Working with the Dashboard

Start course

This course explores Microsoft Cloud App Security, including what it is, what it offers, and how it's configured. You'll learn about Cloud Discovery and how to configure Microsoft Cloud App Security. You’ll learn about access policies, policy templates, and how to manage OAuth apps, before diving into Cloud App Security log uploads.

We'll also look at app connectors and at the Cloud App Catalog before moving on to the Cloud App Security dashboard and ways to manage alerts. Finally, we'll cover data management reports.

Learning Objectives

  • Get a solid understanding of Microsoft Cloud App Security including what it is, what it offers, and how it's configured
  • Learn how to set up access policies and access templates
  • Learn how to manage OAuth apps and Cloud App Security uploads
  • Understand how app connectors and the Cloud App Catalog add security to your apps
  • Learn about Cloud App Security dashboard, how to manage alerts, and how to generate management reports

Intended Audience

This course is intended for those who wish to learn how to use Cloud App Security in Microsoft 365.


To get the most out of this course, you should already have some basic knowledge of Microsoft 365.


The main Cloud App Security dashboard is the window into your organization’s apps. It displays an overview of all the important stuff about your organization’s apps. The dashboard is comprised of a number of information cards. Each card displays summary information with links you can use to perform deeper investigation into the information that’s presented. You can even filter on specific apps and view the info specifically for that app in the dashboard.

So, what exactly can you do with the dashboard? What specific info does it show?

Well, for starters, it shows you the number of open alerts, it shows recent alerts, and it shows a graph of the alert status distribution. It also displays the number of discovered apps in the organization, along with a graph of the app risk distribution. You can also view the top app categories by traffic.

You’ll also notice in this screenshot that the dashboard shows the users that need to be investigated, and the number of apps protected by Conditional Access App Control. It also shows you the number of protected sessions and actions over the last 30 days.

The App connectors box shows the number of API-connected app instances, along with their status, while the files infected with malware box displays the number of files that have been infected with malware.

Privileged Office 365 OAuth apps displays a list of OAuth apps that are hardly used, but are still granted highly privileged permissions.

The Azure security configuration and AWS security configuration boxes display the number and severity of Azure security configuration recommendations and AWS security configuration recommendations, while the Data Loss Prevention Alerts box shows a graph of Data Loss Prevention alerts over the last 30 days.

In addition to the main dashboard, there are other dashboards you can use to investigate apps in your environment. For example, the App Dashboard overview pane provides an overview of app usage by location, and includes usage graphs per number of users, while the App Dashboard info pane shows information about app details, security, and compliance.

There are several other dashboards available as well. Each providing information about app usage in your environment.

You can read the latest information about the many types of available dashboards by visiting the URL that you see on your screen:


About the Author
Learning Paths

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.