Skip to content

Commit ffa696c

Browse files
authored
Merge branch 'main' into patch-11
2 parents 062a6b8 + 30d745b commit ffa696c

File tree

6 files changed

+47
-10
lines changed

6 files changed

+47
-10
lines changed

CloudAppSecurityDocs/data-protection-policies.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: File policies
33
description: This article describes the procedure for setting up a data policy to monitor and control the data and files in your organization's cloud app use.
4-
ms.date: 02/15/2023
4+
ms.date: 09/01/2025
55
ms.topic: how-to
66
ms.reviewer: MayaAbelson
77
---
@@ -84,12 +84,22 @@ To create a new file policy, follow this procedure:
8484

8585
When content is matched against the selected expression, the violation text is replaced with "X" characters. By default, violations are masked and shown in their context displaying 100 characters before and after the violation. Numbers in the context of the expression are replaced with "#" characters and are never stored within Defender for Cloud Apps. You can select the option to **Unmask the last four characters of a violation** to unmask the last four characters of the violation itself. It's necessary to set which data types the regular expression searches: content, metadata and/or file name. By default it searches the content and the metadata.
8686

87-
1. Choose the **Governance** actions you want Defender for Cloud Apps to take when a match is detected.
8887

89-
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. Take extra care when you set governance actions, they could lead to irreversible loss of access permissions to your files. It's recommended to narrow down the filters to exactly represent the files that you wish to act upon, using multiple search fields. The narrower the filters, the better. For guidance, you can use the **Edit and preview results** button next to the filters.
88+
1. In the **Alerts** section, configure any of the following actions as needed:
89+
90+
- **Create an alert for each matching event with the policy's severity**
91+
- **Send an alert as email**
92+
- **Daily alert limit per policy**. Note that governance actions are not impacted by the daily alert limit.
93+
- **Send alerts to Power Automate**
94+
-
95+
1. Choose the **Governance** actions you want Defender for Cloud Apps to take when a match is detected. Be careful when you set governance actions, they could lead to irreversible loss of access permissions to your files.
96+
97+
1. Once you've created your policy, you can view it by filtering for the **File policy** type. You can always edit a policy, calibrate its filters, or change the automated actions. The policy is automatically enabled upon creation and starts scanning your cloud files immediately. We recommended narrowing down the filters using multiple search fields to get the files that you want to work with, . The narrower the filters, the better. You can use the **Edit and preview results** button next to the filters.
98+
99+
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
100+
101+
90102

91-
![File policy edit and preview results.](media/file-policy-edit-and-preview-results.png)
92-
93103
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
94104

95105
## Limitations
-2.65 KB
Loading

CloudAppSecurityDocs/user-activity-policies.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,13 @@ To create a new activity policy, follow this procedure:
5151
1. Under **Create filters for the policy**, select when a policy violation will be triggered. Choose to trigger when a **Single activity** matches the filters or only when a specified number of **Repeated activities** are detected.
5252
- If you choose **Repeated activity**, you can set **In a single app**. This setting triggers a policy match only when the repeated activities occur in the same app. For example, five downloads in 30 minutes from Box trigger a policy match.
5353

54+
1. In the **Alerts** section, configure any of the following actions as needed:
55+
56+
- **Create an alert for each matching event with the policy's severity**
57+
- **Send an alert as email**
58+
- **Daily alert limit per policy**. Note that governance actions are not impacted by the daily alert limit.
59+
- **Send alerts to Power Automate**
60+
5461
1. Configure the **Actions** that should be taken when a match is found.
5562

5663
Take a look at these examples:

defender-endpoint/android-whatsnew.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,16 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3030

3131
### Releases for Defender for Endpoint on Android
3232

33+
#### August 2025
34+
35+
| Build|1.0.8018.0103|
36+
| -------- | -------- |
37+
| Release Date| August 19, 2025 |
38+
39+
**What's New**
40+
41+
- Performance improvements and bug fixes
42+
3343
#### July 2025
3444

3545
|Build|1.0.7901.0101|

defender-endpoint/ios-whatsnew.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,16 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3131

3232
## Releases for Defender for Endpoint on iOS
3333

34+
#### August 2025
35+
36+
| Build| 1.1.68140102|
37+
| -------- | -------- |
38+
| Release Date| August 19, 2025|
39+
40+
**What's New**
41+
42+
- Performance improvements and bug fixes
43+
3444
### July-2025
3545

3646
| Build| 1.1.67040101|

defender-endpoint/respond-machine-alerts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Take response actions on a device in Microsoft Defender for Endpoint
33
description: Take response actions on a device such as isolating devices, collecting an investigation package, managing tags, running an antivirus scan, and restricting app execution.
44
ms.service: defender-endpoint
5-
ms.author: diannegali
6-
author: diannegali
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
8-
ms.date: 07/01/2025
9-
manager: deniseb
8+
ms.date: 09/01/2025
9+
manager: bagol
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -330,7 +330,7 @@ You're be able to stop containing a device at any time.
330330
Defender for Endpoint can also contain IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint. The capability to contain an IP address prevents attackers from spreading attacks to other non-compromised devices. Containing an IP address results in Defender for Endpoint-onboarded devices blocking incoming and outgoing communication with devices using the contained IP address
331331

332332
> [!NOTE]
333-
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Defender for Endpoint Windows 10, Windows 2012 R2, Windows 2016, and Windows Server 2019+ devices.
333+
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Defender for Endpoint Windows 10, Windows 11, Windows 2012 R2, and Windows 2016 devices.
334334
335335
Containing an IP address associated with undiscovered devices or devices not onboarded to Defender for Endpoint is done automatically through [automatic attack disruption](/defender-xdr/automatic-attack-disruption). The Contain IP policy automatically blocks a malicious IP address when Defender for Endpoint detects the IP address to be associated with an undiscovered device or a device not onboarded.
336336

0 commit comments

Comments
 (0)