Home
%3CLINGO-SUB%20id%3D%22lingo-sub-390473%22%20slang%3D%22en-US%22%3EStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20enviro%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390473%22%20slang%3D%22en-US%22%3E%3CP%3ECloud-based%20services%20have%20significantly%20increased%20productivity%20for%20today%E2%80%99s%20workforce%2C%20prompting%20users%20to%20adopt%20new%20cloud%20apps%20and%20services%20and%20making%20it%20a%20challenge%20for%20you%20to%20keep%20up.%20%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2Fmcas%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20(MCAS)%2C%20a%20cloud%20access%20security%20broker%20(CASB)%2C%20helps%20you%20gain%20control%20over%20shadow%20IT%20with%20tools%20that%20give%20you%20visibility%20into%20the%20cloud%20apps%20and%20services%20used%20in%20your%20organization%2C%20asses%20them%20for%20risk%2C%20and%20provide%20sophisticated%20analytics.%20You%20can%20then%20make%20an%20informed%20decision%20about%20whether%20you%20want%20to%20sanction%20the%20apps%20you%20discover%20or%20block%20them%20from%20being%20accessed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20781px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F100468i09C3E861E956673B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Step%207%20photo.JPG%22%20title%3D%22Step%207%20photo.JPG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3ERead%20the%20full%20blog%20%3C%2FSPAN%3E%3CA%20style%3D%22background-color%3A%20transparent%3B%20box-sizing%3A%20border-box%3B%20color%3A%20%23146cac%3B%20font-family%3A%20%26amp%3Bquot%3B%20segoeui%26amp%3Bquot%3B%2C%26amp%3Bquot%3Blato%26amp%3Bquot%3B%2C%26amp%3Bquot%3Bhelvetica%20neue%26amp%3Bquot%3B%2Chelvetica%2Carial%2Csans-serif%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20underline%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F03%2F26%2Fstep-7-discover-shadow-it-and-take-control-of-your-cloud-apps-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3CSPAN%20style%3D%22display%3A%20inline%20!important%3B%20float%3A%20none%3B%20background-color%3A%20%23ffffff%3B%20color%3A%20%23333333%3B%20cursor%3A%20text%3B%20font-family%3A%20inherit%3B%20font-size%3A%2016px%3B%20font-style%3A%20normal%3B%20font-variant%3A%20normal%3B%20font-weight%3A%20300%3B%20letter-spacing%3A%20normal%3B%20line-height%3A%201.7142%3B%20orphans%3A%202%3B%20text-align%3A%20left%3B%20text-decoration%3A%20none%3B%20text-indent%3A%200px%3B%20text-transform%3A%20none%3B%20-webkit-text-stroke-width%3A%200px%3B%20white-space%3A%20normal%3B%20word-spacing%3A%200px%3B%22%3E.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-390473%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20series%20outlines%20the%20most%20fundamental%20steps%20you%20can%20take%20with%20your%20investment%20in%20Microsoft%20365%20security%20solutions.%20In%20%E2%80%9CStep%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20cloud%20apps%2C%E2%80%9D%20you%E2%80%99ll%20learn%20how%20to%20set%20up%20Microsoft%20Cloud%20App%20Security%20(MCAS)%20to%20identify%2C%20access%2C%20and%20manage%20the%20cloud%20applications%20used%20by%20your%20organization.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-390473%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390954%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390954%22%20slang%3D%22en-US%22%3E%3CP%3EThanks.%20But%20i%20don't%20see%20first%205%20parts%20in%20this%20blog.%20So%20maybe%20instead%20of%20posting%206%20and%207%20you%20could%20do%20one%20post%20with%20links%20to%20all%20the%20parts.%20Because%20now%20all%20the%20sudden%20i%20see%20in%20this%20blog%20part%206%20and%207%20and%20thinking%20where%20the%20other%20parts%20went.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390948%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390948%22%20slang%3D%22en-US%22%3E%3CP%3EOleg%20-%20here%20are%20the%20links%20for%20the%20first%205%20blogs%20in%20this%20series%2C%20for%20your%20reference...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F05%2Fstep-1-identify-users-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2018%2F12%2F17%2Fstep-2-manage-authentication-and-safeguard-access-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F16%2Fstep-3-protect-your-identities-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F01%2F30%2Fstep-4-set-conditional-access-policies-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F02%2F14%2Fstep-5-set-up-mobile-device-management-top-10-actions-to-secure-your-environment%2F%3C%2FA%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390907%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390907%22%20slang%3D%22en-US%22%3E%3CP%3ESteps%201-5%20were%20already%20posted%20via%20the%20EMS%20Team%20account...%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESorry%20for%20any%20confusion.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-390606%22%20slang%3D%22en-US%22%3ERe%3A%20Step%207.%20Discover%20shadow%20IT%20and%20take%20control%20of%20your%20cloud%20apps%3A%20Top%2010%20actions%20to%20secure%20your%20en%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-390606%22%20slang%3D%22en-US%22%3E%3CP%3EWhy%20are%20you%20starting%20with%20steps%206%20and%207%3F%20Confusing.%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Cloud-based services have significantly increased productivity for today’s workforce, prompting users to adopt new cloud apps and services and making it a challenge for you to keep up. Microsoft Cloud App Security (MCAS), a cloud access security broker (CASB), helps you gain control over shadow IT with tools that give you visibility into the cloud apps and services used in your organization, asses them for risk, and provide sophisticated analytics. You can then make an informed decision about whether you want to sanction the apps you discover or block them from being accessed.

 

Step 7 photo.JPG

 

Read the full blog here.

4 Comments
Super Contributor

Why are you starting with steps 6 and 7? Confusing.

Microsoft

Steps 1-5 were already posted via the EMS Team account...

 

Sorry for any confusion.

Super Contributor

Thanks. But i don't see first 5 parts in this blog. So maybe instead of posting 6 and 7 you could do one post with links to all the parts. Because now all the sudden i see in this blog part 6 and 7 and thinking where the other parts went.