Home
%3CLINGO-SUB%20id%3D%22lingo-sub-877982%22%20slang%3D%22en-US%22%3EImprove%20your%20Cloud%20Security%20posture%20with%20Microsoft%20Secure%20Score%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-877982%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Secure%20Score%20provides%20you%20with%20an%20prioritized%20list%20of%20the%20key%20controls%20you%20can%20enable%20to%20improve%20the%20security%20posture%20for%20your%20environment.%20The%20recommendations%20and%20best%20practices%20it%20suggests%20includes%20those%20from%20across%20Microsoft%20365%20Security%20and%20Azure%20%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2Fmcas%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%3CSPAN%3E%20%26nbsp%3B%3C%2FSPAN%3Ewhich%20is%20a%20Cloud%20Access%20Security%20Broker%20(CASB)%2C%20a%20new%20generation%20of%20security%20solutions%2C%20that%20is%20essential%20to%20any%20modern%20security%20strategy.%20It%20provides%20rich%20visibility%2C%20control%20over%20data%20travel%2C%20and%20sophisticated%20analytics%20to%20identify%20and%20combat%20cyber%20threats%20across%20cloud%2C%20on-premises%20and%20custom%20apps.%3C%2FP%3E%0A%3CP%3ETo%20ensure%20that%20customers%20enable%20key%20use%20cases%20to%20detect%20cloud-native%20attacks%20and%20protect%20against%20risky%20apps%20in%20their%20environment%20with%20Microsoft%20Cloud%20App%20Security%2C%20we%20will%20explore%20the%20top%205%20most%20impactful%20Cloud%20App%20Security%20related%20Improvement%20Actions%20that%20Microsoft%20Secure%20Score%20has%20to%20offer.%20These%20will%20allow%20you%20to%20get%20the%20most%20out%20of%20your%20CASB%20investment%20and%20up-level%20the%20security%20for%20all%20your%20cloud%20apps%2C%20whether%20they%E2%80%99re%20Microsoft%20or%203%3CSUP%3Erd%3C%2FSUP%3E%20party%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1823038173%22%20id%3D%22toc-hId-1823038173%22%3EGet%20started%20with%20these%20top%205%20Improvement%20Actions%20for%20Microsoft%20Cloud%20App%20Security%3C%2FH2%3E%0A%3CP%3ETo%20maximize%20Microsoft%20Cloud%20App%20Security%E2%80%99s%20impact%20on%20your%20overall%20security%20posture%2C%20here%20are%20five%20of%20the%20top%20improvement%20actions%20you%20should%20start%20with%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EUse%20Cloud%20App%20Security%20to%20detect%20anomalous%20behavior%3C%2FLI%3E%0A%3CLI%3ECreate%20a%20custom%20activity%20policy%20to%20discover%20suspicious%20usage%20patterns%3C%2FLI%3E%0A%3CLI%3EDiscover%20Shadow%20IT%20and%20application%20usage%3C%2FLI%3E%0A%3CLI%3ESet%20automated%20notifications%20for%20new%20and%20trending%20cloud%20applications%20in%20your%20organization%3C%2FLI%3E%0A%3CLI%3EReview%20permissions%20%26amp%3B%20block%20risky%20OAuth%20applications%20connected%20to%20your%20environment%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--729118788%22%20id%3D%22toc-hId--729118788%22%3EUse%20Cloud%20App%20Security%20to%20detect%20anomalous%20behavior%3C%2FH2%3E%0A%3CP%3EDesigned%20with%20security%20professionals%20in%20mind%2C%20Microsoft%20Cloud%20App%20Security%20makes%20it%20easy%20to%20get%20started.%20It%E2%80%99s%20designed%20for%20a%20simple%20deployment%2C%20centralized%20management%2C%20and%20innovative%20automation%20capabilities.%20When%20you%20turn%20on%20the%20Cloud%20App%20Security%20console%20you%20can%20easily%20connect%20your%20apps%20and%20instantly%20leverage%20numerous%20built-in%20threat%20detection%20policies.%20They%20enable%20you%20detect%20insider%20threats%2C%20compromised%20accounts%20and%20brute%20force%20attempts.%20In%20addition%2C%20Microsoft%20Cloud%20App%20Security%20provides%20risk%20scores%20for%20all%20of%20the%20users%20in%20your%20organization%2C%20which%20enables%20the%20Security%20Operations%20team%20to%20prioritize%20their%20investigations.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F133693iF25D5239E1CC9717%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%221.png%22%20title%3D%221.