Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤️ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC1217650

Microsoft Defender for Cloud Apps – Improvements to Microsoft 365 connector configuration page

Informational

Message ID

MC1217650
View in Admin Center

Services

Microsoft Defender XDR

Summary

Microsoft Defender for Cloud Apps will update the Microsoft 365 connector configuration page in January 2026, adding clearer layouts and new default values for new connectors to reduce misconfigurations. Existing connectors remain unchanged. Admins should review current settings to ensure required Entra permissions are enabled.

Details

Introduction

Microsoft Defender for Cloud Apps is updating the Microsoft 365 connector configuration page with revised default values for new connector setups. These improvements are designed to help security administrators more easily understand the Microsoft Entra data signals required to support SaaS Identity–related security features. This update also reduces the likelihood of misconfigurations so that capabilities such as SaaS Identity Discovery, Threat Protection, Response, and Posture insights continue to receive the data they depend on.

This is also a good opportunity to verify that your existing connector configurations are set correctly for the security features in your environment.

When this will happen

We will begin rolling out in mid-January 2026 and expect to complete by late January 2026.

How this will affect your organization

Who is affected: Admins who manage Microsoft Defender for Cloud Apps and configure the Microsoft 365 connector.

What will happen:

  • Existing connectors will not be modified. All current connector settings will remain unchanged for privacy reasons.
  • The configuration page in the Microsoft 365 connector will receive an updated layout to clarify required permissions.
  • New default values will apply only to newly created Microsoft 365 connectors.
  • Limiting access to required Microsoft Entra signals may reduce threat detection coverage and posture accuracy.

What you need to do to prepare

  • Review your current configuration of Microsoft 365 connector settings to ensure required Entra permissions remain enabled:
  •  user settings

  • To do this:
    1. Go to Microsoft Security platform > Settings > Cloud apps > App connectors.
    2. Select Microsoft 365.
    3. Choose Edit settings.
    4. Ensure that all required checkboxes are selected (All except "Microsoft 365 files").
    5. Select Connect Microsoft 365.
  • Inform your security and identity teams about the updated UI so they are prepared once the refreshed layout becomes available.
  • Update internal documentation as needed.

Learn more: Connect Microsoft 365 to Microsoft Defender for Cloud Apps - How Defender for Cloud Apps helps protect your Microsoft 365 environment | Microsoft Learn

Compliance considerations

No compliance considerations identified. Review as appropriate for your organization.

Timeline

📅
Published
Jan 14, 2026
Message published to Message Center
✏️
Updated
Jan 14, 2026
Message content updated
🏁
End Date
Feb 22, 2026
Message timeline ends

Tags

#Feature update#User impact#Admin impact

Category

📖Stay Informed

Related Messages

Similar updates

MC1194061

IP address changes in Defender for Identity v2.x sensor communication

Dec 10, 2025
MC1192254

Microsoft Defender for Endpoint: New Microsoft Secure Score recommendations

Dec 5, 2025
MC1184997

Microsoft Defender for O365: New email actions available in Advanced Hunting

Nov 12, 2025
MC1223828

Microsoft Teams: Report a suspicious call

Jan 29, 2026
MC1219788

Microsoft Defender for Office 365: Enable users to report suspicious Teams messages in Plan 1

Jan 21, 2026