GETTING STARTED WITH CLOUD APP SECURITY
APPS, DASHBOARDS & ALERTS
This course explores Microsoft Cloud App Security, including what it is, what it offers, and how it's configured. You'll learn about Cloud Discovery and how to configure Microsoft Cloud App Security. You’ll learn about access policies, policy templates, and how to manage OAuth apps, before diving into Cloud App Security log uploads.
We'll also look at app connectors and at the Cloud App Catalog before moving on to the Cloud App Security dashboard and ways to manage alerts. Finally, we'll cover data management reports.
- Get a solid understanding of Microsoft Cloud App Security including what it is, what it offers, and how it's configured
- Learn how to set up access policies and access templates
- Learn how to manage OAuth apps and Cloud App Security uploads
- Understand how app connectors and the Cloud App Catalog add security to your apps
- Learn about Cloud App Security dashboard, how to manage alerts, and how to generate management reports
This course is intended for those who wish to learn how to use Cloud App Security in Microsoft 365.
To get the most out of this course, you should already have some basic knowledge of Microsoft 365.
Earlier on in this course, we talked about connecting apps to Microsoft cloud app security. In this lesson here, we are going to talk a little bit more in detail about connecting apps, using app connectors.
To provide enhanced visibility and control of applications, Microsoft cloud app security uses app connectors to connect to your applications. These app connectors use the APIs from the app providers to provide this enhanced visibility and control. By leveraging the APIs that are provided by the app providers, Microsoft cloud app security can ensure that communication between itself and the connected apps is encrypted using HTTPs.
so exactly how do app connectors work? For starters, cloud app security is deployed with system admin privileges. This ensures that cloud app security has full access to all objects within the environment.
When cloud app security is connected to an app, it will scan and save authentication permissions. After scanning and saving authentication permissions for the connected app, cloud app security will perform a user scan for the app. Once the user scan completes, cloud app security will scan for activities and files related to the app.
After completing the initial user scan and scan for activities and files, cloud app security will scan users, groups, activities, and files on a regular basis. This flow is what provides you with visibility into your applications, using cloud app security.
The API connection will enable visibility into certain items, depending on which app you are connecting to. For example, API connections can provide visibility into users, accounts, profile information, and other account information for certain apps. An audit trail, which provides visibility into user activities, admin activities, and sign-on activities can also be made available.
Other information that is made available includes things like app permissions, account governance, data governance, and app permission governance.
On your screen is a list of apps that are supported with app connectors.
you can visit the URL that you see on your screen to see which capabilities are supported for each app:
The table that you see on your screen shows the specific app connector requirements for each app:
App connectors can be enabled and disabled from the connected apps page in Microsoft cloud app security.
Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.
In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.
In his spare time, Tom enjoys camping, fishing, and playing poker.