SOLVED

Two CAS's? -- confused about discovery through agents on windows clients vs firewall log

%3CLINGO-SUB%20id%3D%22lingo-sub-139639%22%20slang%3D%22en-US%22%3ETwo%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-139639%22%20slang%3D%22en-US%22%3E%3CP%3EThere%20seems%20to%20be%20two%20Cloud%20Access%20Discovery%20products%20that%20have%20two%20different%20%22discovery%22%20methods.%3C%2FP%3E%0A%3CP%3EOne%20seems%20to%20be%20released%20in%20late%202015%20and%20seems%20to%20get%20data%20collection%20by%20deploying%20agents%20to%20windows%20clients.%20A%20newer%20discovery%20tool%20seems%20to%20collect%20data%20by%20processing%20Proxy%2FFirewall%20logs.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAre%20they%20really%20two%20different%20products%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20would%20like%20to%20have%20cloud%20app%20discovery%20using%20agents%20for%20roaming%20clients%20and%20locations%20that%20don't%20have%20a%20firewall%2Fproxy%20that%20works%20with%20the%20log%20parsing.%20Of%20course%20firewall%20log%20parsing%20has%20Zero%20impact%20on%20client%20performance%20vs.%20agent%20based%20which%20would%20have%20some%20impact%20CPU%2FDisk%2FMemory%20and%20network%20on%20the%20clients%20as%20well%20as%20agent%20management%20(deploy%2Fupdate%2Fremove).%20So%20being%20able%20to%20use%20both%20would%20be%20preferable.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20current%20docs%20are%20confusing%3A%3C%2FP%3E%0A%3CP%3EExample%20-%20this%20MSDN%20link%20%3CA%20title%3D%22Cloud%20App%20Discovery%20(MSDN%20Docs)%22%20href%3D%22https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fazure%2Fmt143581.aspx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fazure%2Fmt143581.aspx%3C%2FA%3Elinks%20to%20this%20docs.microsoft.com%20article%20which%20seems%20to%20imply%20that%20agent%20based%20discovery%20is%20current%20(%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Factive-directory-cloudappdiscovery-whatis%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Factive-directory-cloudappdiscovery-whatis%3C%2FA%3E)%26nbsp%3B%3CBR%20%2F%3EBut%20this%20same%20section%20of%20documents%20provides%20no%20information%20on%20how%20to%20perform%20setup%20-%20instead%20linking%20to%20a%20portal%20despite%20the%20description%20of%3A%20%22%3CSPAN%3ECheck%20out%20the%20improvements%20to%20Cloud%20App%20Discovery%20in%20Azure%20Active%20Directory%20(Azure%20AD)%2C%20which%20are%20enhanced%20by%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fportal.cloudappsecurity.com%2F%22%20target%3D%22_blank%22%20data-linktype%3D%22external%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eintegration%20with%20Microsoft%20Cloud%20App%20Security%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%22%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EClicking%20on%20that%20%22check%20out%22%20link%20takes%20you%20to%20a%20portal%20page%20for%20the%20service%20-%20not%20a%20description%20or%20information%20page.%20So%20now%20you%20land%20on%20*.portal.cloudappsecurity.com%26nbsp%3B%20and%20there%20is%20nothing%20there%20for%20agent%20based%20data%20collection.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20for%20grins%20I%20go%20to%20portal.azure.com%20and%20go%20to%20Marketplace%20-%26gt%3B%20%22Security%20%2B%20Identity%22%20and%20add%20%22Azure%20AD%20Cloud%20app%20discovery%22%3C%2FP%3E%0A%3CP%3EAfter%202%20hours%20of%20provisioning%20where%20the%20pinned%20tile%20just%20indicates%20its%20still%20loading%20I%20manually%20navigate%20to%20the%20Azure%20Cloud%20App%20discovery%20blade%20where%20the%20unhelpful%20message%3A%3C%2FP%3E%0A%3CP%3E%22%3CSPAN%3E%3CEM%3EDiscover%20your%20cloud%20apps%20using%20the%20new%20and%20enhanced%20Cloud%20App%20Discovery%20before%20March%205th%2C%202018%20to%20avoid%20disruption%20of%20service%3C%2FEM%3E.%3C%2FSPAN%3E%22%20floats%20at%20the%20top.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20blade%20has%2C%20once%20I%20click%20%22quickstart%22%2C%20information%20on%20downloading%20agents%20and%20agent%20based%20data%20collection%20--%20but%20has%20that%20worrisome%20message%20at%20the%20top.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20I%20click%20on%20that%20message%20it%20takes%20me%20to%20%22%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2F%3C%2FA%3E%22%20%26nbsp%3B%20...%20so%20a%20bad%2Fnot%20helpful%20link.