Defender for Cloud Apps - Lock Down Your Cloud Apps & Protect Data

Jonathan Edwards
30 Aug 202420:49

Summary

TLDRIn this video, Jonath Edwards, known as the '365 Guy,' discusses Microsoft Defender for Cloud Apps, a tool that helps businesses monitor and block certain cloud applications. He explains how it integrates with Microsoft 365, detailing features like Cloud App Discovery, which uncovers cloud apps in use, and the ability to sanction or block apps for security purposes. Edwards also highlights licensing options and the added benefits of security monitoring and automated responses to potential threats, providing a comprehensive guide on using this tool to safeguard business data.

Takeaways

  • 🛡️ Microsoft Defender for Cloud Apps helps businesses block and manage cloud applications they don't want employees using.
  • 💼 It's part of the Microsoft Defender for Business suite and can also monitor apps for security issues and automate responses.
  • 💸 The full version of Defender for Cloud Apps requires a Microsoft 365 E5 license, which costs about £50.30 per user per month, but there are alternatives like the Enterprise Mobility and Security E5 license.
  • 🔍 One key feature, Cloud App Discovery, identifies all cloud applications being used in a business, even if the owner is unaware.
  • 📈 The full version offers continuous, automated reports by integrating with Microsoft Defender for Endpoint, whereas the business premium version only provides point-in-time reports.
  • 📊 The Cloud App Catalog evaluates over 30,000 cloud applications, scoring them based on 90 different factors like security and compliance.
  • ✅ Businesses can sanction, unsanction, or monitor applications. Monitored apps will trigger a warning, but employees can still use them if necessary.
  • 🚫 Unsanctioned apps will be blocked completely from usage within the organization using Microsoft Defender for Endpoint.
  • 🔔 Defender for Cloud Apps includes security monitoring and can detect suspicious activities like account compromises or data sharing with personal emails, sending alerts to IT and taking immediate action.
  • 📜 Policies can be customized to fit business needs, such as blocking suspicious forwarding or restricting data shared with personal email addresses.

Q & A

  • What is the main topic of the video?

    -The video focuses on Microsoft Defender for Cloud Apps, a tool that helps businesses monitor and control the use of cloud applications, block unwanted apps, and enhance security.

  • What is Cloud App Discovery and what does it do?

    -Cloud App Discovery is a feature of Defender for Cloud Apps that identifies and monitors the cloud applications used in an organization. It helps business owners see which apps are being accessed and offers insights on their usage.

  • What are the two ways to use Cloud App Discovery?

    -The first method, available with Microsoft 365 Business Premium, involves uploading log files from local firewalls. The second, available with the full Defender for Cloud Apps, integrates directly with Microsoft Defender for Endpoint, providing continuous and automated reporting.

  • What licensing options are available to access the full version of Defender for Cloud Apps?

    -To access the full version, businesses need either the Microsoft 365 E5 license or the Enterprise Mobility and Security (EMS) E5 license. The E5 licenses provide more comprehensive features compared to the limited version in Microsoft 365 Business Premium.

  • How does the Cloud App Catalog help businesses manage cloud applications?

    -The Cloud App Catalog evaluates over 33,000 cloud apps based on 90 factors, allowing businesses to sanction, unsanction, or monitor applications based on their security and compliance features. This helps companies control app usage effectively.

  • What happens when an app is unsanctioned in Defender for Cloud Apps?

    -When an app is unsanctioned, users are blocked from accessing it. If the business uses Microsoft Defender for Endpoint, the system can automatically prevent access to unsanctioned apps across all connected devices.

  • Can users bypass a blocked application, and how does the system handle this?

    -Yes, if an app is set to 'monitored,' users can bypass the block for a certain period (e.g., 1 hour). However, for unsanctioned apps, the system fully blocks access without an option to bypass.

  • How does Defender for Cloud Apps enhance security by monitoring user behavior?

    -Defender for Cloud Apps can detect security risks, like suspicious user behavior (e.g., impossible travel or data sharing with personal email addresses), and automatically take action, such as suspending the user or sending alerts to IT.

  • What is the 'impossible travel' policy in Defender for Cloud Apps?

