SOLVED

Questions on Controlling and monitoring Microsoft Teams workloads.

%3CLINGO-SUB%20id%3D%22lingo-sub-1327812%22%20slang%3D%22en-US%22%3EQuestions%20on%20Controlling%20and%20monitoring%20Microsoft%20Teams%20workloads.%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1327812%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Community%2C%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20of%20our%20customer%20raised%20the%20below%20queries%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CSTRONG%3EMonitoring%20and%20enforcement%20policies%20(OCAS%20and%20MCAS)%20and%20differences%20between%20the%202%20solutions%3C%2FSTRONG%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3EThis%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-o365%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%20differentiates%20things%2C%20however%2C%20partner%20is%20looking%20for%20the%20answers%20for%20below%20specific%20scenarios.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Alert%20for%20adding%20GA%20or%20adding%20users%20to%20a%20security%20role%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Alert%20for%20Adding%20external%20guests%20to%20Teams%20sites%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3E%26nbsp%3BAlert%20for%20adding%20user%20for%20specific%20group%20(Like%20domain%20admin)%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CSTRONG%3E2.%20Is%20monitoring%20Live%3F%20If%20not%20what%20is%20the%20delay%3F%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EAccording%20to%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%2C%20Conditional%20Access%20App%20Control%20enables%20user%20app%20access%20and%20sessions%20to%20be%20monitored%20and%20controlled%20in%20real%20time%20based%20on%20access%20and%20session%20policies.%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EAre%20live%20monitoring%20control%20only%20application%20based%20%E2%80%9Cweb%20access%E2%80%9D%20or%20include%20desktop%20client%20such%20as%20%E2%80%9Cdesktop%20Teams%2C%20desktop%20outlook%20app%E2%80%9D%3F%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E3.%20When%20will%20the%20enforcement%20occur%20following%20a%20monitoring%20alert%3F%20How%20much%20time%3F%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EAccording%20to%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%2C%20it%20uses%20aa%20reverse%20proxy%20architecture%20and%20is%20uniquely%20integrated%20with%20Azure%20AD%20Conditional%20Access.%20Azure%20AD%20Conditional%20Access%20allows%20you%20to%20enforce%20access%20controls%20on%20your%20organization%E2%80%99s%20apps%20based%20on%20certain%20conditions%20as%20soon%20as%20the%20policy%20is%20enabled.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EWhen%20will%20the%20enforcement%20occur%20following%20a%20monitoring%20alert%3F%20How%20much%20time%3F%20(without%20reverse%20proxy)%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E4.%20Blocking%20of%20upload%20to%20Teams%20site%20and%20alerting%20for%20sensitive%20data%20as%20opposed%20to%20other%20types%20of%20documents.%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EThey%20want%20to%20create%20alerts%20when%20someone%20upload%20or%20download%20files%20in%20Teams%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3ESpecific%20alert%20if%20there%20is%20sensitive%20information%20in%20the%20file.%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CSTRONG%3E%26nbsp%3B5.%26nbsp%3B%3C%2FSTRONG%3E%3CSTRONG%3EBlocking%20share%20options%20for%20sensitive%20data%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EAccording%20to%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fbest-practices%23block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%2C%20they%20%26nbsp%3Bcan%20use%20MCAS%20to%20Block%20and%20protect%20download%20of%20sensitive%20data%20to%20unmanaged%20or%20risky%20devices.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3ECan%20they%20do%20it%20with%20OCAS%3F%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3ECan%20it%20apply%20only%20on%20web%20app%20or%20include%20desktop%20app%3F%3C%2FFONT%3E%3CSTRONG%3E6.%20Risky%20sign%20in%20options%20under%20OCAS%2C%20real%20time%3F%20Alerts%3F%20Enforcement%3F%3C%2FSTRONG%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3EAccording%20to%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%2C%20it%20%3CSTRONG%3EMonitor%20user%20sessions%20for%20compliance%3C%2FSTRONG%3E%2C%20Risky%20users%20are%20monitored%20when%20they%20sign%20into%20apps%20and%20their%20actions%20are%20logged%20from%20within%20the%20session.%20You%20can%20investigate%20and%20analyze%20user%20behavior%20to%20understand%20where%2C%20and%20under%20what%20conditions%2C%20session%20policies%20should%20be%20applied%20in%20the%20future.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3ECan%20it%20apply%20only%20on%20web%20app%20or%20include%20desktop%20app%3F%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CSTRONG%3E7.