Skip to content

Commit 937c44c

Browse files
authored
Merge pull request #1676 from MicrosoftDocs/ADO-9394817-CloudAppSecurityDocs
[ADO 9394817] Add CloudAppSecurityDocs to defender-docs-pr
2 parents 6238260 + 4f2e51e commit 937c44c

File tree

763 files changed

+28729
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

763 files changed

+28729
-0
lines changed
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
---
2+
title: Create access policies | Microsoft Defender for Cloud Apps
3+
description: Learn how to configure Microsoft Defender for Cloud Apps access policies with Conditional Access app control to control access to cloud apps.
4+
ms.date: 05/15/2024
5+
ms.topic: how-to
6+
---
7+
# Create Microsoft Defender for Cloud Apps access policies
8+
9+
10+
11+
Microsoft Defender for Cloud Apps access policies use Conditional Access app control to provide real-time monitoring and control over access to cloud apps. Access policies control access based on user, location, device, and app, and are supported for any device.
12+
13+
Policies created for a host app are not connected to any related resource apps. For example, access policies that you create for Teams, Exchange, or Gmail are not connected to SharePoint, OneDrive, or Google Drive. If you need a policy for the resource app in addition to the host app, create a separate policy.
14+
15+
> [!TIP]
16+
> If you'd prefer to generally allow access while monitoring sessions or limit specific session activities, create session policies instead. For more information, see [Session policies](session-policy-aad.md).
17+
18+
## Prerequisites
19+
20+
Before you start, make sure that you have the following prerequisites:
21+
22+
- A Defender for Cloud Apps license, either as a stand-alone license or as part of another license.
23+
24+
- A license for Microsoft Entra ID P1, either as stand-alone license or as part of another license.
25+
26+
- If you're using a non-Microsoft IdP, the license required by your identity provider (IdP) solution.
27+
28+
- The relevant apps onboarded to Conditional Access app control. Microsoft Entra ID apps are automatically onboarded, while non-Microsoft IdP apps must be onboarded manually.
29+
30+
If you're working with a non-Microsoft IdP, make sure that you've also configured your IdP to work with Microsoft Defender for Cloud Apps. For more information, see:
31+
32+
- [Onboard non-Microsoft IdP catalog apps for Conditional Access app control](proxy-deployment-featured-idp.md)
33+
- [Onboard non-Microsoft IdP custom apps for Conditional Access app control](proxy-deployment-any-app-idp.md)
34+
35+
In order for your access policy to work, you must also have a Microsoft Entra ID Conditional Access policy, which creates the permissions to control traffic.
36+
37+
[!INCLUDE [entra-conditional-access-policy](includes/entra-conditional-access-policy.md)]
38+
39+
40+
## Create a Defender for Cloud Apps access policy
41+
42+
This procedure describes how to create a new access policy in Defender for Cloud Apps.
43+
44+
1. In Microsoft Defender XDR, select the **Cloud Apps > Policies > Policy management > Conditional Access** tab.
45+
46+
1. Select **Create policy** > **Access policy**. For example:
47+
48+
![Create a Conditional Access policy.](media/create-policy-from-conditional-access-tab.png)
49+
50+
1. On the **Create access policy** page, enter the following basic information:
51+
52+
|Name |Description |
53+
|---------|---------|
54+
|**Policy name** | A meaningful name for your policy, such as *Block access from unmanaged devices* |
55+
|**Policy severity** | Select the severity you want to apply to your policy. |
56+
|**Category** | Keep the default value of **Access control** |
57+
| **Description** | Enter an optional, meaningful description for your policy to help your team understand its purpose. |
58+
59+
1. In the **Activities matching all of the following** area, select additional activity filters to apply to the policy. Filters include the following options:
60+
61+
|Name |Description |
62+
|---------|---------|
63+
| **App** | Filters for a specific app to include in the policy. Select apps by first selecting whether they use **Automated Azure AD onboarding**, for Microsoft Entra ID apps, or **Manual onboarding**, for non-Microsoft IdP apps. Then, select the app you want to include in your filter from the list. <br><br>If your non-Microsoft IdP app is missing from the list, make sure that you've onboarded it fully. For more information, see: <br>- [Onboard non-Microsoft IdP catalog apps for Conditional Access app control](proxy-deployment-featured-idp.md)<br>- [Onboard non-Microsoft IdP custom apps for Conditional Access app control](proxy-deployment-any-app-idp.md) <br><br>If you choose not to use the **App** filter, the policy applies to all applications that are marked as **Enabled** on the **Settings > Cloud Apps > Connected apps > Conditional Access App Control apps** page.<br><br>**Note**: You may see some overlap between apps that are onboarded and apps that need manual onboarding. In case of a conflict in your filter between the apps, manually onboarded apps take precedence.|