    -The 'impossible travel' policy detects when a user logs in from two geographically distant locations in a short time, which could indicate a security breach. The system can alert IT or suspend the user’s account if necessary.

  • Can Defender for Cloud Apps prevent data from being shared with personal email addresses?

    -Yes, businesses can set policies that restrict or monitor data being shared with personal email addresses. For instance, a policy could automatically apply sensitivity labels to files, preventing external access to sensitive data.

Outlines

00:00

🔒 Introduction to Blocking Applications with Microsoft 365 Defender

The speaker introduces the topic of using Microsoft Defender for Cloud Apps within Microsoft 365 to block unwanted applications. They explain its significance and broader capabilities beyond just blocking apps, such as monitoring cloud apps and automating security responses. The speaker, Jonathan Edwards, also briefly mentions his background and the value this tool brings to business owners.

05:02

💡 Cloud App Discovery and Licensing for Microsoft Defender

The video moves on to describe the first feature of Defender for Cloud Apps, Cloud App Discovery, which helps businesses identify applications in use. Two methods are explained: using firewall logs (available with Business Premium) and integrating with Defender for Endpoint for continuous reports (requires E5). The speaker discusses licensing options, emphasizing the significant differences between Business Premium and the full version in Microsoft 365 E5.

10:03

📝 Continuous Monitoring with Microsoft Defender for Cloud Apps

The speaker demonstrates how the full version of Defender for Cloud Apps provides more features, such as continuous monitoring and a comprehensive dashboard. They walk through how Cloud Discovery shows apps, IP addresses, users, and devices. Additionally, the speaker explains how integrating with Defender for Endpoint streamlines cloud app monitoring across devices.

15:05

📊 Sanctioning, Unsanctioning, and Monitoring Cloud Apps

Microsoft's Cloud App Catalog, which assesses over 30,000 cloud apps based on security, compliance, and legal factors, is introduced. The speaker explains how businesses can sanction, unsanction, or monitor apps. They demonstrate by showing how to monitor Dropbox and block Box, emphasizing the flexibility of the platform in managing app access and educating users.

20:06

🚫 Blocking Unwanted Applications in Real Time

In this section, the speaker shows the practical application of blocking apps. They walk through a real-world example where a user tries to access Dropbox (monitored) and Box (blocked). They demonstrate how monitored apps allow a temporary bypass, while unsanctioned apps like Box remain inaccessible. The importance of setting user notifications and customized messages is also highlighted.

🛡️ Automated Security and User Activity Monitoring

This segment dives into the advanced security features of Defender for Cloud Apps, such as monitoring compromised accounts and preventing data sharing with personal email addresses. The speaker explains how policies like 'Impossible Travel' and email forwarding detection can help safeguard the organization, automatically notifying IT and taking governance actions, like suspending accounts.

🔍 Policy Management and Granular Controls

The speaker details how Defender for Cloud Apps includes pre-built and customizable policies that address various security needs, from suspicious forwarding to sharing with personal emails. They showcase how businesses can create granular policies, like applying sensitivity labels to data shared externally, to enforce security in real-time.

🔔 Conclusion: Defender for Cloud Apps as a Security Tool

In the conclusion, the speaker reinforces the value of Defender for Cloud Apps as an essential tool within Microsoft 365 for monitoring, managing, and securing cloud applications. They encourage viewers to explore its features for safeguarding their business data.

Mindmap

Keywords

💡Defender for Cloud Apps

Defender for Cloud Apps is a security tool that helps businesses monitor and control the cloud applications used within their organization. It can block unwanted applications, monitor security issues, and automate responses to potential threats. In the video, it's highlighted as the main topic, demonstrating how it helps businesses control cloud app usage and improve security.

💡Cloud App Discovery

Cloud App Discovery is a feature of Defender for Cloud Apps that helps identify all cloud applications being used within a company. It helps business owners understand the apps their employees are using, which may be unknown to them. This feature is essential for uncovering unauthorized or risky cloud app usage in the workplace, as illustrated in the script where businesses discover unexpected app usage like Dropbox.

💡Microsoft 365 E5 License

The Microsoft 365 E5 license provides access to the full version of Defender for Cloud Apps, offering advanced features like continuous monitoring through integration with Defender for Endpoint. In the video, the E5 license is described as expensive but necessary for unlocking the full suite of security features provided by Defender for Cloud Apps.