%20Alerting%20and%20blocking%20multiple%20sign%20in%20attempts%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3EAccording%20to%20this%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fanomaly-detection-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%2C%20%26nbsp%3Byou%20can%20create%20anomaly%20policies%20to%20get%20instantaneous%20behavioral%20analytics%20and%20anomaly%20detection%20and%20then%20block%20the%20appropriate%20activity.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EAre%20all%20the%20built-in%20policies%20that%20we%20can%20see%20in%20the%20OCAS%20portal%20%26nbsp%3Bcan%20be%20applied%3F%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CSTRONG%3E8.%20Blocking%20options%20in%20Teams%2FSharePoint%20for%20sharing%20options%20from%20internal%20vs%20external%20users%20%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EBlocking%20%2F%20alert%20for%20sharing%20files%20based%20on%20if%20the%20user%20is%20external%20or%20internal%20user.%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CSTRONG%3E9.%20Blocking%20or%20alerting%20on%20user%20connection%20to%20O365%20portal%2FO365%20services%20from%20outside%20Israel%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%3COL%3E%3CLI%3E%3CFONT%20color%3D%22%23FF6600%22%3EBlock%20and%20alert%20if%20the%20connection%20to%20O365%20portal%20and%20O365%20services%20was%20from%20other%20country%20then%20Israel.%3C%2FFONT%3E%3C%2FLI%3E%3C%2FOL%3E%3CP%3EAny%20pointers%20would%20be%20of%20great%20help.%20Many%20thanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1327812%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EQuestions%20on%20Controlling%20and%20monitoring%20Microsoft%20Teams%20workloads.%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1336610%22%20slang%3D%22en-US%22%3ERe%3A%20Questions%20on%20Controlling%20and%20monitoring%20Microsoft%20Teams%20workloads.%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1336610%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F301435%22%20target%3D%22_blank%22%3E%40Newlife%3C%2FA%3E%2C%26nbsp%3Bthank%20you%20for%20the%20questions.%20Please%20see%20my%20responses%20below%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAlert%20for%20adding%20GA%20or%20adding%20users%20to%20a%20security%20role%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EYes%2C%20these%20activity%20types%20are%20supported%20%E2%80%9CAdd%20member%20to%20group%2Frole%E2%80%9D.%20In%20addition%2C%20with%20integrations%20with%20Azure%20ATP%2C%20we%20can%20detect%20suspicious%20additions%20to%20sensitive%20groups.%20Custom%20sensitive%20groups%20can%20be%20defined%20by%20admins.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-domain-dominance-alerts%23suspicious-additions-to-sensitive-groups-external-id-2024%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-advanced-threat-protection%2Fatp-domain-dominance-alerts%23suspicious-additions-to-sensitive-groups-external-id-2024%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAnother%20approach%20is%20to%20customize%20your%20filter%20to%20include%20the%20%E2%80%9CAcitvity%20objects%E2%80%9D%20%E2%80%9CActivity%20object%20ID%E2%80%9D%20equals%20the%20AAD%20group%20objectID%20from%20Azure%20AD.%20This%20can%20easily%20be%20added%20to%20any%20filter%20within%20the%20Activity%20Log%20by%20navigating%20to%20the%20activity%20and%20clicking%20the%20%E2%80%9CActivity%20Objects%E2%80%9D.%20Within%20those%20objects%2C%20there%20are%20icons%20to%20include%20the%20objects%20in%20the%20filter.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAlert%20for%20Adding%20external%20guests%20to%20Teams%20sites%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20have%20MS%20Teams%20specific%20templates%20that%20will%20detect%20this%20activity.%20See%20below%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAccess%20level%20change%20(Teams)%3A%20Alerts%20when%20a%20team's%20access%20level%20is%20changed%20from%20private%20to%20public.%3CBR%20%2F%3EExternal%20user%20added%20(Teams)%3A%20Alerts%20when%20an%20external%20user%20is%20added%20to%20a%20team.%3CBR%20%2F%3EMass%20deletion%20(Teams)%3A%20Alerts%20when%20a%20user%20deletes%20a%20large%20number%20of%20teams.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAlert%20for%20adding%20user%20for%20specific%20group%20(Like%20domain%20admin)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ESame%20as%20%231%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAre%20live%20monitoring%20control%20only%20application%20based%20%E2%80%9Cweb%20access%E2%80%9D%20or%20include%20desktop%20client%20such%20as%20%E2%80%9Cdesktop%20Teams%2C%20desktop%20outlook%20app%E2%80%9D%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EConditional%20Access%20App%20Control%20can%20monitor%20and%20control%20the%20session%20in%20real%20time%20for%20web-based%20applications.%20We%20have%20access%20control%20policies%20which%20can%20be%20used%20to%20block%20the%20desktop%20and%20mobile%20clients.