MC1036568 – (Updated) Updates to App Governance Pre-Defined Policies in Defender for Cloud Apps

cloudscout.one Icon

check before: 2025-05-15

Product:

Defender, Defender for Cloud Apps, Defender XDR, Microsoft 365 Apps

Platform:

Online, US Instances, World tenant

Status:

Change type:

Admin impact, Feature update, Updated message

Links:

Details:

Summary:
Microsoft Defender for Cloud Apps will disable three pre-defined policies by default by mid-May, 2025, to improve alert accuracy. The policies affected are related to data usage, unusual activity, and access to sensitive data. Users can re-enable these policies if desired. No immediate action is required.

Details:
Updated April 10, 2025: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Cloud Apps is continuously working to ensure that our out-of-the-box (OOTB) threat protection capabilities within App Governance are as accurate and effective as possible.
As part of this effort, we will be disabling by default three specific pre-defined policies that have been found to mostly trigger on legitimate activities, rather than alerting on malicious ones. This change is aimed at improving the overall accuracy of our alerts by relying on more accurate sources that provide a comprehensive view of potential attacks, rather than focusing on isolated anomalous activities.
If you prefer to continue receiving these alerts, the option to re-enable them remains available.
[When this will happen:]
General Availability (Worldwide): We will begin rolling out mid-May (previously late April) and expect to complete by late May 2025.
General Availability (GCC, GCC High): We will begin rolling out late May 2025 (previously late April) and expect to complete by late May 2025.

Change Category:
XXXXXXX ... free basic plan only

Scope:
XXXXXXX ... free basic plan only

Release Phase:

Created:
2025-03-20

updated:
2025-04-11

Task Type

XXXXXXX ... free basic plan only

Docu to Check

XXXXXXX ... free basic plan only

MS How does it affect me

XXXXXXX ... free basic plan only

MS Preperations

XXXXXXX ... free basic plan only

MS Urgency

XXXXXXX ... free basic plan only

MS workload name

XXXXXXX ... free basic plan only

summary for non-techies**

Microsoft Defender for Cloud Apps will disable three specific policies related to data usage, unusual activity, and access to sensitive data by default to reduce false alerts, with changes rolling out in May 2025, but users can re-enable them if desired.

Direct effects for Operations**

Alert Management
Disabling pre-defined policies may lead to a lack of alerts for unusual activities, potentially allowing malicious actions to go unnoticed.
   - roles: Security Analyst, IT Administrator
   - references: https://learn.microsoft.com/defender-cloud-apps/app-governance-app-policies-get-started

User Experience
Users may experience a false sense of security due to fewer alerts, which could lead to complacency in monitoring app activities.
   - roles: End User, Compliance Officer
   - references: https://learn.microsoft.com/defender-cloud-apps/app-governance-app-policies-get-started

Policy Customization
Organizations that rely on the disabled policies for compliance may face challenges in meeting regulatory requirements without prior adjustments.
   - roles: Compliance Officer, IT Administrator
   - references: https://learn.microsoft.com/defender-cloud-apps/app-governance-app-policies-get-started

Configutation Options**

XXXXXXX ... paid membership only

Opportunities**

XXXXXXX ... free basic plan only

Potentional Risks**

XXXXXXX ... paid membership only

IT Security**

XXXXXXX ... paid membership only

explanation for non-techies**

XXXXXXX ... free basic plan only

** AI generated content. This information must be reviewed before use.

a free basic plan is required to see more details. Sign up here


A cloudsocut.one plan is required to see all the changed details. If you are already a customer, choose login.
If you are new to cloudscout.one please choose a plan.



