Skip to content

Commit e8122dc

Browse files
authored
Merge pull request #410 from joe-davies-affirm/v-jodavies-maint
Graphics updates.
2 parents bdde993 + bd43730 commit e8122dc

6 files changed

+1484
-1659
lines changed

defender-xdr/eval-defender-mcas-architecture.md

Lines changed: 15 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -33,16 +33,11 @@ Before enabling Microsoft Defender for Cloud Apps, be sure you understand the ar
3333

3434
## Understand the architecture
3535

36-
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB). CASBs act a gatekeeper to broker access in real time between your enterprise users and cloud resources they use, wherever your users are located and regardless of the device they are using. Microsoft Defender for Cloud Apps natively integrates with Microsoft security capabilities, including Microsoft Defender XDR.
36+
Microsoft Defender for Cloud Apps is a cloud access security broker (CASB). CASBs act a gatekeeper to broker access in real time between your enterprise users and cloud resources they use, wherever your users are located and regardless of the device they're using. Microsoft Defender for Cloud Apps natively integrates with Microsoft security capabilities, including Microsoft Defender XDR.
3737

38-
Without Defender for Cloud Apps, cloud apps that are used by your organization are unmanaged and unprotected, as illustrated.
38+
Without Defender for Cloud Apps, your users access cloud apps directly without any management or security protection.
3939

40-
:::image type="content" source="./media/eval-defender-xdr/m365-defender-mcas-architecture-a.svg" alt-text="A diagram that shows the architecture for Microsoft Defender for Cloud Apps." lightbox="./media/eval-defender-xdr/m365-defender-mcas-architecture-a.svg":::
41-
42-
In the illustration:
43-
44-
- The use of cloud apps by an organization is unmonitored and unprotected.
45-
- This use falls outside the protections achieved within a managed organization.
40+
:::image type="content" source="./media/eval-defender-xdr/m365-defender-mcas-architecture-a.svg" alt-text="A diagram that shows your users sending cloud app traffic without any management or protection." lightbox="./media/eval-defender-xdr/m365-defender-mcas-architecture-a.svg":::
4641

4742
### Discovering cloud apps
4843

@@ -52,8 +47,8 @@ The first step to managing the use of cloud apps is to discover which cloud apps
5247

5348
In this illustration, there are two methods that can be used to monitor network traffic and discover cloud apps that are being used by your organization.
5449

55-
- A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
56-
- B. For coverage on all devices connected to a network, the Defender for Cloud Apps log collector is installed on firewalls and other proxies to collect data from endpoints. This data is sent to Defender for Cloud Apps for analysis.
50+
1. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively. Defender for Endpoint reports cloud apps and services being accessed from IT-managed Windows 10 and Windows 11 devices.
51+
2. For coverage on all devices connected to a network, the Defender for Cloud Apps log collector is installed on firewalls and other proxies to collect data from endpoints. This data is sent to Defender for Cloud Apps for analysis.
5752

5853
### Managing cloud apps
5954

@@ -76,25 +71,25 @@ In this illustration:
7671

7772
- Access to sanctioned cloud apps from users and devices in your organization is routed through Defender for Cloud Apps.
7873
- This proxy access allows session controls to be applied.
79-
- Cloud apps that you have not sanctioned or explicitly unsanctioned are not affected.
74+
- Cloud apps that you haven't sanctioned or explicitly unsanctioned aren't affected.
8075

8176
Session controls allow you to apply parameters to how cloud apps are used by your organization. For example, if your organization is using Salesforce, you can configure a session policy that allows only managed devices to access your organization's data at Salesforce. A simpler example could be configuring a policy to monitor traffic from unmanaged devices so you can analyze the risk of this traffic before applying stricter policies.
8277

8378
<a name='integrating-with-azure-ad-with-conditional-access-app-control'></a>
8479

8580
### Integrating with Microsoft Entra ID with Conditional Access App Control
8681

87-
You might already have SaaS apps added to your Microsoft Entra tenant to enforce multi-factor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra ID. All you have to do is configure a policy in Microsoft Entra ID to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
82+
You might already have SaaS apps added to your Microsoft Entra tenant to enforce multifactor authentication and other conditional access policies. Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra ID. All you have to do is configure a policy in Microsoft Entra ID to use Conditional Access App Control in Defender for Cloud Apps. This routes network traffic for these managed SaaS apps through Defender for Cloud Apps as a proxy, which allows Defender for Cloud Apps to monitor this traffic and to apply session controls.
8883