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%23access-controls%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%23access-controls%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EWhen%20will%20the%20enforcement%20occur%20following%20a%20monitoring%20alert%3F%20How%20much%20time%3F%20(without%20reverse%20proxy)%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20using%20Conditional%20Access%20App%20Control%2C%20session%20controls%20are%20in%20real%20time.%20If%20you%20elect%20to%20monitor%20the%20session%2C%20no%20controls%20will%20be%20used.%20This%20provides%20an%20avenue%20to%20analyze%20user%20behavior%20to%20understand%20under%20what%20conditions%20session%20policies%20should%20be%20applied%20in%20the%20future.%20Without%20CaaC%20enabled%2C%20you%20can%20leverage%20API%20connected%20application%20that%20perform%20governance%20functionality%20in%20near%20real%20time.%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fenable-instant-visibility-protection-and-governance-actions-for-your-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fenable-instant-visibility-protection-and-governance-actions-for-your-apps%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EThey%20want%20to%20create%20alerts%20when%20someone%20upload%20or%20download%20files%20in%20Teams%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20have%20activity%20filters%20that%20support%20upload%2Fdownload%20file.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESpecific%20alert%20if%20there%20is%20sensitive%20information%20in%20the%20file.%3C%2FSTRONG%3E%3CBR%20%2F%3EFile%20policies%20support%20DLP%20functionality.%20%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdata-protection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdata-protection-policies%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMCAS%20to%20block%20and%20protect%20download%20of%20sensitive%20data%20to%20unmanaged%20or%20risky%20devices%3A%20Can%20they%20do%20it%20with%20OCAS%3F%3C%2FSTRONG%3E%3CBR%20%2F%3EOnly%20for%20Office%20Apps%20but%20the%20license%20requirements%20also%20include%20Azure%20AD%20P1.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fproxy-intro-aad%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ECan%20it%20apply%20only%20on%20web%20app%20or%20include%20desktop%20app%3F%3C%2FSTRONG%3E%3CBR%20%2F%3EOnly%20web-based%20applications.%20You%20would%20need%20to%20use%20access%20policies%20to%20limit%20desktop%20and%20mobile%20applications%20to%20provide%20a%20comprehensive%20approach%20to%20securing%20those%20apps.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAre%20all%20the%20built-in%20policies%20that%20we%20can%20see%20in%20the%20OCAS%20portal%20%26nbsp%3Bcan%20be%20applied%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYes%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlocking%20%2F%20alert%20for%20sharing%20files%20based%20on%20if%20the%20user%20is%20external%20or%20internal%20user.%3C%2FSTRONG%3E%3CBR%20%2F%3EThat%20control%20should%20be%20handled%20with%20the%20native%20tools%20built%20into%20OD4B%2FSharepoint%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsharepoint%2Fexternal-sharing-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsharepoint%2Fexternal-sharing-overview%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EBlock%20and%20alert%20if%20the%20connection%20to%20O365%20portal%20and%20O365%20services%20was%20from%20other%20country%20then%20Israel.%3C%2FSTRONG%3E%3CBR%20%2F%3EThis%20can%20be%20done%20with%20Azure%20AD%20Conditional%20Access%20Policies.%3C%2FP%3E%0A%3CP%3EAlerts%20can%20be%20configured%20in%20CAS%20to%20filter%20on%20activity%20type%20such%20as%20logon%20and%20location.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1349318%22%20slang%3D%22en-US%22%3ERe%3A%20Questions%20on%20Controlling%20and%20monitoring%20Microsoft%20Teams%20workloads.%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1349318%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F301435%22%20target%3D%22_blank%22%3E%40Newlife%3C%2FA%3E%26nbsp%3BTeams%20activity%20policies%20explained%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fjanbakker.tech%2F2020%2F04%2F19%2Factivity-policy-templates-for-teams-in-microsoft-cloud-app-security%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fjanbakker.tech%2F2020%2F04%2F19%2Factivity-policy-templates-for-teams-in-microsoft-cloud-app-security%2F%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20saw%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F546565%22%20target%3D%22_blank%22%3E%40John_Lewis%3C%2FA%3E%26nbsp%3Bdid%20an%20awesome%20job%20already%20on%20answering%20your%20question.%20%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Flaugh_40x40.gif%22%20alt%3D%22%3Alol%3A%22%20title%3D%22%3Alol%3A%22%20%2F%3EIf%20you%20have%20any%20more%20question%2C%20feel%20free%20to%20reach%20out.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Frequent Contributor

