Skip to content

Commit dd15114

Browse files
authored
changed files by pdets auto publish service, publishid[4637dd30-5d26-428e-84e9-84a43173b319] and do [publish].
1 parent 3f79eeb commit dd15114

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

learn-pr/wwl-sci/plan-design-integration-of-enterprise-apps-for-sso/includes/8-implement-manage-policies-oauth-apps.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,20 +4,20 @@ In addition to the existing investigation of OAuth apps connected to your enviro
44

55
1. Launch **Microsoft Defender for Cloud Apps** at [https://security.microsoft.com](https://security.microsoft.com).
66
2. Scroll down the menu on left until you get to the **Cloud apps** section.
7-
2. Select **OAuth apps**.
8-
3. Filter the apps according to your needs.
7+
3. Select **OAuth apps**.
8+
4. Filter the apps according to your needs.
99

1010
- For example, you can view all apps that request Permission to Modify calendars in your mailbox.
1111

12-
4. Select the **New policy** from search button.
12+
5. Select the **New policy** from search button.
1313

1414
:::image type="content" source="../media/oauth-policy-dialog.png" alt-text="Screenshot of the Microsoft Defender for Cloud Apps site with the OAuth Policy dialog open.":::
1515

16-
5. You can use the **Community use** filter to get information on whether allowing permission to this app is common, uncommon, or rare.
16+
6. You can use the **Community use** filter to get information on whether allowing permission to this app is common, uncommon, or rare.
1717

1818
- This filter can be helpful if you have an app that's rare and requests permission that has a high severity level or requests permission from many users.
1919

20-
6. You can set the policy based on the group memberships of the users who authorized the apps.
20+
7. You can set the policy based on the group memberships of the users who authorized the apps.
2121

2222
- For example, an admin can decide to set a policy that revokes uncommon apps if they ask for high permissions, only if the user who authorized the permissions is a member of the Administrators group.
2323

0 commit comments

Comments
 (0)