You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This integration covers the following Microsoft 365 products:
@@ -36,13 +39,37 @@ For the Microsoft 365 integration to function, Cloudflare CASB requires the foll
36
39
-`Files.Read.All`
37
40
-`AuditLog.Read.All`
38
41
39
-
These permissions follow the principle of least privilege to ensure that only the minimum required access is granted. To learn more about each permission, refer to the [Microsoft Graph permissions documentation](https://docs.microsoft.com/en-us/graph/permissions-reference).
42
+
These permissions follow the principle of least privilege to ensure that only the minimum required access is granted.
43
+
44
+
Additionally, to [remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings), CASB requires the following permissions:
45
+
46
+
-`Application.ReadWrite.All`
47
+
-`AuditLog.Read.All`
48
+
-`Calendars.ReadWrite`
49
+
-`Domain.ReadWrite.All`
50
+
-`Files.ReadWrite.All`
51
+
-`Group.ReadWrite.All`
52
+
-`InformationProtectionPolicy.Read.All`
53
+
-`MailboxSettings.ReadWrite`
54
+
-`IdentityRiskyUser.ReadWrite.All`
55
+
-`RoleManagement.ReadWrite.Directory`
56
+
-`User.ReadWrite.All`
57
+
-`UserAuthenticationMethod.ReadWrite.All`
58
+
-`Directory.ReadWrite.All`
59
+
-`GroupMember.ReadWrite.All`
60
+
-`Organization.ReadWrite.All`
61
+
-`Mail.ReadWrite`
62
+
63
+
To learn more about each permission, refer to the [Microsoft Graph permissions documentation](https://docs.microsoft.com/en-us/graph/permissions-reference).
Copy file name to clipboardExpand all lines: src/content/docs/cloudflare-one/applications/casb/manage-findings.mdx
+59-4Lines changed: 59 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ File findings for some integrations (such as [Microsoft 365](/cloudflare-one/app
93
93
94
94
After reviewing your findings, you may decide that certain posture findings are not applicable to your organization. Cloudflare CASB allows you to remove findings or individual instances of findings from your list of active issues. CASB will continue to scan for these issues, but any detections will appear in a separate tab.
95
95
96
-
### Hide a finding
96
+
### Ignore a finding
97
97
98
98
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **CASB** > **Posture**.
99
99
2. Locate the active finding you want to hide.
@@ -108,13 +108,68 @@ The finding's status will change from **Active** to **Ignored**. CASB will conti
108
108
3. In **Active**, find the instance you want to hide.
109
109
4. In the three-dot menu, select **Move to hidden**.
110
110
111
-
The instance will be moved from **Active** to **Hidden** within the finding. If the finding occurs again for the same user, CASB will report the new instance in the **Hidden** tab. You can move hidden instances back to the **Active** tab at any time.
111
+
The instance will be moved from **Active** to **Hidden** within the finding. If the finding occurs again for the same user, CASB will report the new instance quietly in the **Hidden** tab. You can move hidden instances back to the **Active** tab at any time.
112
+
113
+
## Remediate findings
114
+
115
+
In addition to detecting and surfacing misconfigurations or issues with SaaS and cloud applications, CASB can also remediate findings directly in applications.
116
+
117
+
CASB supports remediation for findings from the [Microsoft 365 integration](/cloudflare-one/applications/casb/casb-integrations/microsoft-365/):
118
+
119
+
<Detailsheader="Supported CASB findings for remediation">
120
+
121
+
- Microsoft: File publicly accessible with edit access
122
+
- Microsoft: File publicly accessible with view access
123
+
- Microsoft: File publicly accessible with edit access with DLP Profile match
124
+
- Microsoft: File publicly accessible with view access with DLP Profile match
125
+
126
+
</Details>
127
+
128
+
### Configure remediation permissions
129
+
130
+
Before you can remediate findings, [add a new integration](/cloudflare-one/applications/casb/#add-an-integration) and choose _Read-Write mode_ during setup. Alternatively, you can update an existing integration:
131
+
132
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Integrations**.
133
+
2. Choose your integration, then select **Configure**.
134
+
3. In **Integration permissions**, choose _Read-Write mode_.
135
+
4. Select **Update integration**. CASB will redirect you to your Microsoft 365 configuration.
136
+
5. Sign in to your organization, then select **Accept**.
137
+
138
+
CASB can now remediate supported findings directly.
139
+
140
+
### Remediate a finding
141
+
142
+
To remediate a supported finding:
143
+
144
+
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **CASB** > **Posture Findings**.
145
+
2. Choose a supported finding type, then select **Manage**.
146
+
3. In **Active Instances**, select an instance.
147
+
4. In **Remediation details**, choose a remediation action to take.
148
+
149
+
CASB will begin remediating the instance.
150
+
151
+
### Manage remediated findings
152
+
153
+
Remediated findings will appear in **CASB** > **Posture Findings** > **Remediated findings**. The status of the finding will change depending on what action CASB has taken:
| Pending | CASB has set the finding to be remediated. |
158
+
| Queued | CASB has queued the finding for remediation. |
159
+
| Processing | CASB is currently remediating the finding. |
160
+
| Completed | CASB successfully remediated the finding. |
161
+
| Failed | CASB unsuccessfully remediated the finding. |
162
+
| Rejected | CASB does not have the correct permissions to remediate the finding. |
163
+
164
+
If the status is **Completed**, remediation succeeded. If the status is **Failed** or **Rejected**, remediation failed, and you can select the finding to take action again.
165
+
166
+
CASB will log remediation actions in **Logs** > **Admin**. For more information, refer to [Zero Trust Logs](/cloudflare-one/insights/logs/).
112
167
113
168
## Resolve finding with a Gateway policy
114
169
115
-
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. This means going from viewing a CASB finding, like the use of an unapproved application, to preventing or controlling access in minutes.
170
+
Using the security findings from CASB allows for fine-grained Gateway policies which prevent future unwanted behavior while still allowing usage that aligns to your organization's security policy. You can view a CASB finding, like the use of an unapproved application, then immediately prevent or control access with Gateway.
116
171
117
-
CASB supports creating a Gateway policy with findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/):
172
+
CASB supports creating a Gateway policy for findings from the [Google Workspace integration](/cloudflare-one/applications/casb/casb-integrations/google-workspace/):
118
173
119
174
<Detailsheader="Supported CASB findings for Gateway policies">
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/casb/microsoft/file-sharing.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
{}
3
3
---
4
4
5
-
Get alerted when files in your Microsoft 365 account have their permissions changed to a less secure setting.
5
+
Get alerted when files in your Microsoft 365 account have their permissions changed to a less secure setting. Additionally, you can automatically remediate certain finding types directly from CASB. For more information, refer to [Remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings).
Copy file name to clipboardExpand all lines: src/content/partials/cloudflare-one/casb/microsoft/m365-dlp-findings.mdx
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
{}
3
3
---
4
4
5
+
Additionally, you can automatically remediate certain finding types directly from CASB. For more information, refer to [Remediate findings](/cloudflare-one/applications/casb/manage-findings/#remediate-findings).
0 commit comments