Hi Community, 

 

One of our customer raised the below queries:

 

  1. Monitoring and enforcement policies (OCAS and MCAS) and differences between the 2 solutions

This documentation differentiates things, however, partner is looking for the answers for below specific scenarios.

 

  1.       Alert for adding GA or adding users to a security role
  2.       Alert for Adding external guests to Teams sites
  3.  Alert for adding user for specific group (Like domain admin)

2. Is monitoring Live? If not what is the delay?

According to this documentation, Conditional Access App Control enables user app access and sessions to be monitored and controlled in real time based on access and session policies.

  1. Are live monitoring control only application based “web access” or include desktop client such as “desktop Teams, desktop outlook app”?

 

3. When will the enforcement occur following a monitoring alert? How much time?

According to this documentation, it uses aa reverse proxy architecture and is uniquely integrated with Azure AD Conditional Access. Azure AD Conditional Access allows you to enforce access controls on your organization’s apps based on certain conditions as soon as the policy is enabled.

 

  1. When will the enforcement occur following a monitoring alert? How much time? (without reverse proxy)

 

4. Blocking of upload to Teams site and alerting for sensitive data as opposed to other types of documents.

 

  1. They want to create alerts when someone upload or download files in Teams
  2. Specific alert if there is sensitive information in the file.

 5. Blocking share options for sensitive data

According to this documentation, they  can use MCAS to Block and protect download of sensitive data to unmanaged or risky devices.

 

  1. Can they do it with OCAS?
  2. Can it apply only on web app or include desktop app?6. Risky sign in options under OCAS, real time? Alerts? Enforcement?

According to this documentation, it Monitor user sessions for compliance, Risky users are monitored when they sign into apps and their actions are logged from within the session. You can investigate and analyze user behavior to understand where, and under what conditions, session policies should be applied in the future.