64+
| **Client app** | Filter for browser or mobile/desktop apps. |
65+
| **Device** | Filter for device tags, such as for a specific device management method, or device types, such as PC, mobile, or tablet.|
66+
|**IP address** | Filter per IP address or use previously assigned IP address tags. |
67+
|**Location** | Filter by geographic location. The absence of a clearly defined location may identify risky activities. |
68+
| **Registered ISP** |Filter for activities coming from a specific ISP.|
69+
| **User** | Filter for a specific user or group of users. |
70+
| **User agent string** | Filter for a specific user agent string.|
71+
|**User agent tag** | Filter for user agent tags, such as for outdated browsers or operating systems. |
72+
73+
For example:
74+
75+
:::image type="content" source="media/access-policy-aad/onboarded-apps-filter.png" alt-text="Screenshot of a sample filter when creating an access policy.":::
76+
77+
Select **Edit and preview results** to get a preview of the types of activities that would be returned with your current selection.
78+
79+
1. In the **Actions** area, select one of the following options:
80+
81+
- **Audit**: Set this action to allow access according to the policy filters you set explicitly.
82+
83+
- **Block**: Set this action to block access according to the policy filters you set explicitly.
84+
85+
1. In the **Alerts** area, configure any of the following actions as needed:
86+
87+
- **Create an alert for each matching event with the policy's severity**
88+
- **Send an alert as email**
89+
- **Daily alert limit per policy**
90+
- **Send alerts to Power Automate**
91+
92+
1. When you're done, select **Create**.
93+
94+
## Test your policy
95+
96+
After you've created your access policy, test it by re-authenticating to each app configured in the policy. Verify that your app experience is as expected, and then check your activity logs.
97+
98+
We recommend that you:
99+
100+
- Create a policy for a user you've created specifically for testing.
101+
- Sign out of all existing sessions before re-authenticating to your apps.
102+
- Sign into mobile and desktop apps from both managed and unmanaged devices to ensure that activities are fully captured in the activity log.
103+
104+
Make sure to sign in with a user that matches your policy.
105+
106+
**To test your policy in your app**:
107+
108+
- Visit all pages within the app that are part of a user's work process and verify that the pages render correctly.
109+
- Verify that the behavior and functionality of the app isn't adversely affected by performing common actions such as downloading and uploading files.
110+
- If you're working with custom, non-Microsoft IdP apps, check each of the domains that you've [manually added for your app](troubleshooting-proxy.md#add-domains-for-your-app).
111+
112+
**To check activity logs**:
113+
114+
1. In Microsoft Defender XDR, select **Cloud apps > Activity log**, and check for the sign-in activities captured for each step. You may want to filter by selecting **Advanced filters** and filtering for **Source equals Access control**.
115+
116+
**Single sign-on log on** activities are Conditional Access app control events.
117+
118+
1. Select an activity to expand for more details. Check to see that the **User agent** tag properly reflects whether the device is a built-in client, either a mobile or desktop app, or the device is a managed device that's compliant and domain-joined.
119+
120+
If you encounter errors or issues, use the **Admin View toolbar** to gather resources such as `.Har` files and recorded sessions, and then file a support ticket.
121+
122+
## Create access policies for identity-managed devices
123+
124+
Use client certificates to control access for devices that aren't Microsoft Entra-hybrid joined and aren't managed by Microsoft Intune. Roll out new certificates to managed devices, or use existing certificates, such as third-party MDM certificates. For example, you may want to deploy client certificate to managed devices and then block access from devices without a certificate.
125+
126+
For more information, see [Identity managed devices with Conditional Access app control](conditional-access-app-control-identity.md).
127+
128+
## Related content
129+
130+
For more information, see:
131+
132+
- [Troubleshooting access and session controls](troubleshooting-proxy.md)
133+
- [Tutorial: Block download of sensitive information with conditional access app control](use-case-proxy-block-session-aad.md)
134+
- [Blocking downloads on unmanaged devices using session controls](use-case-proxy-block-session-aad.md)
135+
- [Conditional access app control webinar](webinars.md#on-demand-webinars)
136+
137+
[!INCLUDE [Open support ticket](includes/support.md)]