💡Business Premium

Business Premium is a Microsoft 365 subscription plan that includes a simplified version of Defender for Cloud Apps. It lacks some advanced features, such as continuous monitoring. The script highlights this limitation, explaining that companies using Business Premium can only upload log files manually, unlike the automated features available with the full E5 version.

💡Enterprise Mobility and Security E5

Enterprise Mobility and Security (EMS) E5 is an alternative to the Microsoft 365 E5 license, offering similar security features, including the full version of Defender for Cloud Apps. The video mentions this as a more affordable option for companies that want advanced cloud security tools but are using Microsoft 365 Business Premium.

💡Integration with Defender for Endpoint

Integration with Defender for Endpoint allows Defender for Cloud Apps to continuously monitor cloud applications by receiving data from endpoint devices. This integration is available in the full version of Defender for Cloud Apps and enhances its ability to generate automated reports and enforce security policies across devices, as discussed in the video.

💡Sanctioning and Unsanctioning Apps

Sanctioning and unsanctioning refer to approving or blocking cloud apps for use within a business. Sanctioned apps are approved, while unsanctioned apps are blocked. The video explains how businesses can control app usage by tagging apps as sanctioned, unsanctioned, or monitored. For example, Dropbox may be set to 'monitored,' while Box.com might be unsanctioned, preventing its use.

💡Cloud App Catalog

The Cloud App Catalog is a database of over 30,000 cloud applications that Microsoft has assessed based on security and compliance factors. Businesses can use this catalog to evaluate the safety of applications being used in their organization and make informed decisions about which apps to allow or block. The video illustrates how companies can drill into individual apps and review their security scores.

💡Impossible Travel Detection

Impossible Travel Detection is a security policy in Defender for Cloud Apps that identifies suspicious login activity, such as logging into Microsoft 365 from two geographically distant locations in a short time frame. This feature helps prevent unauthorized access to company accounts by automatically flagging or suspending accounts with unusual login behavior, as discussed in the video.

💡Data Shared with Personal Email Addresses

This is a security policy that helps businesses monitor and control data being shared from company platforms like OneDrive or SharePoint to personal email addresses. The video emphasizes this policy as a common concern for businesses wanting to prevent data leakage, explaining how it can automatically apply sensitivity labels or quarantine data to restrict access to external users.

Highlights

Introduction to Microsoft 365 Defender for Cloud Apps as a tool for blocking unwanted applications and more.

Defender for Cloud Apps is part of the Microsoft Defender for Business Suite, offering capabilities beyond just blocking applications.

Discussion on licensing: Full version of Defender for Cloud Apps is only available with Microsoft 365 E5 or Enterprise Mobility and Security E5.

Cloud App Discovery feature allows businesses to discover which cloud applications are being used within the organization.

Comparison of Cloud App Discovery using log files in Business Premium versus full Defender for Cloud Apps with continuous, automated reporting.

Cloud App Catalog assesses over 30,000 cloud applications, scoring them based on 90 different factors such as security, compliance, and risk.

Capability to sanction, unsanction, or monitor applications within the Cloud App Catalog, offering control over app usage in the business.

Integration with Microsoft Defender for Endpoint allows for advanced management and security features, including automated responses.

Demonstration of blocking and monitoring applications like Dropbox and Box using Defender for Cloud Apps.

Introduction to policy management in Defender for Cloud Apps, enabling the creation of custom policies for app usage and security.

Highlight of the 'Impossible Travel' policy, which detects suspicious logins from different locations within an unrealistic timeframe.

Explanation of alerting and governance actions within policy management, including suspending users and sending notifications.

Example of a custom policy for detecting and managing data shared with personal email addresses, applying sensitivity labels, and quarantining users.

Emphasis on the practical applications of Defender for Cloud Apps in protecting businesses from security breaches and unauthorized data sharing.

Final thoughts on the overall value of Defender for Cloud Apps as a comprehensive security tool within the Microsoft 365 ecosystem.