 

  1. Can it apply only on web app or include desktop app?

7. Alerting and blocking multiple sign in attempts

According to this documentation,  you can create anomaly policies to get instantaneous behavioral analytics and anomaly detection and then block the appropriate activity.

 

  1. Are all the built-in policies that we can see in the OCAS portal  can be applied?

8. Blocking options in Teams/SharePoint for sharing options from internal vs external users

 

  1. Blocking / alert for sharing files based on if the user is external or internal user.

9. Blocking or alerting on user connection to O365 portal/O365 services from outside Israel

 

  1. Block and alert if the connection to O365 portal and O365 services was from other country then Israel.

Any pointers would be of great help. Many thanks!

2 Replies
best response confirmed by Newlife (Frequent Contributor)
Solution

Hi @Newlife, thank you for the questions. Please see my responses below:

 

Alert for adding GA or adding users to a security role


Yes, these activity types are supported “Add member to group/role”. In addition, with integrations with Azure ATP, we can detect suspicious additions to sensitive groups. Custom sensitive groups can be defined by admins.

 

https://docs.microsoft.com/en-us/azure-advanced-threat-protection/atp-domain-dominance-alerts#suspic...

 

Another approach is to customize your filter to include the “Acitvity objects” “Activity object ID” equals the AAD group objectID from Azure AD. This can easily be added to any filter within the Activity Log by navigating to the activity and clicking the “Activity Objects”. Within those objects, there are icons to include the objects in the filter.

 

Alert for Adding external guests to Teams sites

 

We have MS Teams specific templates that will detect this activity. See below:

 

Access level change (Teams): Alerts when a team's access level is changed from private to public.
External user added (Teams): Alerts when an external user is added to a team.
Mass deletion (Teams): Alerts when a user deletes a large number of teams.

 

Alert for adding user for specific group (Like domain admin)

Same as #1

 

Are live monitoring control only application based “web access” or include desktop client such as “desktop Teams, desktop outlook app”?

 

Conditional Access App Control can monitor and control the session in real time for web-based applications. We have access control policies which can be used to block the desktop and mobile clients.
https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad#access-controls

 

When will the enforcement occur following a monitoring alert? How much time? (without reverse proxy)

 

When using Conditional Access App Control, session controls are in real time. If you elect to monitor the session, no controls will be used. This provides an avenue to analyze user behavior to understand under what conditions session policies should be applied in the future. Without CaaC enabled, you can leverage API connected application that perform governance functionality in near real time.

https://docs.microsoft.com/en-us/cloud-app-security/enable-instant-visibility-protection-and-governa...

 

They want to create alerts when someone upload or download files in Teams

We have activity filters that support upload/download file.

 

Specific alert if there is sensitive information in the file.
File policies support DLP functionality.
https://docs.microsoft.com/en-us/cloud-app-security/data-protection-policies

 

MCAS to block and protect download of sensitive data to unmanaged or risky devices: Can they do it with OCAS?
Only for Office Apps but the license requirements also include Azure AD P1.
https://docs.microsoft.com/en-us/cloud-app-security/proxy-intro-aad

 

Can it apply only on web app or include desktop app?
Only web-based applications. You would need to use access policies to limit desktop and mobile applications to provide a comprehensive approach to securing those apps.

 

Are all the built-in policies that we can see in the OCAS portal  can be applied?

Yes

 

Blocking / alert for sharing files based on if the user is external or internal user.
That control should be handled with the native tools built into OD4B/Sharepoint https://docs.microsoft.com/en-us/sharepoint/external-sharing-overview

 

Block and alert if the connection to O365 portal and O365 services was from other country then Israel.
This can be done with Azure AD Conditional Access Policies.

Alerts can be configured in CAS to filter on activity type such as logon and location.

@Newlife Teams activity policies explained: https://janbakker.tech/2020/04/19/activity-policy-templates-for-teams-in-microsoft-cloud-app-securit... 

 

I saw @John_Lewis did an awesome job already on answering your question. :lol:If you have any more question, feel free to reach out.