CloudAppSecurityDocs/accounts.md

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Investigate accounts from connected apps | Microsoft Defender for Cloud Apps
3+
description: This article provides information about reviewing accounts from your connected apps.
4+
ms.date: 01/29/2023
5+
ms.topic: how-to
6+
---
7+
# Accounts
8+
9+
10+
11+
Microsoft Defender for Cloud Apps gives you visibility into the accounts from your connected apps. After you connect Defender for Cloud Apps to an app using the App connector, Defender for Cloud Apps reads account information associated with connected apps. The Accounts page enables you to investigate those accounts, permissions, the groups they're members of, their aliases, and the apps they're using. Additionally, when Defender for Cloud Apps detects a new account that wasn't previously seen in one of the connected apps - for example, in activities or file sharing - the account is added to the accounts list of that app. This enables you to have visibility into the activity of external users interacting with your cloud apps.
12+
13+
Admins can search for a specific user's metadata or user's activity. The **Identities** page provides you with comprehensive details about the entities that are pulled from connected cloud applications. It also provides the user's activity history and security alerts related to the user.
14+
15+
The **Identities** page can be [filtered](#identities-filters) to enable you to find specific accounts and to deep dive into different types of accounts, for example, you can filter for all External accounts that haven't been accessed since last year.
16+
17+
The **Identities** page enables you to easily investigate your accounts, including the following issues:
18+
19+
* Check if any accounts have been inactive in a particular service for a long time (Maybe you should revoke the license for that user to that service)
20+
21+
* You can filter for the list of users with admin permissions
22+
* You can search for users who are no longer part of your organization but may still have active accounts
23+
* You can take [governance actions](#governance-actions) on the accounts, such as suspending an app or going to the account settings page.
24+
* You can see which accounts are included in each user group
25+
* You can see which apps are accessed by each account and which apps are deleted for specific accounts
26+
27+
![accounts screen.](media/accounts-page.png)
28+
29+
## Identities filters
30+
31+
Following is a list of the account filters that can be applied. Most filters support multiple values as well as NOT, in order to provide you with a powerful tool for policy creation.
32+
33+
* **Affiliation**: The affiliation is either **Internal** or **External**. To set which users and accounts are internal, under **Settings** make sure to set the **IP address range** of your internal organization. If the account has admin permissions the icon in the Accounts table appears with the addition of the red tie:
34+
35+
![accounts admin icon.](media/accounts-admin-icon.png)
36+
37+
* **App**: You can filter for any API connected app being used by accounts in your organization.
38+
* **Domain**: This enables you to filter for users in specific domains.
39+
* **Groups**: Enables you to filter for members of user groups in Defender for Cloud Apps - both built-in user groups and imported user groups.
40+
* **Instance**: This enables you to filter for members of a specific app instance.
41+
* **Last seen**: The **last seen** filter enables you to find accounts that are dormant and whose users haven't performed any activities in a while.
42+
* **Organization**: This enables you to filter for members of specific organizational groups defined in your connected apps.
43+
* **Show Admins only**: Filters for accounts and users that are admins.
44+
* **Status**: Filter based on user account status of N/A, staged, active, suspended, or deleted. A status of not available (N/A) is normal and may appear, for example, for anonymous accounts.
45+
* **Type**: This enables you to filter to either the user or the account type.
46+
* **User name**: Enables you to filter specific users.
47+
48+
## Governance actions
49+
50+
From the **Users and account** page, you can take governance actions such as suspending an app or going to the account settings page. For a full list of governance actions, see the [governance log](governance-actions.md).
51+
52+
For example, if you identify a user that is compromised, you can apply the **Confirm user compromised** action to set the user risk level to high, causing the relevant policy actions defined in Microsoft Entra ID to be enforced. The action can be applied manually or using relevant [policies that support governance actions](governance-actions.md).
53+
54+
### To manually apply a user or account governance action
55+
56+
From the **Users and account** page, on the row where the relevant user or account appears, choose the three dots at the end of the row, then select **Confirm user compromised**.
57+
58+
## Next steps
59+
60+
> [!div class="nextstepaction"]
61+
> [Best practices for protecting your organization](best-practices.md)
62+
63+
[!INCLUDE [Open support ticket](includes/support.md)]

0 commit comments

Comments
 (0)