Transcripts

play00:00

is there a way that you can block

play00:01

certain applications that you don't want

play00:03

people to use well yes there is if

play00:06

you're using Microsoft 365 there's a

play00:08

product called Defender for cloud apps

play00:11

and it can do just that plus much more

play00:15

and that is the topic for today's video

play00:18

but before we start just a quick intro

play00:20

my name is jonath Edwards also known as

play00:23

the be 365 guy I help businesses all

play00:27

over the world with their Microsoft 365

play00:30

5 you can get more information at the

play00:32

bid 365 guy.com now I always have a

play00:36

really interesting conversation with

play00:38

business owners is there a way that we

play00:41

can know what cloud applications people

play00:44

are actually using inside of the

play00:46

business and more than that is there a

play00:48

way that we can block certain

play00:49

applications if we really don't want to

play00:52

use them well there is a product called

play00:54

Defender for cloud apps and it's part of

play00:57

the Microsoft Defender for business

play00:59

Suite and it can do just that but it can

play01:02

do even more than that it can also

play01:05

monitor your Cloud applications for

play01:08

security problems and it can automate

play01:11

responses it's a really great tool so

play01:15

that is what today's video is all about

play01:17

but before I start launching into the

play01:19

product demo I think it's best to talk

play01:22

about licensing how much does all this

play01:25

cost now if you're a regular Watcher of

play01:27

my channel you will know that that my

play01:30

favorite Microsoft 365 license is

play01:33

business premium now unfortunately with

play01:36

business premium you don't get the full

play01:39

version of Defender for cloud apps you

play01:41

get kind of a dumb down version and I'm

play01:44

going to show you in a minute the

play01:45

differences now if you want the full

play01:47

version of Defender for cloud apps

play01:49

you're going to have to buy Microsoft

play01:51

365 E5 which costs a whopping

play01:56

5030 per user per month now there's

play01:59

another way around it you can also buy

play02:02

Enterprise mobility and security E5

play02:05

which costs about £

play02:07

1390 per user per month so you could

play02:10

bolt that on to a Microsoft 365 business

play02:13

premium so you'd have business premium1

play02:15

1810 and then £ 1390 for the Enterprise

play02:19

mobility and security still expensive

play02:22

but that will give you the full Defender

play02:24

for cloud App Suite now enough of my

play02:28

talking about licensing let's start

play02:30

talking about the product so the first

play02:32

feature of Defender for cloud apps that

play02:34

I want to talk about is something called

play02:37

Cloud app Discovery now what is this

play02:40

well it's very Nifty as the name implies

play02:44

what Cloud app Discovery does is

play02:46

discover the cloud apps in your business

play02:50

now I know what you're thinking you're

play02:52

sat there thinking I know what

play02:54

applications people are using in my

play02:56

business I bet you don't now when I

play02:59

initially roll this out for customers

play03:01

most of the time they're always pretty

play03:03

shocked who's using Dropbox what's this

play03:06

application here I didn't know about

play03:08

that now by using Cloud app Discovery

play03:11

you can change all of that now there are

play03:13

two ways that you can use Cloud app

play03:16

Discovery the first way and this is the

play03:19

only way that works with business

play03:21

premium is to upload your log files from

play03:24

your local firewall yes and no I don't

play03:28

like it either and the second way which

play03:30

you need full Defender for cloud apps

play03:32

for is that you integrate it with

play03:34

Microsoft Defender for endpoint so once

play03:37

all your devices are an InTune and using

play03:39

Defender for endpoint it integrates

play03:42

really nicely with Defender for cloud

play03:44

apps this means you can get continuous

play03:48

automated reports now what we'll do now

play03:51

is jump over to that PC and I'll show

play03:53

you both ways okay so this tency is one

play03:56

that has Microsoft 365 business premium

play04:00

as the base license I'm in the admin

play04:03

Center I'm logged in as a global admin

play04:05

if I go down to admin centers and

play04:07

security and down the left hand side if

play04:10

I scroll down you can see that I've got

play04:12

Cloud apps here so this is where the

play04:14

defender for cloud apps lives now I've

play04:17

just got these options with the business

play04:18

premium and you'll see in a minute how

play04:20

that differs from the full Defender for

play04:23