change history

DatePropertyoldnew
2025-04-11MC MessageTagNamesFeature update, Admin impactUpdated message, Feature update, Admin impact
2025-04-11MC SummaryMicrosoft Defender for Cloud Apps will disable three pre-defined policies by default on April 21, 2025, to improve alert accuracy. The policies affected are related to data usage, unusual activity, and access to sensitive data. Users can re-enable these policies if desired. No immediate action is required.Microsoft Defender for Cloud Apps will disable three pre-defined policies by default by mid-May, 2025, to improve alert accuracy. The policies affected are related to data usage, unusual activity, and access to sensitive data. Users can re-enable these policies if desired. No immediate action is required.
2025-04-11MC Last Updated03/20/2025 00:04:082025-04-10T17:05:36Z
2025-04-11MC MessagesMicrosoft Defender for Cloud Apps is continuously working to ensure that our out-of-the-box (OOTB) threat protection capabilities within App Governance are as accurate and effective as possible.
As part of this effort, we will be disabling by default three specific pre-defined policies that have been found to mostly trigger on legitimate activities, rather than alerting on malicious ones. This change is aimed at improving the overall accuracy of our alerts by relying on more accurate sources that provide a comprehensive view of potential attacks, rather than focusing on isolated anomalous activities.
If you prefer to continue receiving these alerts, the option to re-enable them remains available.
[When this will happen:]
General Availability (Worldwide, GCC, GCC High): Rollout is simultaneous to all tenants and will happen on April 21, 2025
Updated April 10, 2025: We have updated the rollout timeline below. Thank you for your patience.
Microsoft Defender for Cloud Apps is continuously working to ensure that our out-of-the-box (OOTB) threat protection capabilities within App Governance are as accurate and effective as possible.
As part of this effort, we will be disabling by default three specific pre-defined policies that have been found to mostly trigger on legitimate activities, rather than alerting on malicious ones. This change is aimed at improving the overall accuracy of our alerts by relying on more accurate sources that provide a comprehensive view of potential attacks, rather than focusing on isolated anomalous activities.
If you prefer to continue receiving these alerts, the option to re-enable them remains available.
[When this will happen:]
General Availability (Worldwide): We will begin rolling out mid-May (previously late April) and expect to complete by late May 2025.
General Availability (GCC, GCC High): We will begin rolling out late May 2025 (previously late April) and expect to complete by late May 2025.
2025-04-11MC TitleUpdates to App Governance Pre-Defined Policies in Defender for Cloud Apps(Updated) Updates to App Governance Pre-Defined Policies in Defender for Cloud Apps
2025-04-11MC How AffectThese specific pre-defined policies within App Governance will be switched off for all customers by default. The policies being disabled are:
Increase in data usage by an overprivileged or highly privileged app
Unusual activity from an app with priority account consent
Access to sensitive data
This change will reduce the number of alerts triggered by legitimate activities, allowing you to focus on more accurate and relevant security notifications. The remaining policies and our advanced threat detection engines, which are always enabled and running behind the scenes, will continue to provide robust protection by correlating multiple pieces of evidence to identify potential attacks with higher confidence.
If for any reason you prefer to continue receiving these alerts can re-enable the policies via the policy management interface. Additionally, we provide tools for customers to create custom policies tailored to their specific needs. For more details, please refer to the relevant documentation.
For more details, please refer to the relevant documentation: Get started with app policies
These specific pre-defined policies within App Governance will be switched off for all customers by default. The policies being disabled are:
Increase in data usage by an overprivileged or highly privileged app
Unusual activity from an app with priority account consent
Access to sensitive data
This change will reduce the number of alerts triggered by legitimate activities, allowing you to focus on more accurate and relevant security notifications. The remaining policies and our advanced threat detection engines, which are always enabled and running behind the scenes, will continue to provide robust protection by correlating multiple pieces of evidence to identify potential attacks with higher confidence.
If you have made any changes to customize the existing pre-defined policy template, they will not be disabled as part of this change.
If for any reason you prefer to continue receiving these alerts, you can re-enable the policies via the policy management interface. Additionally, we provide tools for customers to create custom policies tailored to their specific needs. For more details, please refer to the relevant documentation.
For more details, please refer to the relevant documentation: Get started with app policies

Last updated 2 weeks ago

Share to MS Teams

Login to your account

Welcome Back, We Missed You!