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1013691547%22%20id%3D%22toc-hId-1013691547%22%3ECreate%20a%20custom%20activity%20policy%20to%20discover%20suspicious%20usage%20patterns%3C%2FH2%3E%0A%3CP%3EActivity%20policies%20enable%20you%20to%20monitor%20suspicious%20user%20activities%20and%20be%20alerted%20on%20policy%20violations%20such%20as%20downloading%20a%20large%20number%20of%20files%20in%20a%20short%20period%20of%20time%20or%20sharing%20sensitive%20files%20with%20external%20users.%20Microsoft%20Cloud%20App%20Security%20also%20allows%20you%20to%20take%20manual%20remediation%20actions%20or%20setup%20automatic%20remediation%20to%20lighten%20the%20workload%20on%20your%20SecOps%20team.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorclipboard_image_1%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F134459i4BC821E1CA998975%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22custom.png%22%20title%3D%22custom.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1538465414%22%20id%3D%22toc-hId--1538465414%22%3EDiscover%20Shadow%20IT%20and%20application%20usage%3C%2FH2%3E%0A%3CP%3EIn%20today%E2%80%99s%20modern%20enterprises%2C%20apps%20run%20the%20workplace.%20While%20we%20see%20an%20average%20of%20129%20IT-managed%20applications%2C%20our%20CASB%20discovery%20data%20shows%20that%20the%20total%20number%20of%20apps%20accessed%20by%20employees%20in%20large%20organizations%20exceeds%201%2C000.%20In%20Microsoft%20Cloud%20App%20Security%2C%20you%20have%20several%20options%20to%20activate%20the%20Discovery%20of%20Shadow%20IT%2C%20either%20by%20a%20single%20click%20enablement%20via%20Microsoft%20Defender%20Advanced%20Threat%20Protection%2C%20leveraging%20lots%20from%20your%20firewall%2C%20or%20using%20an%20existing%20Secure%20Web%20Gateway.%20Once%20discovered%2C%20Microsoft%20Cloud%20App%20Security%20assesses%20all%20apps%20against%20more%20than%2090%20risk%20and%20compliance%20factors%20and%20allows%20you%20to%20manage%20future%20access.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F133695i3537E04704541631%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%223.png%22%20title%3D%223.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorclipboard_image_2%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-204344921%22%20id%3D%22toc-hId-204344921%22%3ESet%20automated%20notifications%20for%20new%20and%20trending%20cloud%20applications%20in%20your%20organization%3C%2FH2%3E%0A%3CP%3EThe%20initial%20Discovery%20and%20assessment%20of%20the%20apps%20in%20your%20organization%20can%20be%20time%20consuming%20depending%20on%20how%20many%20apps%20are%20in%20use.%20To%20ensure%20you%20can%20stay%20on%20top%20of%20the%20Shadow%20IT%20in%20your%20organization%2C%20it%20is%20recommended%20to%20implement%20continuous%20monitoring.%20Microsoft%20Cloud%20App%20Security%20allows%20you%20to%20setup%20policies%20to%20be%20alerted%20when%20new%2C%20risky%20or%20high-volume%20apps%20are%20discovered%20in%20your%20environment%2C%20so%20you%20can%20immediately%20evaluate%20and%20manage%20them%20according%20to%20the%20requirements%20of%20your%20organization.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F133699iC77FC7AFCAB36958%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%224.png%22%20title%3D%224.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1947155256%22%20id%3D%22toc-hId-1947155256%22%3EReview%20permissions%20%26amp%3B%20block%20risky%20OAuth%20applications%20connected%20to%20your%20environment%3C%2FH2%3E%0A%3CP%3EOAuth%20is%20a%20web-based%20industry%20standard%20protocol%20that%20enables%20users%20to%20grant%20web%20apps%20access%20to%20their%20accounts%20and%20data%20without%20sharing%20their%20credentials.%20The%20use%20of%20OAuth%20in%20enterprises%20is%20increasing%20as%20a%20result%20of%20the%20continued%20adoption%20of%20cloud-based%20solutions.