cloud apps license but if I click on

play04:26

cloud Discovery this is all the option I

play04:28

have with my business business premium

play04:30

so what I can do here is I can create a

play04:32

new report which I'll show you now I'll

play04:35

click on there I'll click on next I'll

play04:37

give the report a name and then I've got

play04:40

to select a source so whatever firewall

play04:42

whatever security appliance that I'm

play04:44

using I've got to basically upload the

play04:46

log files whether it's a barracuda a

play04:48

Cisco they've got watch guard in here

play04:51

they've got a load of different options

play04:52

plus if you scroll down to the bottom

play04:54

you can choose other or generic and then

play04:57

I can click on next and what will happen

play04:59

at the end is I will get a report like

play05:01

this and it'll show me all the apps that

play05:04

has been discovered via the appliance

play05:07

now a lot of our customers don't really

play05:09

use appliances like this and this report

play05:12

is just a point of time it's a point in

play05:14

time as to when you upload the log files

play05:16

it's not any continuous reporting going

play05:18

on but as I said a lot of our customers

play05:21

they don't have those kind of appliances

play05:23

anymore they are remote workers they

play05:25

don't have an office so this in a

play05:28

nutshell is pretty useless to them so

play05:31

what does it look like when we've got

play05:33

the full version of Defender for cloud

play05:35

apps well let me hop over to a tenant

play05:38

now and I'll show

play05:39

you okay this is a tency which has the

play05:43

Microsoft 365 E5 license I'm in the

play05:46

security portal again and you can see

play05:48

under Cloud apps we've got a lot more

play05:51

options now if I click into Cloud

play05:53

Discovery what I get here is a nice

play05:56

dashboard and at the top you can see

play05:58

that this has been in integrated with

play06:00

Defender for endpoint so I've got 61

play06:03

apps that have been identified 107 IP

play06:06

addresses 56 users 57 devices we can

play06:10

scroll down here and we can see all the

play06:13

apps that Defender for cloud apps has

play06:15

discovered we can click into any of

play06:17

these things so I can drill down into

play06:19

discovered apps and it gives me a list

play06:21

of all the discovered apps so you can

play06:24

see already we get a lot more options

play06:27

with the full version of Defender for

play06:29

cloud apps now in a moment we're going

play06:31

to talk more about all these options

play06:33

here cuz we've got quite a lot going on

play06:35

we've got loads of different options but

play06:37

before I do that I mentioned earlier

play06:39

that Defender for cloud apps has been

play06:42

integrated with Defender for endpoint so

play06:44

what we've done and what we recommend is

play06:46

that all your devices are in in tune and

play06:49

they're all running Defender for

play06:51

endpoint once that's in place there's a

play06:53

few things you need to do so if I scroll

play06:55

down to here go into settings firstly go

play06:58

into end points here Advanced

play07:01

features and if we scroll down we need

play07:04

to make sure that custom Network

play07:06

indicators is switched on we also need

play07:08

to make sure that Microsoft Defender for

play07:10

cloud apps is switched on and it just

play07:13

point out here that we need an E5

play07:14

license or an Enterprise mobility and

play07:17

security once we're happy with that go

play07:19

back to settings go to Cloud apps and

play07:23

you'll see if we scroll down here you

play07:25

will see we've got a Defender for

play07:27

endpoint option here and we're we're

play07:29

going to talk more about these options

play07:31

later in the video now the next feature

play07:33

that I want to talk about is the Cloud

play07:35

app catalog now Micosoft have done a

play07:38

pretty good job here they've assessed

play07:41

over

play07:42

30,000 different Cloud applications and

play07:46

they've scored these Cloud applications

play07:48

based on 90 different factors so what

play07:51

you can do with the Cloud app catalog is

play07:53

you can do one of three things you can

play07:56

sanction an application for use in your

play07:59

business this means the application will

play08:02

be allowed or you can

play08:10

unsanctioned or there's a bit of a

play08:12

middle ground you can set an application

play08:15

to be monitored so you'll monitor that

play08:17

application and people might get a

play08:19

warning before they use it I think it's

play08:22

time to take a look at the Cloud app

play08:25

catalog okay so I'm just in my test

play08:27

tency that we use for a of these videos

play08:30

if I just head over now to the Cloud app

play08:33