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%20I%20am%20left%20to%20wonder%20if%20the%20message%20%22%3CEM%3EDiscover%20your%20cloud%20apps%20using%20the%20new%20and%20enhanced%20Cloud%20App%20Discovery%20before%20March%205th%2C%202018%20to%20avoid%20disruption%20of%20service%3C%2FEM%3E%22%20mean%20that%20the%20agent%20based%20Cloud%20app%20discovery%20is%20being%20phased%20out%203%2F5%2F2018%3F%20Is%20that%20why%20the%20quickstart%20doesn't%20display%20by%20default%3F%20Clicking%20on%20the%203%2F5%2F2018%20message%20should%20take%20me%20where%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EQ1%3A%20What%20is%20the%20status%20of%20Azure%20AD%20Cloud%20app%20discovery%20using%20Windows%20agents%3F%3C%2FP%3E%0A%3CP%3EQ2%3A%20What%20is%20the%20status%20of%20Azure%20AD%20Cloud%20app%20discovery%20using%20firewall%20log%20analysis%3F%3C%2FP%3E%0A%3CP%3EQ3%3A%20Which%20of%20these%20products%20is%20licensed%20with%20Microsoft%20365%20Enterprise%20E5%3F%3C%2FP%3E%0A%3CP%3EQ4%3A%20Can%20I%20use%20agent-based%20discovery%20and%20filewall%20log%20parsing%20based%20discovery%20at%20the%20same%20time%3F%3C%2FP%3E%0A%3CP%3EQ5%3A%20If%20there%20is%20a%20transition%2Fphase%20out%20of%20the%20agent%20only%20data%20collection%20system%20-%20will%20agent%20based%20discovery%20be%20available%20in%20the%20new%20system%20-%20or%20some%20other%20way%20for%20roaming%20users%20to%20have%20their%20cloud%20apps%20%22discovered%22%3C%2FP%3E%0A%3CP%3EQ6%3A%20Is%20there%20someone%20who%20owns%20the%20doc's%20for%20this%20product%20-%20if%20so%20would%20you%20like%20more%20detailed%20feedback%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks!%3C%2FP%3E%0A%3CP%3E-N%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-139639%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20App%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Discovery%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-201080%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-201080%22%20slang%3D%22en-US%22%3E%3CP%3EThey%20should%20work%20with%20the%20Windows%20Defender%20ATP%20team%20and%20use%20that%20data%2C%20when%20available%20(M365-E5%20license)%2C%20for%20windows%20devices%20not%20behind%20a%20firewall.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-189366%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-189366%22%20slang%3D%22en-US%22%3E%3CP%3EIt's%20work%20in%20progress%20but%20we're%20all%20excited%20and%20waiting%20with%20high%20expectations.%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%3B)%3C%2Fimg%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-151518%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-151518%22%20slang%3D%22en-US%22%3E%3CP%3EDavid%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20am%20glad%20there%20is%20some%20plan%20in%20place%20for%20Cloud%20Security%20to%20collect%20data%20from%20a%20few%20devices%20not%20just%20from%20logs%20such%20as%20the%20corporate%20firewall%20or%20proxy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-146238%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-146238%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Neil%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20believe%20they%20are%20currently%20working%20on%20a%20solution%20that%20will%20cover%20your%20needs.%26nbsp%3B%20Normally%20you%20will%20have%20the%20option%20of%20using%20an%20agent%26nbsp%3Bon%20the%20roaming%20device%20or%26nbsp%3Benforcing%20the%20usage%20of%20an%20Azure%20proxy%20service.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20need%20to%20accomplish%20this%20today%20you%20can%20check%20for%203rd%20party%20solutions%2C%20such%20as%20Z-scaler.%26nbsp%3B%26nbsp%3B%20But%20I'm%20fairly%20sure%20something%20is%20heading%20our%20way%20from%20Microsoft%20as%20well%20soon.%26nbsp%3B%26nbsp%3B%3B)%3C%2Fimg%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHave%20a%20look%20at%20this%20session%20where%20they%20demo%20Z-scaler%20integration.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fyoutu.be%2F8et4mw6QOtg%3Ft%3D39m48s%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CFONT%20color%3D%22%230066cc%22%3Ehttps%3A%2F%2Fyoutu.be%2F8et4mw6QOtg%3Ft%3D40m48s%3C%2FFONT%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-146140%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-146140%22%20slang%3D%22en-US%22%3E%3CP%3EDavid%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUnfortunately%20that%20link%20doesn't%20deal%20with%20my%20question%2Fconcern%3A.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20the%20prior%20MS%20respondant%20(Suni%20I%20think)%20on%203%2F5%2F2018%20the%20agent%20based%20discovery%20service%20will%20be%20phased%20out.