%20While%20extremely%20convenient%2C%20OAuth%20introduces%20a%20new%20threat%20vector%20to%20the%20security%20of%20organizations%20and%20enables%20potential%20back%20doors%20into%20corporate%20environments%20when%20malicious%20apps%20are%20authorized.%3C%2FP%3E%0A%3CP%3EMicrosoft%20Cloud%20App%20Security%20enables%20you%20to%20identify%20all%20OAUth%20apps%20that%20have%20been%20authorized%20against%20your%20corporate%20apps%20such%20as%20Office%20365%2C%20GSuite%20and%20Salesforce%2C%20evaluate%20their%20risk%20and%20ban%20them%20if%20necessary.%26nbsp%3BYou%20can%20find%20additional%20details%20in%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FEnterprise-Mobility-Security%2FManaging-risky-3rd-party-app-permissions-with-Microsoft-s-CASB%2Fba-p%2F276401%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ethis%20blog%20post.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F133698i01F25BD7FE876868%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%225.png%22%20title%3D%225.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorclipboard_image_4%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSTRONG%3EWrapping%20It%20Up%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESo%2C%20there%20you%20have%20it%20%E2%80%93%20a%20quick%20tour%20of%20the%20top%20Microsoft%20Secure%20Score%20related%20Improvement%20Actions%20for%20in%20Microsoft%20Cloud%20App%20Security.%20Start%20using%20Microsoft%20Cloud%20App%20Security%20today%20to%20get%20better%20visibility%20into%20your%20cloud%20environment%20and%20take%20control%20of%20all%20your%20cloud%20apps.%20More%20information%20on%20Microsoft%20Cloud%20App%20Security%20and%20Microsoft%20Secure%20Score%20can%20be%20found%20at%20Microsoft%20Docs%20(%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fgetting-started-with-cloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20and).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EMore%20info%20and%20feedback%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGet%20started%20using%20the%20technical%20documentation%20for%20%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2Fmcastech%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Fsecuritycompliance%2Fmicrosoft-secure-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Secure%20Score%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CUL%3E%0A%3CLI%3EHaven%E2%80%99t%20tried%20Microsoft%20Cloud%20App%20Security%20yet%3F%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmcastrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EStart%20a%20free%20trial%20today%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Cloud-App-Security%2Fbd-p%2FMicrosoftCloudAppSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EFor%20more%20resources%20and%20information%20on%20Microsoft%20Cloud%20App%20Security%20go%20to%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%2Fcloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-877982%22%20slang%3D%22en-US%22%3E%3CP%3EImprove%20your%20Cloud%20Security%20posture%20with%20Microsoft%20Secure%20Score%20and%20Microsoft's%20CASB%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-877982%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECASB%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecure%20Score%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Microsoft Secure Score provides you with an prioritized list of the key controls you can enable to improve the security posture for your environment. The recommendations and best practices it suggests includes those from across Microsoft 365 Security and Azure Microsoft Cloud App Security  which is a Cloud Access Security Broker (CASB), a new generation of security solutions, that is essential to any modern security strategy. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyber threats across cloud, on-premises and custom apps.