catalog you can see this is what it's

play08:35

like as I mentioned earlier we've got

play08:37

over

play08:38

33,000 applications that Microsoft have

play08:41

assessed now a lot of these you can see

play08:43

the RIS score here it's green and they

play08:46

score 10 out of 10 lot of these are

play08:48

obviously Microsoft applications but

play08:51

what I can do I can drill into these and

play08:53

it tells you why they've scored it 10

play08:55

out of 10 so we're talking about the

play08:57

general settings the headquarters of the

play08:59

company we're looking at security

play09:01

whether they allow multiactor

play09:03

authentication admin audit trials lots

play09:06

of different things here and also

play09:09

compliance so which accreditations and

play09:11

Microsoft aligned to you can see they've

play09:13

got a lot of different things going on

play09:15

here and also some legal things as well

play09:17

gdpr data ownership so Microsoft have

play09:20

scored themselves 10 out of 10 which is

play09:23

pretty good now you can see here again

play09:25

we've got lots of different categories

play09:27

as well so if I go on to he maybe you

play09:30

can see I'm going to have lots of

play09:31

different

play09:32

applications and a lot of these of

play09:34

course aren't Microsoft ones if I do the

play09:37

risk score the other way around so I I

play09:39

start with the the ones that I've scored

play09:40

a low risk score you can see Microsoft

play09:43

have found lots of different ones let's

play09:44

look at this one here and you can see

play09:47

that this company I don't know who it is

play09:49

but they don't score too highly on the

play09:51

Microsoft score so for example if you

play09:54

found that this application was being

play09:57

used in your business via

play09:59

Discovery you could come in here you

play10:01

could have a look at it and then you

play10:03

could make a decision about it so what

play10:05

decision could you make about it well

play10:08

this is where we use these options here

play10:10

so we can click on here and we can

play10:12

sanction this app that means that this

play10:14

app is allowed to be us in our business

play10:17

the opposite of that is obviously

play10:19

unsanctioned so if we

play10:21

unsanctioned and we can't use it in the

play10:23

business and then we've got another

play10:25

option here where we can monitor this

play10:27

application so when we we monitor an

play10:29

application it can be used in the

play10:32

business but what we can do is we can

play10:34

educate users on that application so how

play10:37

does this all work in the real world

play10:39

well let's have a look let's go back to

play10:41

the cloud Discovery application here

play10:43

we'll go to the discovered apps now

play10:46

Microsoft have discovered that we are

play10:48

using Dropbox I'm not too happy about

play10:51

this but people might need to use it so

play10:54

what I've done you can see here this is

play10:56

been monitored so I went into here and

play10:59

are selected monitored okay what I can

play11:02

also do is I can sanction these

play11:05

applications because I'm happy with

play11:06

these happy with all these happy with

play11:09

that happy with Cloud flare I'm happy

play11:12

with all these so that just those catch

play11:14

up Dropbox is set to monitored now one

play11:18

app that I don't want to be use in the

play11:20

business it's not been picked up on

play11:22

discovered apps yet but I've heard

play11:24

really bad things about box okay now I'm

play11:27

just making this up I'm sure box are a

play11:29

very nice company but if I search in

play11:31

here and look for box you can see boxes

play11:34

here now it guesss 10 out of 10 I don't

play11:36

want people in my business using it so

play11:38

what I'm going to do here I'm going to

play11:39

tag this as unsanctioned and it's just

play11:42

going to be heads up here that apps with

play11:44

an unsanctioned tagged will be blocked

play11:46

by Microsoft Defender for endpoint I can

play11:49

click on

play11:50

save you can do all kind of things with

play11:52

this so you can block certain groups and

play11:54

things like that now the final thing I'm

play11:57

going to do is I'm going to go to

play11:59

settings here I'm going to go to Cloud

play12:02

apps I'm going to go down to Defender

play12:05

for

play12:06

endpoint and I would take this I've

play12:09

already ticked it but you can see here

play12:11

enforce app access enabling this will

play12:14

block access to apps that marked as

play12:17

unsanctioned and it will deliver the

play12:19

warning message on access and allow

play12:22

bypass to apps marked as monitored now

play12:26

I've got some more settings here look

play12:27

user notification

play12:30

so I can direct people to a different

