Skip to content

Commit 389e480

Browse files
committed
fixing freshness
1 parent 6df9c25 commit 389e480

File tree

3 files changed

+33
-30
lines changed

3 files changed

+33
-30
lines changed
17.5 KB
Loading

defender-xdr/pilot-deploy-defender-cloud-apps.md

Lines changed: 32 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ search.appverid: met150
55
ms.service: defender-xdr
66
f1.keywords:
77
- NOCSH
8-
ms.author: bcarter
9-
author: brendacarter
10-
ms.date: 05/31/2024
8+
ms.author: bagol
9+
author: batamig
10+
ms.date: 01/12/2025
1111
ms.localizationpriority: medium
1212
manager: dansimp
1313
audience: ITPro
@@ -112,13 +112,13 @@ This article includes guidance for both methods.
112112

113113
<a name="step-1"></a>
114114

115-
## Step 1. Connect to the Defender for Cloud Apps portal
115+
## Step 1. Access Microsoft Defender for Cloud Apps
116116

117-
To verify licensing and to connect to the Defender for Cloud Apps portal, see [Quickstart: Get started with Microsoft Defender for Cloud Apps](/cloud-app-security/getting-started-with-cloud-app-security).
117+
To verify licensing and to connect to the Defender for Cloud Apps portal, see [Get started with Microsoft Defender for Cloud Apps](/defender-cloud-apps/getting-started-with-defender-cloud-apps).
118118

119-
If you're not immediately able to connect to the portal, you might need to add the IP address to the allow list of your firewall. See [Basic setup for Defender for Cloud Apps](/cloud-app-security/general-setup).
119+
If you're not immediately able to connect to the portal, you might need to add the IP address to the allow list of your firewall. For more information, see [Basic setup for Defender for Cloud Apps](/defender-cloud-apps/general-setup).
120120

121-
If you're still having trouble, review [Network requirements](/cloud-app-security/network-requirements).
121+
If you're still having trouble, review [Network requirements](/defender-cloud-apps/network-requirements).
122122

123123
<a name="step-2"></a>
124124

@@ -128,28 +128,31 @@ Microsoft Defender for Cloud Apps integrates with Microsoft Defender for Endpoin
128128

129129
If you've already set up Microsoft Defender for Endpoint, configuring integration with Defender for Cloud Apps is a toggle in Microsoft Defender XDR. After integration is turned on, you can return to the Defender for Cloud Apps portal and view rich data in the Cloud Discovery Dashboard.
130130

131-
To accomplish these tasks, see [Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud Apps](/cloud-app-security/mde-integration).
131+
To accomplish these tasks, see [Integrate Microsoft Defender for Endpoint with Microsoft Defender for Cloud Apps](/defender-cloud-apps/mde-integration).
132132

133133
<a name="step-3"></a>
134134

135135
## Step 3: Deploy the Defender for Cloud Apps log collector on your firewalls and other proxies
136136

137-
For coverage on all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies to collect data from your endpoints and send it to Defender for Cloud Apps for analysis.
137+
- For coverage on all devices connected to your network, deploy the Defender for Cloud Apps log collector on your firewalls and other proxies to collect data from your endpoints and send it to Defender for Cloud Apps for analysis. For more information, see [Configure automatic log upload for continuous reports](/defender-cloud-apps/discovery-docker).
138138

139-
If you're using one of the following Secure Web Gateways (SWG), Defender for Cloud Apps provides seamless deployment and integration:
139+
- Defender for Cloud Apps provides built-in app connectors for popular cloud apps. These connectors use the APIs of app providers to enable greater visibility and control over how these apps are used in your organization. For more information, see [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps).
140140

141-
- Zscaler
142-
- iboss
143-
- Corrata
144-
- Menlo Security
141+
- If you're using one of the following Secure Web Gateways (SWG), Defender for Cloud Apps provides seamless deployment and integration:
145142

146-
For more information on integrating with these network devices, see [Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery).
143+
- [Zscaler](/defender-cloud-apps/zscaler-integration)
144+
- [iboss](/defender-cloud-apps/iboss-integration)
145+
- [Corrata](/defender-cloud-apps/corrata-integration)
146+
- [Menlo Security](/defender-cloud-apps/menlo-integration)
147+
- [Open Systems](/defender-cloud-apps/open-systems-integration)
148+
149+
For more information, see [Cloud app discovery overview](/defender-cloud-apps/set-up-cloud-discovery).
147150