To ensure that customers enable key use cases to detect cloud-native attacks and protect against risky apps in their environment with Microsoft Cloud App Security, we will explore the top 5 most impactful Cloud App Security related Improvement Actions that Microsoft Secure Score has to offer. These will allow you to get the most out of your CASB investment and up-level the security for all your cloud apps, whether they’re Microsoft or 3rd party apps.

 

Get started with these top 5 Improvement Actions for Microsoft Cloud App Security

To maximize Microsoft Cloud App Security’s impact on your overall security posture, here are five of the top improvement actions you should start with:

  1. Use Cloud App Security to detect anomalous behavior
  2. Create a custom activity policy to discover suspicious usage patterns
  3. Discover Shadow IT and application usage
  4. Set automated notifications for new and trending cloud applications in your organization
  5. Review permissions & block risky OAuth applications connected to your environment

 

Use Cloud App Security to detect anomalous behavior

Designed with security professionals in mind, Microsoft Cloud App Security makes it easy to get started. It’s designed for a simple deployment, centralized management, and innovative automation capabilities. When you turn on the Cloud App Security console you can easily connect your apps and instantly leverage numerous built-in threat detection policies. They enable you detect insider threats, compromised accounts and brute force attempts. In addition, Microsoft Cloud App Security provides risk scores for all of the users in your organization, which enables the Security Operations team to prioritize their investigations.

 

1.png

 

Create a custom activity policy to discover suspicious usage patterns

Activity policies enable you to monitor suspicious user activities and be alerted on policy violations such as downloading a large number of files in a short period of time or sharing sensitive files with external users. Microsoft Cloud App Security also allows you to take manual remediation actions or setup automatic remediation to lighten the workload on your SecOps team.

 

custom.png

 

Discover Shadow IT and application usage

In today’s modern enterprises, apps run the workplace. While we see an average of 129 IT-managed applications, our CASB discovery data shows that the total number of apps accessed by employees in large organizations exceeds 1,000. In Microsoft Cloud App Security, you have several options to activate the Discovery of Shadow IT, either by a single click enablement via Microsoft Defender Advanced Threat Protection, leveraging lots from your firewall, or using an existing Secure Web Gateway. Once discovered, Microsoft Cloud App Security assesses all apps against more than 90 risk and compliance factors and allows you to manage future access.

 

3.png

 

 

 

Set automated notifications for new and trending cloud applications in your organization

The initial Discovery and assessment of the apps in your organization can be time consuming depending on how many apps are in use. To ensure you can stay on top of the Shadow IT in your organization, it is recommended to implement continuous monitoring. Microsoft Cloud App Security allows you to setup policies to be alerted when new, risky or high-volume apps are discovered in your environment, so you can immediately evaluate and manage them according to the requirements of your organization.

 

 4.png

 

Review permissions & block risky OAuth applications connected to your environment

OAuth is a web-based industry standard protocol that enables users to grant web apps access to their accounts and data without sharing their credentials. The use of OAuth in enterprises is increasing as a result of the continued adoption of cloud-based solutions. While extremely convenient, OAuth introduces a new threat vector to the security of organizations and enables potential back doors into corporate environments when malicious apps are authorized.

Microsoft Cloud App Security enables you to identify all OAUth apps that have been authorized against your corporate apps such as Office 365, GSuite and Salesforce, evaluate their risk and ban them if necessary. You can find additional details in this blog post.

 

5.png

 

 

Wrapping It Up

So, there you have it – a quick tour of the top Microsoft Secure Score related Improvement Actions for in Microsoft Cloud App Security. Start using Microsoft Cloud App Security today to get better visibility into your cloud environment and take control of all your cloud apps. More information on Microsoft Cloud App Security and Microsoft Secure Score can be found at Microsoft Docs (Microsoft Cloud App Security and).

 

More info and feedback

  • Haven’t tried Microsoft Cloud App Security yet? Start a free trial today.
  • As always, we want to hear from you! If you have any suggestions, questions, or comments, please visit us on our Tech Community page.
  • For more resources and information on Microsoft Cloud App Security go to our website.