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMy%20follow%20up%20to%20Suni%20was%20specifically%20if%20there%20are%20plans%20to%20re-introduce%20a%20cloud-app-discovery%20service%20that%20would%20work%20for%20users%20who%20are%20100%25%20roaming%20-%20never%20behind%20a%20corporate%20firewall.%20The%20new%20cloud%20app%20discovery%20doesn't%20have%20a%20way%20to%20collect%20information%20for%20roaming%20users%20because%20there%20is%20no%20%22LOG%22%20to%20be%20parsed.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWith%20they%20%22old%22%20cloud%20app%20security%20I%20could%20deploy%20an%20agent%20to%20roaming%20user%20laptops.%20That%20won't%20work%20after%203%2F5%2F2018.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20what%20will%20be%20the%20story%20for%20detecting%20shadowIT%20for%20roaming%20users%20such%20as%20sale%20person%20laptops%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-Neil%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-142564%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-142564%22%20slang%3D%22en-US%22%3E%3CP%3EHello%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20page%20explains%20the%20difference%20very%20well%20and%20should%20help%20you%20on%20your%20way.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-aad%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Feditions-cloud-app-security-aad%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBest%20regards%3C%2FP%3E%0A%3CP%3EDavid%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-141374%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-141374%22%20slang%3D%22en-US%22%3E%3CP%3EThat%20is%20what%20I%20was%20worried%20about%20when%20I%20saw%20that%203%2F5%2F2018%20message.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20I%20can%20see%20why%2C%20the%20new%20service%20with%20log%2Fproxy%20log%20consumption%20is%20%22better%22%20for%2080%25%20of%20enterprise%20use%20(no%20agent%20to%20maintain%2C%20no%20performance%20impact%20on%20windows%20computers%2C%20gets%20data%20about%20all%20network%20devices%20not%20just%20those%20that%20have%20the%20agent)%2C%20but%20....%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EQ)%20What%20is%20the%20solution%20to%20monitor%20roaming%20corporate%20devices%20that%20rarely%20if%20ever%20return%20to%20the%20corporate%20environment%3F%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-Neil%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-141355%22%20slang%3D%22en-US%22%3ERe%3A%20Two%20CAS's%3F%20--%20confused%20about%20discovery%20through%20agents%20on%20windows%20clients%20vs%20firewall%20log%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-141355%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Neil%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20writing%20in.%20Sorry%20about%20the%20confusion%20around%20the%20guidance%20on%20how%20to%20move%20to%20the%20new%20and%20enhanced%20experience%20for%20Azure%20Active%20Directory%20Cloud%20App%20Discovery.%20The%20link%20from%20the%20Azure%20portal%20banner%20has%20been%20corrected%20to%20point%20to%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fcloudappdiscovery-get-started%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fcloudappdiscovery-get-started%3C%2FA%3Ewhich%20has%20the%20right%20guidance%20on%20how%20to%20get%20started%20with%20the%20new%20and%20enhanced%20experience.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERegarding%20the%20agent-based%20discovery(current)%20experience%20-%20it%20will%20stay%20live%20until%20March%205th%2C%202018%2C%20after%20which%20the%20UI%20will%20be%20disabled.%20Shortly%20after%2C%20the%20agents%20and%20data%20will%20be%20deleted%20as%20well%20and%20hence%20our%20recommendation%20for%20Azure%20AD%20Cloud%20App%20Discovery%20is%20that%20customers%20move%20to%20the%20new%20and%20enhanced%20experience%20and%20set%20up%20the%20necessary%20snapshot%20reports%20before%20March%205th%20to%20avoid%20disruption%20of%20service.%20After%20March%205th%2C%20when%20customers%20access%20Cloud%20App%20Discovery%2C%20they%20will%20automatically%20be%20directed%20to%20%3CA%20href%3D%22http%3A%2F%2Fportal.cloudappsecurity.com%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttp%3A%2F%2Fportal.cloudappsecurity.com%3C%2FA%3Eand%20the%20new%20experience%20will%20be%20the%20default.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECommunication%20regarding%20this%20was%20sent%20out%20to%20currently%20active%20customers%20in%20early%20December%20and%20the%20portal%20notification%20was%20intended%20to%20help%20serve%20as%20a%20reminder%20of%20upcoming%20deadlines.%26nbsp%3BHope%20this%20clarifies.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Contributor