148151
<a name="step-4"></a>
149152

150153
## Step 4. Create a pilot group — Scope your pilot deployment to certain user groups
151154

152-
Microsoft Defender for Cloud Apps enables you to scope your deployment. Scoping allows you to select certain user groups to be monitored for apps or excluded from monitoring. You can include or exclude user groups. To scope your pilot deployment, see [Scoped Deployment](/cloud-app-security/scoped-deployment).
155+
Microsoft Defender for Cloud Apps enables you to scope your deployment. Scoping allows you to select certain user groups to be monitored for apps or excluded from monitoring. You can include or exclude user groups. To scope your pilot deployment, see [Scope your deployment to specific users or user groups](/defender-cloud-apps/scoped-deployment).
153156

154157
<a name="step-5"></a>
155158

@@ -173,7 +176,7 @@ View the Cloud Discovery dashboard to see what apps are being used in your organ
173176

174177
The Cloud Discovery dashboard is designed to give you more insight into how cloud apps are being used in your organization. It provides an at-a-glance overview of what kinds of apps are being used, your open alerts, and the risk levels of apps in your organization.
175178

176-
To get started using the Cloud Discovery dashboard, see [Working with discovered apps](/cloud-app-security/discovered-apps).
179+
To get started using the Cloud Discovery dashboard, see [View discovered apps with the Cloud discovery dashboard](/defender-cloud-apps/discovered-apps).
177180

178181
### Manage cloud apps
179182

@@ -206,14 +209,14 @@ In this illustration:
206209

207210
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that have not been added to Microsoft Entra ID. You can take advantage of Conditional Access App Control by adding these cloud apps to your Microsoft Entra tenant and the scope of your conditional access rules.
208211

209-
The first step in using Microsoft Defender for Cloud Apps to manage SaaS apps is to discover these apps and then add them to your Microsoft Entra tenant. If you need help with discovery, see [Discover and manage SaaS apps in your network](/cloud-app-security/tutorial-shadow-it). After you've discovered apps, [add these apps to your Microsoft Entra tenant](/azure/active-directory/manage-apps/add-application-portal).
212+
The first step in using Microsoft Defender for Cloud Apps to manage SaaS apps is to discover these apps and then add them to your Microsoft Entra tenant. If you need help with discovery, see [Discover and manage SaaS apps in your network](/defender-cloud-apps/tutorial-shadow-it). After you've discovered apps, [add these apps to your Microsoft Entra tenant](/azure/active-directory/manage-apps/add-application-portal).
210213

211214
You can begin to manage these apps with the following tasks:
212215

213216
1. In Microsoft Entra ID, create a new conditional access policy and configure it to "Use Conditional Access App Control." This configuration helps to redirect the request to Defender for Cloud Apps. You can create one policy and add all SaaS apps to this policy.
214217
2. Next, in Defender for Cloud Apps, create session policies. Create one policy for each control you want to apply.
215218

216-
For more information, including supported apps and clients, see [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/cloud-app-security/proxy-intro-aad).
219+
For more information, including supported apps and clients, see [Protect apps with Microsoft Defender for Cloud Apps Conditional Access App Control](/defender-cloud-apps/proxy-intro-aad).
217220

218221
For example policies, see [Recommended Microsoft Defender for Cloud Apps policies for SaaS apps](/security/zero-trust/zero-trust-identity-device-access-policies-mcas-saas). These policies build on a set of [common identity and device access policies](/security/zero-trust/zero-trust-identity-device-access-policies-overview) that are recommended as a starting point for all customers.
219222

@@ -241,14 +244,14 @@ For more information, see [Create session policies](/defender-cloud-apps/session
241244

