Forum Discussion

PJR_CDF's avatar
PJR_CDF
Iron Contributor
Dec 17, 2019

MDATP Integration - Unsanctioned Apps - Allow for some users?

Hi,

 

I've reviewed the documentation @ https://docs.microsoft.com/en-us/cloud-app-security/governance-discovery in relation to blocking unsanctioned apps - specifically using MDATP on Win10 endpoints.

 

The documentation doesn't mention anything about governance when using MDATP - Is the functionality similar to the integration with Zscaler and iBoss, where once an app is tagged as unsanctioned it is blocked on the endpoint for all users?

 

Is there any way to provide greater granularity to the process - ie allow an app for some users and not for others or is it a binary choice for the entire organisation?

 

Thanks

Paul

25 Replies

  • PJR_CDF 

     

    You can find the needed info here: https://docs.microsoft.com/en-us/cloud-app-security/mde-integration

     

    Regarding the granular controls - this is not yet supported and is pending user granularity capabilities in MDE.

    We will expose parity with MDE indicators in MCAS by allowing scoping blocks based of device groups.

     

    Boris

    • CSPAdelaide's avatar
      CSPAdelaide
      Brass Contributor

      Thanks, Boris. This is great news as spent most of the afternoon in vein trying to find any granular controls for unsanctioned apps. Do you know specifically when this will be arriving. Is there a preview we can signup for?

  • Hi PJR_CDF KrisDeb Dean_Gross,

     

    The feature for blocking MCAS unsanctioned apps by leveraging MDATP is now in public preview and can be easily enabled in your tenants. In the following docs https://docs.microsoft.com/en-us/cloud-app-security/wdatp-integration, you'll find more details about it. Please contact me directly with any question you might have.

     

    Re scope of control, currently an app will be blocked globally, down the road we will be adding more granular controls, to create a more focused blocking policies.

     

    Thanks,

    Danny.

    • mandeepdhillon's avatar
      mandeepdhillon
      Copper Contributor

      Danny Kadyshevitch hi Danny, have there been any updates in regards to having this functionality in Microsoft Defender for Cloud Apps? Is it still planned or not a priority anymore? Has it already been out and I am unable to find it?

    • KrisDeb's avatar
      KrisDeb
      Iron Contributor
      I did the tests, it's working, wow, respect. Thank you.
      • Marc Rodieck's avatar
        Marc Rodieck
        Copper Contributor

        KrisDeb I was just curious how you were successful in getting it working with more granular control of the 'Unsanctioned App'? It would be nice to have a 'Exclude' from the Unsanctioned App so certain end users can still use the app. If not, what other ways is this possible?

    • Bill Brennan's avatar
      Bill Brennan
      Copper Contributor

      Danny Kadyshevitch,

      You said "down the road we will be adding more granular controls". Is there a public roadmap for this feature? I do not see anything in the Microsoft 365 Roadmap outside of the existing unsanctioned app filtering. Any information would be appreciated.

       

      Thanks,

      Bill

      • Danny Kadyshevitch's avatar
        Danny Kadyshevitch
        Former Employee

        Hi Bill Brennan,

         

        This feature is included in our Q1CY20 roadmap which was not yet published.

        I will be able to provide more details on timelines soon.

         

        Thanks,

        Danny.

  • Dean_Gross's avatar
    Dean_Gross
    Silver Contributor

    PJR_CDF when you create a Policy in MCAS, you can apply a Filter so that the scope of the policy is limited to a Group of users

    • Danny Kadyshevitch's avatar
      Danny Kadyshevitch
      Former Employee
      Please note that this is applicable only for app discovery alerts, and not for the controls provided by ATP, Danny.
    • PJR_CDF's avatar
      PJR_CDF
      Iron Contributor

      Thanks Dean_Gross 

       

      I can see how you can scope/filter some policy types to specific users and groups, but the exact scenario I am looking for as an example is, say I have a group of users I want to allow access to Jira for and block for all other users.

       

      If I tag Jira as an unsanctioned app in the Cloud app catalog, I assume this blocks it for all users.

       

      How can I create a policy to block for all users except a specific group?

       

      If I search the cloud app catalog for atlassian Jira and choose "create policy from search" to scope the policy to Jira specifically, the criteria you can choose from to build your filter within the policy doesn't include the ability to add user or group scoping filters as shown in the attached screen grab.

       

      I cant see that scoping sanctioned and unsanctioned apps per user/group is possible in this manner

       

      If I create an access control policy I can scope the policy to specific users but the apps I can choose from are only the apps I have onboarded to Azure AD, not the entire list of apps from the cloud app catalog.

       

      Thanks

       

      Paul

      • shoando's avatar
        shoando
        Brass Contributor

        PJR_CDF You can register the Indicator to allow the URL with a specific device group. 

  • KrisDeb's avatar
    KrisDeb
    Iron Contributor
    That's the reason I've put on hold Cloud App Security project because of no simple way to control the Cloud apps via ATP. All I can do is to "discover the Shadow IT" but I have almost no control over it. I don't use expensive firewalls, I'm cloud-only and so my customers. Yes, I know about Conditional Access and 3rd party integration but I couldn't find anything to simply click 3 dots and select "block" after I received the alert.

Resources