First published on CloudBlogs on Aug 01, 2017
Visibility is the first step to protection: if you cannot see it, you cannot prevent it. Cloud App Security Shadow IT discovery capabilities help you to gain deeper visibility into your cloud environment by discovering more than 15K cloud apps used by your employees in your organization. We’re excited to show you two key enhancements to the discovery experience.

Cloud App Catalog Customization

While our research team constantly gathers data to provide the best risk assessment and detailed information for each cloud app, we also know that there are specific considerations to each organization and a need to customize the data for some apps. With our recent release, we now provide you capabilities to customize discovered app with:

Custom app labels: You can now add custom app labels, which can be used as filters. You can investigate a custom watch list, identify which apps are being used by a specific business unit (“IT Apps”), or get a list of apps in the “awaiting approval” phase.

Custom notes: As you review and assess the different apps that were discovered across your organization, you can now add notes to each app. You can use these custom nodes for your insights and your assessment you would like to share with your teams.

Custom risk score: You can now also override an app’s default risk assessment score. For example, if the risk assessment score of an app is 8 and it is a sanctioned app in your organization, you can change the risk score to 10. You can also add notes explaining the change.

Figure 1 Custom app labels, risk score and notes

For more information about these new discovery capabilities and how to enable them, please visit our technical documentation page .

Deeper integration with Azure AD for improved visibility and management

Many of you have asked us to utilize Azure AD data to enhance your cloud discovery capabilities. We’re happy to let you know that this feature is now available; our service can now consolidate a user’s various identifiers into one, easy-to-manage entity. With this feature enabled, the username received in the discovery traffic logs will be matched and replaced by the Azure AD username, enabling several useful capabilities:
  • Investigate Shadow IT usage by Azure AD users
  • Correlate discovered cloud app use with API collected activities
  • Create custom reports based on Azure AD user groups (e.g. a Shadow IT report for a particular marketing department)

Figure 2 Creating a custom report based on AAD user group

We’d love to hear your feedback. If you have any suggestions, questions or comments, please leave it at the bottom of this blog or visit our Microsoft Cloud App Security Tech Community page .