You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/best-practices.md
+2-27Lines changed: 2 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ The best practices discussed in this article include:
30
30
Integrating Defender for Cloud Apps with Microsoft Defender for Endpoint gives you the ability to use cloud discovery beyond your corporate network or secure web gateways. With the combined user and device information, you can identify risky users or devices, see what apps they are using, and investigate further in the Defender for Endpoint portal.
31
31
32
32
**Best practice**: Enable Shadow IT Discovery using Defender for Endpoint
33
-
**Detail**: Cloud discovery analyzes traffic logs collected by Defender for Endpoint and assesses identified apps against the cloud app catalog to provide compliance and security information. By configuring cloud discovery, you gain visibility into cloud use, Shadow IT, and continuous monitoring of the unsanctioned apps being used by your users.
33
+
**Detail**: Cloud discovery analyzes traffic logs collected by Defender for Endpoint, Firewall and Secure Web Gateways and assesses identified apps against the cloud app catalog to provide compliance and security information. By configuring cloud discovery, you gain visibility into cloud use, Shadow IT, and continuous monitoring of the unsanctioned apps being used by your users.
34
34
**For more information**:
35
35
36
36
*[Microsoft Defender for Endpoint integration with Defender for Cloud Apps](mde-integration.md)
@@ -59,7 +59,6 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
59
59
*[OAuth app policies](app-permission-policy.md)
60
60
61
61
---
62
-
<br/><br/>
63
62
64
63
## Apply cloud governance policies
65
64
@@ -126,18 +125,6 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
126
125
127
126
---
128
127
129
-
**Best practice**: Review reports in the **Files** page
130
-
**Detail**: Once you've connected various SaaS apps using app connectors, Defender for Cloud Apps scans files stored by these apps. In addition, each time a file is modified it is scanned again. You can use the **Files** page to understand and investigate the types of data being stored in your cloud apps. To help you investigate, you can filter by domains, groups, users, creation date, extension, file name and type, file ID, sensitivity label, and more. Using these filters puts you in control of how you choose to investigate files to make sure none of your data is at risk. Once you have a better understanding of how your data is being used, you can create policies to scan for sensitive content in these files.
## Block and protect download of sensitive data to unmanaged or risky devices
154
139
@@ -160,8 +145,6 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
160
145
*[Session policies](session-policy-aad.md)
161
146
162
147
---
163
-
<br/><br/>
164
-
165
148
166
149
## Secure collaboration with external users by enforcing real-time session controls
167
150
@@ -173,8 +156,6 @@ Defender for Cloud Apps provides you with the ability to investigate and monitor
173
156
*[Session policies](session-policy-aad.md)
174
157
175
158
---
176
-
<br/><br/>
177
-
178
159
179
160
## Detect cloud threats, compromised accounts, malicious insiders, and ransomware
180
161
@@ -187,9 +168,7 @@ Anomaly detection policies are triggered when there are unusual activities perfo
187
168
188
169
***Set IP Ranges**: Defender for Cloud Apps can identify known IP addresses once IP address ranges are set. With IP address ranges configured, you can tag, categorize, and customize the way logs and alerts are displayed and investigated. Adding IP address ranges helps to reduce false positive detections and improve the accuracy of alerts. If you choose not to add your IP addresses, you may see an increased number of possible false positives and alerts to investigate.
189
170
190
-
***Send Feedback for alerts**
191
-
192
-
When dismissing or resolving alerts, make sure to send feedback with the reason you dismissed the alert or how it's been resolved. This information assists Defender for Cloud Apps to improve our alerts and reduce false positives.
171
+
***Send Feedback for alerts**: When dismissing or resolving alerts, make sure to send feedback with the reason you dismissed the alert or how it's been resolved. This information assists Defender for Cloud Apps to improve our alerts and reduce false positives.
193
172
194
173
**For more information**:
195
174
@@ -214,8 +193,6 @@ Anomaly detection policies are triggered when there are unusual activities perfo
214
193
*[OAuth app policies](app-permission-policy.md)
215
194
216
195
---
217
-
<br/><br/>
218
-
219
196
220
197
## Use the audit trail of activities for forensic investigations
221
198
@@ -230,8 +207,6 @@ When dismissing alerts, it's important to investigate and understand why they ar
0 commit comments