play12:32

URL so I can say look we're blocking

play12:34

Dropbox and I can direct them to a URL

play12:37

with information as to why we're

play12:39

blocking Dropbox and there's also a URL

play12:41

for Block Taps as well so war war apps

play12:44

and block Taps so how does this look in

play12:47

the real world well let's hop over to my

play12:50

Fred Finance virtual Windows 11 PC and

play12:53

see what

play12:54

happens okay I'm on a virtual PC this is

play12:57

a Windows 11 comp computer used by our

play13:00

fictitious character Fred Finance so

play13:04

Fred started work today and what he's

play13:05

going to do he going to go log into

play13:07

Dropbox because he wants to do some work

play13:10

now as you can see he's now got this

play13:12

message this website is blocked by your

play13:14

organization you can see it says up here

play13:16

block content contact your administrator

play13:19

for more information but Fred's also got

play13:22

an option here to click on allow now if

play13:25

he clicks on allow what will happen is

play13:28

it will allow him to go to Dropbox it'll

play13:31

still say block content up there but

play13:34

it's allowed him to bypass it so how

play13:37

does that bypass work well if I just

play13:39

minimize this virtual machine go back to

play13:41

here the bypass duration is set to 1

play13:44

hour so after that if Fred goes back to

play13:46

Dropbox he'll get that message again and

play13:49

he'll have to bypass it again so we're

play13:51

just warning people we're not

play13:53

disallowing them from using it so Fred's

play13:56

finished with Dropbox he comes out of

play13:58

there but then remembers is got some

play14:00

data in box.com and if you remember we

play14:03

didn't like box.com did we so we banned

play14:05

it so going on to box it just says this

play14:09

website's been blocked but the

play14:11

difference is Fred can't bypass this so

play14:14

box.com is in an unsanctioned

play14:16

application and unfortunately Fred just

play14:19

cannot access it so hopefully you can

play14:22

already see that Defender for cloud apps

play14:24

could be a really valuable tool for your

play14:27

business but there's more to this

play14:29

platform than just sanctioning

play14:31

applications there's the security

play14:34

monitoring which I find incredibly

play14:36

useful now imagine this scenario you've

play14:39

got a busy chief executive and she's

play14:41

working really hard but at Microsoft 365

play14:45

account gets compromised by a hacker in

play14:48

a different country imagine now if

play14:52

Defender for cloud apps could

play14:54

automatically spot this and it could

play14:56

disable the chief Executives account

play14:59

before the hacker does any real damage

play15:02

but Defender for cloud apps goes further

play15:05

it also sends an email to the IT team so

play15:08

they know about it straight away we can

play15:11

do that with Defender for cloud apps or

play15:14

let's imagine a different scenario

play15:16

you've got a disgruntled employee who

play15:19

starts sharing company data with their

play15:21

personal email address Defender for

play15:24

cloud apps could immediately notify

play15:26

their line manager Plus it could make

play15:29

sure that the data that they're sharing

play15:31

with their personal email address wasn't

play15:33

accessible outside the office you can do

play15:37

all that with policies in Defender for

play15:39

cloud apps let's take a off so we're

play15:41

back in at Cloud Discovery at the bottom

play15:44

of cloud apps here you can see there's a

play15:46

policies section so if I click on policy

play15:49

management now you can see these are all

play15:52

the policies there's 28 of them that

play15:54

Microsoft have baked into their solution

play15:57

so at the moment I'm selecting all es

play15:59

but I can minimize it by these

play16:01

categories if I want if I just scroll

play16:04

down you can see there's some really

play16:05

interesting ones here firstly let's have

play16:08

a look at impossible travel so what I

play16:10

can do then I can go into here and I can

play16:13

edit the policy and editing the policy

play16:15

it'll just give me some more information

play16:17

about it so you can see this is a

play16:19

built-in detection policy and it gives

play16:22

you a description so this profile I'll

play16:25

tell you what impossible trouble is

play16:26

basically if I log into my Microsoft 365

play16:29

in London and then 10 minutes later I

play16:32

log into my Microsoft 365 in New York

play16:36

that is what is class as impossible

play16:38

travel I can't get from London to New

play16:40

York in 10 minutes so there might be an

play16:42

issue there might not be an issue I

play16:45

could be maybe logging into a VPN or

play16:47

something but there might be an issue

