Skip to content

Commit c989232

Browse files
Merge pull request #4618 from MicrosoftDocs/main
[AutoPublish] main to live - 07/30 04:30 PDT | 07/30 17:00 IST
2 parents f376982 + ad5a480 commit c989232

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

CloudAppSecurityDocs/proxy-intro-aad.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,8 @@ ms.topic: concept-article
66
---
77
# Conditional Access app control in Microsoft Defender for Cloud Apps
88

9-
In today's workplace, it's not enough to know what happened in your cloud environment after the fact. You need to stop breaches and leaks in real time. You also need to prevent employees from intentionally or accidentally putting your data and organization at risk.
10-
11-
You want to support users in your organization while they use the best cloud apps available and bring their own devices to work. However, you also need tools to protect your organization from data leaks and theft in real time. Microsoft Defender for Cloud Apps integrates with any identity provider (IdP) to deliver this protection with [access](access-policy-aad.md) and [session](session-policy-aad.md) policies.
9+
In today’s workplace, it’s not enough to understand what happened in your cloud environment after the fact, you need to stop breaches and data leaks as they happen. That includes preventing employees from intentionally or accidentally putting your data and organization at risk.
10+
Microsoft Defender for Cloud Apps helps you strike the right balance: enabling productivity with the best cloud apps while protecting your data in real time. It delivers deep visibility and control over **browser-based sessions** through integration with any identity provider (IdP), using powerful [access](access-policy-aad.md) and [session](session-policy-aad.md) policies.
1211

1312
For example:
1413

@@ -26,6 +25,8 @@ Microsoft Edge users benefit from [direct, in-browser protection](in-browser-pro
2625

2726
Users of other browsers are redirected via reverse proxy to Defender for Cloud Apps. Those browsers display an `*.mcas.ms` suffix in the link's URL. For example, if the app URL is `myapp.com`, the app URL is updated to `myapp.com.mcas.ms`.
2827

28+
To prevent bypassing this protection, admins should configure access policies to block native client access and allow only browser-based sessions.
29+
2930
This article describes Conditional Access app control in Defender for Cloud Apps through [Microsoft Entra Conditional Access](/entra/identity/conditional-access/overview) policies.
3031

3132
## Activities in Conditional Access app control

0 commit comments

Comments
 (0)