There seems to be two Cloud Access Discovery products that have two different "discovery" methods.

One seems to be released in late 2015 and seems to get data collection by deploying agents to windows clients. A newer discovery tool seems to collect data by processing Proxy/Firewall logs.

 

Are they really two different products?

 

I would like to have cloud app discovery using agents for roaming clients and locations that don't have a firewall/proxy that works with the log parsing. Of course firewall log parsing has Zero impact on client performance vs. agent based which would have some impact CPU/Disk/Memory and network on the clients as well as agent management (deploy/update/remove). So being able to use both would be preferable.

 

The current docs are confusing:

Example - this MSDN link https://msdn.microsoft.com/en-us/library/azure/mt143581.aspx links to this docs.microsoft.com article which seems to imply that agent based discovery is current (https://docs.microsoft.com/en-us/azure/active-directory/active-directory-cloudappdiscovery-whatis
But this same section of documents provides no information on how to perform setup - instead linking to a portal despite the description of: "Check out the improvements to Cloud App Discovery in Azure Active Directory (Azure AD), which are enhanced by integration with Microsoft Cloud App Security."

 

Clicking on that "check out" link takes you to a portal page for the service - not a description or information page. So now you land on *.portal.cloudappsecurity.com  and there is nothing there for agent based data collection.

 

So for grins I go to portal.azure.com and go to Marketplace -> "Security + Identity" and add "Azure AD Cloud app discovery"

After 2 hours of provisioning where the pinned tile just indicates its still loading I manually navigate to the Azure Cloud App discovery blade where the unhelpful message:

"Discover your cloud apps using the new and enhanced Cloud App Discovery before March 5th, 2018 to avoid disruption of service." floats at the top. 

This blade has, once I click "quickstart", information on downloading agents and agent based data collection -- but has that worrisome message at the top.

 

If I click on that message it takes me to "https://www.microsoft.com/en-us/"   ... so a bad/not helpful link.

 

Now I am left to wonder if the message "Discover your cloud apps using the new and enhanced Cloud App Discovery before March 5th, 2018 to avoid disruption of service" mean that the agent based Cloud app discovery is being phased out 3/5/2018? Is that why the quickstart doesn't display by default? Clicking on the 3/5/2018 message should take me where?