242245
Use these Defender for Cloud Apps tutorials to help you discover risk and protect your environment:
243246

244-
- [Detect suspicious user activity](/cloud-app-security/tutorial-suspicious-activity)
245-
- [Investigate risky users](/cloud-app-security/tutorial-ueba)
246-
- [Investigate risky OAuth apps](/cloud-app-security/investigate-risky-oauth)
247-
- [Discover and protect sensitive information](/cloud-app-security/tutorial-dlp)
248-
- [Protect any app in your organization in real time](/cloud-app-security/tutorial-proxy)
249-
- [Block downloads of sensitive information](/cloud-app-security/use-case-proxy-block-session-aad)
250-
- [Protect your files with admin quarantine](/cloud-app-security/use-case-admin-quarantine)
251-
- [Require step-up authentication upon risky action](/cloud-app-security/tutorial-step-up-authentication)
247+
- [Detect suspicious user activity](/defender-cloud-apps/tutorial-suspicious-activity)
248+
- [Investigate risky users](/defender-cloud-apps/tutorial-ueba)
249+
- [Investigate risky OAuth apps](/defender-cloud-apps/investigate-risky-oauth)
250+
- [Discover and protect sensitive information](/defender-cloud-apps/tutorial-dlp)
251+
- [Protect any app in your organization in real time](/defender-cloud-apps/tutorial-proxy)
252+
- [Block downloads of sensitive information](/defender-cloud-apps/use-case-proxy-block-session-aad)
253+
- [Protect your files with admin quarantine](/defender-cloud-apps/use-case-admin-quarantine)
254+
- [Require step-up authentication upon risky action](/defender-cloud-apps/tutorial-step-up-authentication)
252255

253256
For more information on advanced hunting in Microsoft Defender for Cloud Apps data, see this [video](https://www.microsoft.com/en-us/videoplayer/embed/RWFISa).
254257

@@ -258,9 +261,9 @@ You can integrate Defender for Cloud Apps with Microsoft Sentinel or a generic s
258261

259262
:::image type="content" source="./media/eval-defender-xdr/defender-cloud-apps-siem-integration.svg" alt-text="A diagram that shows the architecture for Microsoft Defender for Cloud Apps with SIEM integration." lightbox="./media/eval-defender-xdr/defender-cloud-apps-siem-integration.svg":::
260263

261-
Microsoft Sentinel includes a Defender for Cloud Apps connector. This allows you to not only gain visibility into your cloud apps but to also get sophisticated analytics to identify and combat cyberthreats and to control how your data travels. For more information, see [Microsoft Sentinel integration](/defender-cloud-apps/siem-sentinel) and [Stream alerts and Cloud Discovery logs from Defender for Cloud Apps into Microsoft Sentinel](/azure/sentinel/connect-cloud-app-security).
264+
Microsoft Sentinel includes a Defender for Cloud Apps connector. This allows you to not only gain visibility into your cloud apps but to also get sophisticated analytics to identify and combat cyberthreats and to control how your data travels. For more information, see [Microsoft Sentinel integration](/defender-cloud-apps/siem-sentinel) and [Stream alerts and Cloud Discovery logs from Defender for Cloud Apps into Microsoft Sentinel](/azure/sentinel/connect-defender-cloud-apps).
262265

263-
For information about integration with third-party SIEM systems, see [Generic SIEM integration](/cloud-app-security/siem).
266+
For information about integration with third-party SIEM systems, see [Generic SIEM integration](/defender-cloud-apps/siem).
264267

265268
## Next step
266269

defender-xdr/pilot-deploy-defender-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You start by evaluating the product or service and how it will work within your
5757

5858
Here is the workflow for piloting and deploying Defender for Identity in your production environment.
5959

60-
:::image type="content" source="./media/eval-defender-xdr/defender-identity-pilot-deploy-steps.svg" alt-text="A diagram that shows the steps to pilot and deploy Microsoft Defender for Identity." lightbox="./media/eval-defender-xdr/defender-identity-pilot-deploy-steps.svg" border="false":::
60+
:::image type="content" source="./media/eval-defender-xdr/defender-identity-pilot-deploy-steps.png" alt-text="A diagram that shows the steps to pilot and deploy Microsoft Defender for Identity." lightbox="./media/eval-defender-xdr/defender-identity-pilot-deploy-steps.png" border="false":::
6161

6262
Follow these steps:
6363

0 commit comments

Comments
 (0)