As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled the following three policies
1 parent e0014be commit fedd997

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

CloudAppSecurityDocs/app-governance-investigate-predefined-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ Included in this guide is general information about the conditions for triggerin
1616
>
1717
1818
> [!NOTE]
19-
> To enhance our monitoring efficiency and focus on the most critical alerts, we have streamlined our security policies. The following policies have been automatically disabled:
19+
> As part of our continuous efforts to enhance Defender for Cloud apps alert accuracy we have disabled the following three policies:
2020
>
2121
> - [Increase in data usage by an overprivileged or highly privileged app](#increase-in-data-usage-by-an-overprivileged-or-highly-privileged-app)
2222
> - [Unusual activity from an app with priority account consent](#unusual-activity-from-an-app-with-priority-account-consent)
2323
> - [Access to sensitive data](#access-to-sensitive-data)
2424
>
25-
> These policies will remain visible in the Defender portal in a disabled state. If you want to continue using these policies, go to the Policies page under App Governance in the Defender portal, select the policy, and then select Enable.
25+
> These policies will remain visible in the Defender portal in a disabled state. If you want to continue using these policies, go to the Policies page under App Governance in the Defender portal, select the policy, and then select Activate.
2626
2727
## Security alert classifications
2828

0 commit comments

Comments
 (0)