Forum Widgets
Latest Discussions
MCAS Webinar Recordings
Below are the links to the recordings of the MCAS webinar sessions (registration here: https://aka.ms/MCASWebinar). The links are the same ones used to join the webinar, which is why we can post them before the webinars have taken place. NOTE: We are currently experiencing a problem with many of these recordings. The links that do not work have been temporarily removed until the problem is resolved. We are working to resolve the problem as quickly as we can. Thanks for your patience. If you were unable to join us live, but have questions about something covered in the webinar, you can ask them at https://aka.ms/MCASQandA, or, as always, feel free to make a post on this MCAS Tech Community group with your question. To ensure you hear about future MCAS webinars and other developments, make sure you've joined out community by going to https://aka.ms/SecurityCommunity. We hope you'll join us!9.3KViews15likes6CommentsCAS Playbook Now Available
We’re excited to release the CAS playbook: http://aka.ms/mcaspoc It will guide you through the process of setting up CAS, both in a proof of concept environment, and in production. It will help you configure it throughout your deployment, using simple step-by-step instructions. Enjoy!2.4KViews6likes1CommentMCAS Deployment Webinar Series
Want to learn how to deploy Microsoft Cloud App Security (MCAS)? Our webinar series will walk you through it: https://aka.ms/MCASWebinar The series will be hosted by our engineering team on Tuesdays (3:00 pm ET / 12:00 PM PT) and Thursdays (10:00 AM GMT) between March 12th and April 18th. The topics covered in this series are: 1) Use Microsoft Cloud App Security to protect your sensitive information anywhere in the cloud. 2) Leverage state of the art threat detection capabilities to quickly detect and remediate threats across your cloud apps. 3) Monitor and control user actions across your cloud apps in real-time using Conditional Access App Control. 4) Discover the use of Shadow IT in your organization, evaluate the risks and start managing them. 5) Stay protected across all your apps, by connecting 3rd party applications. 6) Simplify your SecOps' life by automating security workflows with Cloud App Security and Microsoft Flow. We hope you'll join us!1.8KViews4likes2CommentsRSS for Release Notes
Would it be possible to update the What's New content on docs.microsoft.com with an RSS feed, as the Intune team have recently added? This would be really helpful. https://docs.microsoft.com/en-us/intune/whats-newTristan WatkinsFeb 07, 2019Brass Contributor1.7KViews4likes0CommentsLet's automate! Check out our latest blog post on the new integration of MCAS and MS Flow
MCAS now integrates with MS Flow to provide centralized alert automation and orchestration of custom workflows for 1st party and more than 100 3rd party connectors! Read the full blog post for use cases and all the details!1.9KViews4likes0CommentsWeb content filtering in Defender not working outside of Edge
Trying to evaluate Cloud App and blocking Access to Email & Personal Storage While the likes of mail.yahoo and gmail is being blocked within Edge I'm able to bypass it with Chrome. I've Network Protection set to Enable (block Mode) within Intune. Am I missing some step that Chrome / Firefox needs ?Daithi2115Mar 20, 2024Copper Contributor2.1KViews3likes4CommentsCAS vs O365 ASM
What is the relationship between CAS and O365 Advanced Security Management? If we add O365 to CAS, do we still use O365 ASM?SolvedDean_GrossJan 17, 2017Silver Contributor10KViews3likes6CommentsMCAS Webinar Q&A
Many people have registered for our webinar (https://aka.ms/MCASWebinar). We're thrilled to see such interest, but it also means we'll likely get a large volume of questions on the call, and it may not be possible to respond to every one in real time. We will do our best to get your question answered directly on the call, and we'll have several dedicated team members just to respond to the questions; however, I wanted to provide an additional mechanism for any questions we're unable to get to. This post will be used for any questions that didn't get addressed on the call. We'll be reviewing the transcript of questions after the call and we'll post answers here. This may take a day or two, so please check back soon. If you were unable to attend the call, note that you can find the recordings here: https://aka.ms/MCASRecordings. Feel free to reply to this post with any questions you have.6.6KViews3likes31CommentsMCAS [Activity Policy] Log on from an outdated browser - current Teams client triggers alert
TLDR: Microsoft Teams client triggers 'Log on from an outdated browser' alert policy After enabling the MCAS - Activity Policy - 'Log on from an outdated browser' our current up-to-date desktop Teams client triggers the alert. I spent quite some time with the user discussing their configuration and thankfully a colleague correlated the 'Sign-in Logs' from the AAD blade and we could see the below 'User Agent's from the same workstation: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Teams/1.4.00.22472 Chrome/85.0.4183.121 Electron/10.4.3 Safari/537.36 Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36 The latest production release of Teams is 'Teams/1.4.00.22472' and it is evidently running Chrome/85.0.4183.121 (Chromium) in the back end which is flagged in the 'User agent tags' of the alert as 'Outdated browser'. The default template should exempt this use case. Knowing the above I've attempted to add an additional filter 'User Agent String' and 'does not contain' 'Teams' - this has no affect on the results leaving me with the suspicion that the full user agent string as above is not passed through. If this is the case then why is it an available filter? It would be great to see this addressed or advice on what I've missed to get this working. ThanksUCDWraithSep 08, 2021Copper Contributor4.8KViews3likes2CommentsAllow only Outlook desktop app to exchange online
Hi all, We our looking for ways to get more control for accessing Exchange online from a BYOD device. No user can connect from Windows and MacOS with any type of client. Is it possible with MCAS to block all other mail desktop clients and only allow Outlook desktop? Can this be done with MCAS? or do I need another Microsoft 365 solution? Thanks for the help and information kind regard's FinnFinn_HollesundMay 07, 2021Copper Contributor3.1KViews3likes1Comment
Resources
Tags
- Cloud App Security524 Topics
- Cloud Discovery107 Topics
- Data Protection66 Topics
- App Connectors55 Topics
- threat protection53 Topics
- azure active directory12 Topics
- microsoft defender for cloud apps12 Topics
- cloud security10 Topics
- mcas9 Topics
- azure8 Topics