8984
:::image type="content" source="./media/eval-defender-xdr/m365-defender-mcas-architecture-e.svg" alt-text="A diagram that shows the architecture for the Microsoft Defender for Cloud Apps with SaaS apps." lightbox="./media/eval-defender-xdr/m365-defender-mcas-architecture-e.svg":::
9085

9186
In this illustration:
9287

93-
- SaaS apps are integrated with the Microsoft Entra tenant. This integration allows Microsoft Entra ID to enforce conditional access policies, including multi-factor authentication.
88+
- SaaS apps are integrated with the Microsoft Entra tenant. This integration allows Microsoft Entra ID to enforce conditional access policies, including multifactor authentication.
9489
- A policy is added to Microsoft Entra ID to direct traffic for SaaS apps to Defender for Cloud Apps. The policy specifies which SaaS apps to apply this policy to. Therefore, after Microsoft Entra ID enforces any conditional access policies that apply to these SaaS apps, Microsoft Entra ID then directs (proxies) the session traffic through Defender for Cloud Apps.
9590
- Defender for Cloud Apps monitors this traffic and applies any session control policies that have been configured by administrators.
9691

97-
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that have not been added to Microsoft Entra ID. You can take advantage of Conditional Access App Control by adding these cloud apps to your Microsoft Entra tenant and the scope of your conditional access rules.
92+
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps that haven't been added to Microsoft Entra ID. You can take advantage of Conditional Access App Control by adding these cloud apps to your Microsoft Entra tenant and the scope of your conditional access rules.
9893

9994
### Protecting your organization from hackers
10095

@@ -104,7 +99,7 @@ It's worth repeating this illustration from the overview to this Microsoft Defen
10499

105100
:::image type="content" source="./media/eval-defender-xdr/m365-defender-eval-threat-chain.svg" alt-text="A diagram that shows how Microsoft Defender XDR stops a threat chain." lightbox="./media/eval-defender-xdr/m365-defender-eval-threat-chain.svg":::
106101

107-
Focusing on the right side of this illustration, Microsoft Defender for Cloud Apps notices anomalous behavior like impossible-travel, credential access, and unusual download, file share, or mail forwarding activity and reports these behaviors to the security team. Therefore, Defender for Cloud Apps helps prevent lateral movement by hackers and exfiltration of sensitive data. Microsoft 356 Defender for Cloud correlates the signals from all the components to provide the full attack story.
102+
Microsoft Defender for Cloud Apps notices anomalous behavior like impossible-travel, credential access, and unusual download, file share, or mail forwarding activity and reports these behaviors to the security team. Defender for Cloud Apps helps prevent lateral movement by hackers and exfiltration of sensitive data. Microsoft 356 Defender for Cloud correlates the signals from all the components to provide the full attack story.
108103

109104
## Understand key concepts
110105

@@ -133,7 +128,7 @@ These options are included in [Step 2. Enable the evaluation environment](eval-d
133128

134129
### Applying Microsoft Entra Conditional Access policies to cloud apps
135130

136-
Conditional Access App Control (the ability to apply Conditional Access policies to cloud apps) requires integration with Microsoft Entra ID. This integration isn't a requirement for getting started with Defender for Cloud Apps. It is a step we encourage you to try out during the pilot phase—[Step 3. Pilot Microsoft Defender for Cloud Apps](eval-defender-mcas-pilot.md).
131+
Conditional Access App Control (the ability to apply Conditional Access policies to cloud apps) requires integration with Microsoft Entra ID. This integration isn't a requirement for getting started with Defender for Cloud Apps. It's a step we encourage you to try out during the pilot phase—[Step 3. Pilot Microsoft Defender for Cloud Apps](eval-defender-mcas-pilot.md).
137132

138133
## SIEM integration
139134

@@ -146,9 +141,10 @@ Additionally, Microsoft Sentinel includes a Microsoft Defender for Cloud Apps co
146141

147142
### Next steps
148143

149-
Step 2 of 3: [Enable the evaluation environment for Microsoft Defender for Cloud Apps](eval-defender-mcas-enable-eval.md)
144+
Step 2 of 3: [Enable the evaluation environment for Microsoft Defender for Cloud Apps](eval-defender-mcas-enable-eval.md).
145+
146+
Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md).
150147

151-
Return to the overview for [Evaluate Microsoft Defender for Cloud Apps](eval-defender-mcas-overview.md)
148+
Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md).
152149

153-
Return to the overview for [Evaluate and pilot Microsoft Defender XDR](eval-overview.md)
154150
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)