 

 

Q1: What is the status of Azure AD Cloud app discovery using Windows agents?

Q2: What is the status of Azure AD Cloud app discovery using firewall log analysis?

Q3: Which of these products is licensed with Microsoft 365 Enterprise E5?

Q4: Can I use agent-based discovery and filewall log parsing based discovery at the same time?

Q5: If there is a transition/phase out of the agent only data collection system - will agent based discovery be available in the new system - or some other way for roaming users to have their cloud apps "discovered"

Q6: Is there someone who owns the doc's for this product - if so would you like more detailed feedback?

 

Thanks!

-N

 

 

8 Replies
Highlighted
Best Response confirmed by Neil Goldstein (Contributor)
Solution

Hi Neil,

 

Thanks for writing in. Sorry about the confusion around the guidance on how to move to the new and enhanced experience for Azure Active Directory Cloud App Discovery. The link from the Azure portal banner has been corrected to point to - https://docs.microsoft.com/en-us/azure/active-directory/cloudappdiscovery-get-started which has the right guidance on how to get started with the new and enhanced experience. 

 

Regarding the agent-based discovery(current) experience - it will stay live until March 5th, 2018, after which the UI will be disabled. Shortly after, the agents and data will be deleted as well and hence our recommendation for Azure AD Cloud App Discovery is that customers move to the new and enhanced experience and set up the necessary snapshot reports before March 5th to avoid disruption of service. After March 5th, when customers access Cloud App Discovery, they will automatically be directed to http://portal.cloudappsecurity.com and the new experience will be the default.

 

Communication regarding this was sent out to currently active customers in early December and the portal notification was intended to help serve as a reminder of upcoming deadlines. Hope this clarifies. 

 

Highlighted

That is what I was worried about when I saw that 3/5/2018 message.

 

 

So I can see why, the new service with log/proxy log consumption is "better" for 80% of enterprise use (no agent to maintain, no performance impact on windows computers, gets data about all network devices not just those that have the agent), but ....

 

Q) What is the solution to monitor roaming corporate devices that rarely if ever return to the corporate environment? 

 

Thanks!

 

-Neil

Highlighted

Hello

 

This page explains the difference very well and should help you on your way.

 

https://docs.microsoft.com/en-us/cloud-app-security/editions-cloud-app-security-aad

 

Best regards

David

 

Highlighted

David,

 

Unfortunately that link doesn't deal with my question/concern:.

 

As the prior MS respondant (Suni I think) on 3/5/2018 the agent based discovery service will be phased out.

 

My follow up to Suni was specifically if there are plans to re-introduce a cloud-app-discovery service that would work for users who are 100% roaming - never behind a corporate firewall. The new cloud app discovery doesn't have a way to collect information for roaming users because there is no "LOG" to be parsed.

 

With they "old" cloud app security I could deploy an agent to roaming user laptops. That won't work after 3/5/2018.

 

So what will be the story for detecting shadowIT for roaming users such as sale person laptops? 

 

-Neil

Highlighted

Hi Neil

 

I believe they are currently working on a solution that will cover your needs.  Normally you will have the option of using an agent on the roaming device or enforcing the usage of an Azure proxy service. 

 

If you need to accomplish this today you can check for 3rd party solutions, such as Z-scaler.   But I'm fairly sure something is heading our way from Microsoft as well soon.  ;)

 

Have a look at this session where they demo Z-scaler integration. 

 

https://youtu.be/8et4mw6QOtg?t=40m48s

Microsoft Cloud App Security provides deeper visibility, stronger controls and enhanced protection for your cloud apps. In this session we show you can deplo...
Highlighted

David,

 

I am glad there is some plan in place for Cloud Security to collect data from a few devices not just from logs such as the corporate firewall or proxy.

 

Thanks!

Highlighted

It's work in progress but we're all excited and waiting with high expectations.    ;)

Highlighted

They should work with the Windows Defender ATP team and use that data, when available (M365-E5 license), for windows devices not behind a firewall.