play16:49

and we can now set within Microsoft 365

play16:52

what we want to do with that issue so

play16:54

the first thing obviously is the scope

play16:56

do we want this policy to apply to all

play16:58

you users and groups or specific users

play17:01

and groups then we can go on to alerts

play17:03

so what do we want to do we can send an

play17:05

alert to an email so if you're an IT

play17:08

department you could send this to the IT

play17:10

department email so it can get picked up

play17:11

really quickly if you're an MSP maybe

play17:14

your services email again so someone can

play17:17

get hold of it and act on it also we can

play17:20

go further than that because we've got

play17:22

some governance actions if I click on

play17:24

the drop down here what we can do we can

play17:27

notify users so I can notify the end

play17:31

user that this has happened so if it's a

play17:33

busy executive we can send them an

play17:35

automatic email to say The Impossible

play17:37

travel is this you we can go further

play17:40

than that we can go and suspend the user

play17:43

in Azure ad so it can stop them from

play17:46

logging on if that's a busy executive

play17:49

they might get a little bit annoyed by

play17:50

that but it's an option plus what we can

play17:53

also do is confirm that the user has

play17:55

been compromised so in Azure active

play17:57

directory entry ID

play17:59

the users risk level will go to high so

play18:02

that could kick in some additional

play18:04

conditional access policies and then

play18:06

once I'm happy with all that I can

play18:08

simply just update it all I'll just come

play18:10

back out of that cuz I want to show you

play18:12

something else now we've got so many

play18:14

other policies that are baked into 365

play18:17

here Microsoft have also given these a

play18:19

severity so you might as well go and

play18:21

configure these look we've got

play18:22

suspicious inex forwarding that's what a

play18:25

lot of hackers do when they compromise

play18:27

an email account they'll set up forwards

play18:29

well wouldn't it be great if you could

play18:30

be alerted to that as an IT provider as

play18:33

it's happening you can then nip that in

play18:36

the bud you can also if we just go into

play18:38

that again the governance actions click

play18:40

on here we can do the same things we

play18:42

could suspend the account we could

play18:44

confirm the user has been compromised

play18:47

lots of great policies here but there's

play18:50

also more policy templates here so these

play18:53

are the ones baked into 365 these are

play18:55

the ones that you can create your own

play18:58

now there's lots of different ones here

play18:59

the one that I want to show you because

play19:01

a lot of our clients ask about this is

play19:04

data shared with personal email

play19:06

addresses I know a lot of business

play19:08

owners that this is a bit of a concern

play19:10

for so I could go into here I could

play19:12

create a policy based on that that's

play19:14

going to give it a a name we can change

play19:16

that if we want we can give it a

play19:18

severity and the category is sharing

play19:21

control now we can build filters in here

play19:24

so what we can do these are all kind of

play19:26

policy templates but we can get a blank

play19:29

policy and we can build filters so it's

play19:32

really granular but what this policy is

play19:36

saying this is a Microsoft suggested

play19:37

policy is anything personal email

play19:40

addresses so it's built all these in and

play19:42

what we're saying is if files are shared

play19:45

from one drive for business SharePoint

play19:47

online to personal email addresses we

play19:50

can do lots of different things so yes

play19:53

we can send an alert but we can also do

play19:55

things within Microsoft W drive for

play19:58

business and

play19:59

SharePoint we can notify specific users

play20:03

we can put the user into quarantine this

play20:05

one I like what we can do is apply a

play20:08

sensitivity label so what we could do is

play20:11

we could have a sensitivity label which

play20:13

means that data can't be as access by

play20:16

people outside the organization and we

play20:18

could apply that sensitivity label when

play20:21

someone tries to share some data to any

play20:25

of these domains so it would kick in

play20:27

that the person receiving that wouldn't

play20:29

be able to access that data so that is a

play20:32

really strong policy you can have so

play20:35

there's the policies built into Defender

play20:37

for cloud apps so there you have it

play20:38

Defender for cloud apps an incredibly

play20:41

useful security tool that you can get

play20:44

with Microsoft 365 I hope you enjoyed

play20:47

this video hope I'll see you again soon