%3CLINGO-SUB%20id%3D%22lingo-sub-1122354%22%20slang%3D%22en-US%22%3EBlock%20Access%20to%20Unsanctioned%20Apps%20using%20Microsoft%20Defender%20ATP%20%26amp%3B%20Microsoft%20Cloud%20App%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1122354%22%20slang%3D%22en-US%22%3E%3CP%3EIn%20a%20modern%20workplace%20where%20the%20average%20enterprise%20is%20using%20over%201%2C500%20different%20cloud%20apps%2C%20and%20more%20than%2080%20gigabytes%20of%20data%20is%20being%20uploaded%20monthly%20to%20risky%20apps%20from%20business%20endpoint%20devices%2C%20the%20ability%20of%20IT%20and%20compliance%20administrators%20to%20manage%20and%20monitor%26nbsp%3Bshadow%20IT%20becomes%20an%20(almost)%20impossible%20mission.%20It%20is%20not%20only%20about%20the%20ability%20to%20assess%20the%20potential%20risk%20that%20cloud%20apps%20pose%20to%20the%20company%2C%20but%20also%20about%20the%20tools%20IT%20has%20(or%20doesn%E2%80%99t%20have)%20to%20control%20and%20manage%20access%20to%20these%20apps.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EMicrosoft%20Cloud%20App%20Security%20and%20Microsoft%20Defender%20ATP%20teams%20have%20partnered%20together%20to%20build%20a%20Microsoft%20Shadow%20IT%20visibility%20and%20control%20solution.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EShadow%20IT%20Discovery%20for%20endpoint%20users%20was%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Defender-ATP%2FMDATP-amp-Cloud-App-Security-Integration%2Fm-p%2F450731%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Eofficially%20announced%20earlier%20this%20year%2C%3C%2FA%3E%20the%20solution%2C%20leverage%20the%20traffic%20information%20collected%20by%20the%20Windows%20Defender%20ATP%20to%20give%20admins%20a%20complete%20view%20of%20cloud%20app-%20and%20services%20used%20in%20their%20organization.%20This%20was%20the%20first%20step%20towards%20enabling%20a%20seamless%2C%20zero%20deployment%2C%20native%20cloud%20app%20security%20solution%20that%20works%3CSTRONG%3E%26nbsp%3Bany%20time%20any-where.%3C%2FSTRONG%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20now%20ready%20to%20move%20forward%20to%20the%20next%20phase%20of%20this%20integration%20and%20announce%20the%20public%20preview%20of%20the%20functionality%20to%20block%20access%20to%20unsanctioned%20apps%20by%20leveraging%20Microsoft%20Defender%20network%20protection%20capability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20are%20now%20ready%20to%20move%20forward%20to%20the%20next%20phase%20of%20this%20integration%20and%20announce%20the%20public%20preview%20of%20the%20functionality%20to%20block%20access%20to%20unsanctioned%20apps%20by%20leveraging%20Microsoft%20Defender%20network%20protection%20capability.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F166504iCC476D85084F644F%2Fimage-dimensions%2F738x96%3Fv%3D1.0%22%20width%3D%22738%22%20height%3D%2296%22%20alt%3D%22clipboard_image_0.png%22%20title%3D%22clipboard_image_0.png%22%20%2F%3E%3C%2FSPAN%3E%3CEM%3EFigure%201%3A%20Configure%20a%20cloud%20app%20as%20unsanctioned%20in%20one%20click%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CSTRONG%3EPlease%20read%20%3C%2FSTRONG%3E%3CSTRONG%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fenterprise-mobility-security%2Fblock-access-to-unsanctioned-apps-with-microsoft-defender-atp%2Fba-p%2F1121179%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ethe%20following%20blog%20post%3C%2FA%3E%3C%2FSTRONG%3E%3CSTRONG%3E%20to%20learn%20why%20we%20do%20it%2C%20how%20to%20enable%20it%20with%20a%20single%20click%2C%20what%20the%20new%20value%20is%20and%20how%20we%E2%80%99re%20going%20to%20continue%20to%20enhance%20these%20capabilities%20in%20the%20future.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1414555821%22%20id%3D%22toc-hId--1414555821%22%3E%3CFONT%20size%3D%224%22%3E%3CSTRONG%3ETechnical%20info%20and%20feedback%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3ETo%20learn%20how%20to%20get%20started%20with%20Microsoft%20Cloud%20App%20Security%20Integration%20with%20our%20detailed%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fwdatp-integration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etechnical%20documentation%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%20or%20comments%2C%20please%20share%20your%20thoughts%20on%20the%20feature%20using%20%3CA%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR-Fe53hUQXJHoeNw6PDXrohUNTlHRTVOTTA2M1YzR1lFUTBJSlc3REtCRi4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ethis%20short%20survey%3C%2FA%3E!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F112613%22%20target%3D%22_blank%22%3E%40Danny%20Kadyshevitch%3C%2FA%3E%26nbsp%3B%3Ca%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F21319%22%3E%40nick%3C%2Fa%3E%20Welton%26nbsp%3B%40Ron%20Itzhak%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1122354%22%20slang%3D%22en-US%22%3E%3CP%3EBlock%20Access%26nbsp%3Bto%20Unsanctioned%20Apps%20using%3C%2FP%3E%0A%3CP%3EMicrosoft%20Defender%20ATP%20%26amp%3B%20Microsoft%20Cloud%20App%20Security%20Native%20Integration%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

In a modern workplace where the average enterprise is using over 1,500 different cloud apps, and more than 80 gigabytes of data is being uploaded monthly to risky apps from business endpoint devices, the ability of IT and compliance administrators to manage and monitor shadow IT becomes an (almost) impossible mission. It is not only about the ability to assess the potential risk that cloud apps pose to the company, but also about the tools IT has (or doesn’t have) to control and manage access to these apps.

Microsoft Cloud App Security and Microsoft Defender ATP teams have partnered together to build a Microsoft Shadow IT visibility and control solution.

 

Shadow IT Discovery for endpoint users was officially announced earlier this year, the solution, leverage the traffic information collected by the Windows Defender ATP to give admins a complete view of cloud app- and services used in their organization. This was the first step towards enabling a seamless, zero deployment, native cloud app security solution that works any time any-where. 

 

We are now ready to move forward to the next phase of this integration and announce the public preview of the functionality to block access to unsanctioned apps by leveraging Microsoft Defender network protection capability.

 

clipboard_image_0.png

Figure 1: Configure a cloud app as unsanctioned in one click


Please read the following blog post to learn why we do it, how to enable it with a single click, what the new value is and how we’re going to continue to enhance these capabilities in the future.

Technical info and feedback

To learn how to get started with Microsoft Cloud App Security Integration with our detailed technical documentation.

As always, we want to hear from you! If you have any suggestions or comments, please share your thoughts on the feature using this short survey!

 

 @Danny Kadyshevitch @Nick Welton @Ron Itzhak